SlideShare a Scribd company logo
Computer - Networking
TEACHER:MAHEEN AQEEL
What is a Computer Network?
A computer network is a system in which multiple computers are connected
to each other to share information and resources.
Characteristics of a computer network
 Share Resources from one computer to another
 Create files and store them in one computer, access those files from the other
computer(s) connected over the network
 Connect a printer, scanner, or a fax machine to one computer within the
network and let other computers of the network use the machines available
over network.
Following is the list of hardware's required to setup a computer network.
 Network Cables
 Distributors
 Routers
 Internal Network Cards
 External Network Cards
Computer - Networking
TEACHER:MAHEEN AQEEL
Network Cables
Network cables are used to connect computers. The most commonly used
cable is Category 5 cable RJ-45.
Distributors
A computer can be connected to another one via a serial port but if we need
to connect many computers to produce a network, this serial connection will
not work. The solution is to use a central body to which other computers,
printers, scanners etc. can be connected and then this body will manage or
distribute network traffic.
Computer - Networking
TEACHER:MAHEEN AQEEL
Router
A router is a type of device which acts as the central point among
computers and other devices that are part of a network. A router is
equipped with holes called ports and computers and other devices are
connected to a router using network cables. Now-a-days router comes in
wireless modes using which computers can be connected without any
physical cable.
Network Card
Network card is a necessary component of a computer without which a
computer cannot be connected over a network. It is also known as network
adapter or Network Interface Card (NIC). Most branded computers have
network card pre-installed. Network cards are of two types : Internal and
External Network Cards.
Computer - Networking
TEACHER:MAHEEN AQEEL
INTERNAL NETWORK CARDS
Motherboard has a slot for internal network card where it is to be inserted.
Internal network cards are of two types in which first type uses Peripheral
Component Interconnect (PCI) connection while the second type uses
Industry Standard Architecture (ISA). Network cables are required to
provide network access.
EXTERNAL NETWORK CARDS
External network cards come in two flavours : Wireless and USB based.
Wireless network card need to be inserted into the motherboard but no
network cable is required to connect to network
Computer - Networking
TEACHER:MAHEEN AQEEL
Universal Serial Bus (USB)
USB card are easy to use and connect via USB port. Computers
automatically detect USB card and can install the drivers required to
support the USB network card automatically.
Computer - Internet and Intranet
Internet
It is a worldwide system which has the following characteristics:
 Internet is a world-wide / global system of interconnected computer networks.
 Internet uses the standard Internet Protocol (TCP/IP)
 Every computer in internet is identified by a unique IP address.
 IP Address is a unique set of numbers (such as 110.22.33.114) which identifies
a computer’s location.
 A special computer DNS (Domain Name Server) is used to give name to the IP
Address so that user can locate a computer by a name.
Computer - Networking
TEACHER:MAHEEN AQEEL
 For example, a DNS server will resolve a name http://www.google.com to a
particular IP address to uniquely identify the computer on which this website is
hosted.
 Internet is accessible to every user all over the world.
Intranet
 Intranet is system in which multiple PCs are connected to each other.
 PCs in intranet are not available to the world outside the intranet.
 Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their
intranet.
 Each computer in Intranet is also identified by an IP Address which is unique
among the computers in that Intranet.
Computer - Networking
TEACHER:MAHEEN AQEEL
Similarities in Internet and Intranet
 Intranet uses the internet protocols such as TCP/IP and FTP.
 Intranet sites are accessible via web browser in similar way as websites in
internet. But only members of Intranet network can access intranet hosted
sites.
 In Intranet, own instant messengers can be used as similar to yahoo
messenger/ gtalk over the internet.
Differences in Internet and Intranet
 Internet is general to PCs all over the world whereas Intranet is specific to few
PCs.
 Internet has wider access and provides a better access to websites to large
population whereas Intranet is restricted.
 Internet is not as safe as Intranet as Intranet can be safely privatized as per the
need.
Computer - Networking
TEACHER:MAHEEN AQEEL
Data Communication & Computer Network
Data communications refers to the transmission of this digital data between
two or more computers and a computer network or data network is a
telecommunications network that allows computers to exchange data. The
physical connection between networked computing devices is established
using either cable media or wireless media. The best-known computer
network is the Internet.
DCN - Computer Network Types
Generally, networks are distinguished based on their geographical span. A
network can be as small as distance between your mobile phone and its
Bluetooth headphone and as large as the internet itself, covering the whole
geographical world,
Personal Area Network
A Personal Area Network (PAN) is smallest network which is very personal
to a user. This may include Bluetooth enabled devices or infra-red enabled
devices. PAN has connectivity range up to 10 meters. PAN may include
wireless computer keyboard and mouse, Bluetooth enabled headphones,
wireless printers and TV remotes.
Computer - Networking
TEACHER:MAHEEN AQEEL
For example, Piconet is Bluetooth-enabled Personal Area Network which
may contain up to 8 devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single
administrative system is generally termed as Local Area Network (LAN).
Usually,LAN covers an organization’ offices, schools, colleges or universities.
Number of systems connected in LAN may vary from as least as two to as
much as 16 million.
LAN provides a useful way of sharing the resources between end users.The
resources such as printers, file servers, scanners, and internet are easily
sharable among computers.
Computer - Networking
TEACHER:MAHEEN AQEEL
LANs are composed of inexpensive networking and routing equipment. It
may contains local servers serving file storage and other locally shared
applications. It mostly operates on private IP addresses and does not
involve heavy routing. LAN works under its own local domain and controlled
centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely
employed LAN technology and uses Star topology, while Token-ring is rarely
seen.
LAN can be wired,wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city
such as cable TV network. It can be in the form of Ethernet,Token-ring,
ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables
its users to expand their Local Area Networks. For example, MAN can help
an organization to connect all of its offices in a city.
Computer - Networking
TEACHER:MAHEEN AQEEL
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works
in between Local Area Network and Wide Area Network. MAN provides
uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks
provide connectivity to MANs and LANs. Since they are equipped with very
high speed backbone, WANs use very expensive network equipment.
Computer - Networking
TEACHER:MAHEEN AQEEL
WAN may use advanced technologies such as Asynchronous Transfer Mode
(ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may
be managed by multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet.The internet hugely connects
all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of
address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of
information worldwide. It uses WWW, FTP, email services, audio and video
streaming etc. At huge level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect
various continents, fibers are laid under sea known to us as submarine
communication cable.
Internet is widely deployed on World Wide Web services using HTML linked
pages and is accessible by client software known as Web Browsers. When a
user requests a page using some web browser located on some Web Server
Computer - Networking
TEACHER:MAHEEN AQEEL
anywhere in the world, the Web Server responds with the proper HTML
page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life.
Some of them are:
 Web sites
 E-mail
 Instant Messaging
 Blogging
 Social Media
 Marketing
 Networking
 Resource Sharing
 Audio and Video Streaming
DCN - Computer Network Toplogies
A Network Topology is the arrangement with which computer systems or
network devices are connected to each other. Topologies may define both
physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer,
switches or routers, servers connected back to back using a single piece of
cable. Often, the receiving end of one host is connected to sending end of
the other and vice-versa.
Computer - Networking
TEACHER:MAHEEN AQEEL
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network
and see each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or
cable.Bus topology may have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses CSMA/CD technology or
recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
Computer - Networking
TEACHER:MAHEEN AQEEL
Star Topology
All hosts in Star topology are connected to a central device, known as hub
device, using a point-to-point connection. That is, there exists a point to
point connection between hosts and hub. The hub device can be any of the
following:
 Layer-1 device such as hub or repeater
 Layer-2 device such as switch or bridge
 Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts fails. Every communication
between hosts, takes place through only the hub.Star topology is not
expensive as to connect one more host, only one cable is required and
configuration is simple.
Computer - Networking
TEACHER:MAHEEN AQEEL
Ring Topology
In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure. When one host tries to
communicate or send message to a host which is not adjacent to it, the
data travels through all intermediate hosts. To connect one more host in
the existing structure, the administrator may need only one more extra
cable.
Failure of any host results in failure of the whole ring.Thus, every
connection in the ring is a point of failure. There are methods which employ
one more backup ring.
Computer - Networking
TEACHER:MAHEEN AQEEL
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This
topology has hosts in point-to-point connection with every other host or
may also have hosts which are in point-to-point connection to few hosts
only.
Hosts in Mesh topology also work as relay for other hosts which do not have
direct point-to-point links. Mesh technology comes into two types:
 Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides
the most reliable network structure among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
Computer - Networking
TEACHER:MAHEEN AQEEL
Tree Topology
Also known as Hierarchical Topology, this is the most common form of
network topology in use presently.This topology imitates as extended Star
topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached. The middle
layer is known as distribution layer, which works as mediator between
upper layer and lower layer. The highest layer is known as core layer, and
is central point of the network, i.e. root of the tree from which all nodes
fork.
All neighboring hosts have point-to-point connection between them.Similar
to the Bus topology, if the root goes down, then the entire network suffers
even.though it is not the single point of failure. Every connection serves as
point of failure, failing of which divides the network into unreachable
segment.
Computer - Networking
TEACHER:MAHEEN AQEEL
Hybrid Topology
A network structure whose design contains more than one topology is said
to be hybrid topology. Hybrid topology inherits merits and demerits of all
the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining
topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies. Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks. Internet is
the best example of largest Hybrid topology
Computer - Networking
TEACHER:MAHEEN AQEEL
DCN – Overview
A system of interconnected computers and computerized peripherals such
as printers is called computer network. This interconnection among
computers facilitates information sharing among them. Computers may
connect to each other by either wired or wireless media.
Classification of Computer Networks
Computer networks are classified based on various factors.They includes:
 Geographical span
 Inter-connectivity
 Administration
 Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
 It may be spanned across your table, among Bluetooth enabled devices,.
Ranging not more than few meters.
 It may be spanned across a whole building, including intermediate devices to
connect all floors.
 It may be spanned across a whole city.
 It may be spanned across multiple cities or provinces.
 It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in
some fashion. By connectedness we mean either logically , physically , or
both ways.
 Every single device can be connected to every other device on network, making
the network mesh.
Computer - Networking
TEACHER:MAHEEN AQEEL
 All devices can be connected to a single medium but geographically
disconnected, created bus like structure.
 Each device is connected to its left and right peers only, creating linear structure.
 All devices connected together with a single device, creating star like structure.
 All devices connected arbitrarily using all previous ways to connect each other,
resulting in a hybrid structure.
Administration
From an administrator’s point of view, a network can be private network
which belongs a single autonomous system and cannot be accessed outside
its physical or logical domain.A network can be public which is accessed by
all.
Network Architecture
Computer networks can be discriminated into various types such as Client-
Server,peer-to-peer or hybrid, depending upon its architecture.
 There can be one or more systems acting as Server. Other being Client, requests
the Server to serve requests.Server takes and processes request on behalf of
Clients.
 Two systems can be connected Point-to-Point, or in back-to-back fashion. They
both reside at the same level and called peers.
 There can be hybrid network which involves network architecture of both the
above types.
Network Applications
Computer systems and peripherals are connected to form a network.They
provide numerou advantages:
 Resource sharing such as printers and storage devices
 Exchange of information by means of e-Mails and FTP
 Information sharing by using Web or Internet
 Interaction with other users using dynamic web pages
 IP phones
Computer - Networking
TEACHER:MAHEEN AQEEL
 Video conferences
 Parallel computing
 Instant messaging

More Related Content

What's hot

World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An Introduction
Sidrah Noor
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
actanimation
 
ternet Services and how to use library filed
ternet Services and how to use library filedternet Services and how to use library filed
ternet Services and how to use library filed
shanika kalpani
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
CBAKhan
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
kieshore
 
world wide web
world wide webworld wide web
world wide web
Tushar Jain
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
Rashmi Kaul
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)
Amit Nirala
 
Communication & network
Communication & networkCommunication & network
Communication & network
Dhani Ahmad
 
Our School Network
Our School NetworkOur School Network
Our School Network
kdbrennaman
 
Discovering Computers: Chapter 04
Discovering Computers: Chapter 04Discovering Computers: Chapter 04
Discovering Computers: Chapter 04
Anna Stirling
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
SindhuVelmukull
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologiesraniseetha
 
World wide web (WWW)
World wide web (WWW)World wide web (WWW)
World wide web (WWW)
Mishuk Hossan
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
Ra'Fat Al-Msie'deen
 
Operating system
Operating systemOperating system
Operating system
himabindukursam
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
ahnarokz
 
Internet
InternetInternet
Internet
Sonika koul
 

What's hot (20)

World wide web An Introduction
World wide web An IntroductionWorld wide web An Introduction
World wide web An Introduction
 
Internet Technology
Internet TechnologyInternet Technology
Internet Technology
 
ternet Services and how to use library filed
ternet Services and how to use library filedternet Services and how to use library filed
ternet Services and how to use library filed
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
Introduction to information technology lecture 1
Introduction to information technology   lecture 1Introduction to information technology   lecture 1
Introduction to information technology lecture 1
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
world wide web
world wide webworld wide web
world wide web
 
How the-internet-works
How the-internet-worksHow the-internet-works
How the-internet-works
 
What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)What is Server? (Web Server vs Application Server)
What is Server? (Web Server vs Application Server)
 
Communication & network
Communication & networkCommunication & network
Communication & network
 
Our School Network
Our School NetworkOur School Network
Our School Network
 
Discovering Computers: Chapter 04
Discovering Computers: Chapter 04Discovering Computers: Chapter 04
Discovering Computers: Chapter 04
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Internet terminologies
Internet terminologiesInternet terminologies
Internet terminologies
 
World wide web (WWW)
World wide web (WWW)World wide web (WWW)
World wide web (WWW)
 
Introduction to Information Technology
Introduction to Information TechnologyIntroduction to Information Technology
Introduction to Information Technology
 
Operating system
Operating systemOperating system
Operating system
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Internet
InternetInternet
Internet
 

Similar to Data Communication & Computer Network

Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
RANVIJAY GAUR
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
Maulen Bale
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
Susan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Computer network
Computer networkComputer network
Computer network
Md Saylab
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
JafarHussain48
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
raufkhalid104
 
Data Communications and Computer Networks
Data Communications and Computer NetworksData Communications and Computer Networks
Data Communications and Computer Networks
MarwinJohnBCorpuz
 
Networking
NetworkingNetworking
Networking
Joseph Zacharia
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
jessandy
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
Ashifimrankhan1
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
HonKencyTress
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
nutanm610
 
Computer networks
Computer networksComputer networks
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
cockekeshia
 
Introduction to Network
Introduction to NetworkIntroduction to Network
Introduction to Network
Fatin Afifah
 
Lecture 01 networking
Lecture 01 networkingLecture 01 networking
Lecture 01 networking
HNDE Labuduwa Galle
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 

Similar to Data Communication & Computer Network (20)

Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Computer network
Computer networkComputer network
Computer network
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
Data Communications and Computer Networks
Data Communications and Computer NetworksData Communications and Computer Networks
Data Communications and Computer Networks
 
Networking
NetworkingNetworking
Networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Book1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptxBook1 class 8.pptx of networking concepts.pptx
Book1 class 8.pptx of networking concepts.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
Introduction to Network
Introduction to NetworkIntroduction to Network
Introduction to Network
 
Lecture 01 networking
Lecture 01 networkingLecture 01 networking
Lecture 01 networking
 
Computer network
Computer networkComputer network
Computer network
 
Fg c
Fg cFg c
Fg c
 

More from Faraz Ahmed

Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpy
Faraz Ahmed
 
Number System Conversion
Number System ConversionNumber System Conversion
Number System Conversion
Faraz Ahmed
 
Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)
Faraz Ahmed
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
Faraz Ahmed
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
Faraz Ahmed
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
Faraz Ahmed
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Computer random access memory
Computer   random access memoryComputer   random access memory
Computer random access memory
Faraz Ahmed
 
Computer Output Devices
Computer   Output DevicesComputer   Output Devices
Computer Output Devices
Faraz Ahmed
 
Computer Motherboard
Computer   MotherboardComputer   Motherboard
Computer Motherboard
Faraz Ahmed
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
Faraz Ahmed
 
Computer input devices
Computer   input devicesComputer   input devices
Computer input devices
Faraz Ahmed
 
computer components
computer componentscomputer components
computer components
Faraz Ahmed
 
Artificial Intelligence
Artificial Intelligence  Artificial Intelligence
Artificial Intelligence
Faraz Ahmed
 

More from Faraz Ahmed (14)

Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpy
 
Number System Conversion
Number System ConversionNumber System Conversion
Number System Conversion
 
Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer random access memory
Computer   random access memoryComputer   random access memory
Computer random access memory
 
Computer Output Devices
Computer   Output DevicesComputer   Output Devices
Computer Output Devices
 
Computer Motherboard
Computer   MotherboardComputer   Motherboard
Computer Motherboard
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer input devices
Computer   input devicesComputer   input devices
Computer input devices
 
computer components
computer componentscomputer components
computer components
 
Artificial Intelligence
Artificial Intelligence  Artificial Intelligence
Artificial Intelligence
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 

Data Communication & Computer Network

  • 1. Computer - Networking TEACHER:MAHEEN AQEEL What is a Computer Network? A computer network is a system in which multiple computers are connected to each other to share information and resources. Characteristics of a computer network  Share Resources from one computer to another  Create files and store them in one computer, access those files from the other computer(s) connected over the network  Connect a printer, scanner, or a fax machine to one computer within the network and let other computers of the network use the machines available over network. Following is the list of hardware's required to setup a computer network.  Network Cables  Distributors  Routers  Internal Network Cards  External Network Cards
  • 2. Computer - Networking TEACHER:MAHEEN AQEEL Network Cables Network cables are used to connect computers. The most commonly used cable is Category 5 cable RJ-45. Distributors A computer can be connected to another one via a serial port but if we need to connect many computers to produce a network, this serial connection will not work. The solution is to use a central body to which other computers, printers, scanners etc. can be connected and then this body will manage or distribute network traffic.
  • 3. Computer - Networking TEACHER:MAHEEN AQEEL Router A router is a type of device which acts as the central point among computers and other devices that are part of a network. A router is equipped with holes called ports and computers and other devices are connected to a router using network cables. Now-a-days router comes in wireless modes using which computers can be connected without any physical cable. Network Card Network card is a necessary component of a computer without which a computer cannot be connected over a network. It is also known as network adapter or Network Interface Card (NIC). Most branded computers have network card pre-installed. Network cards are of two types : Internal and External Network Cards.
  • 4. Computer - Networking TEACHER:MAHEEN AQEEL INTERNAL NETWORK CARDS Motherboard has a slot for internal network card where it is to be inserted. Internal network cards are of two types in which first type uses Peripheral Component Interconnect (PCI) connection while the second type uses Industry Standard Architecture (ISA). Network cables are required to provide network access. EXTERNAL NETWORK CARDS External network cards come in two flavours : Wireless and USB based. Wireless network card need to be inserted into the motherboard but no network cable is required to connect to network
  • 5. Computer - Networking TEACHER:MAHEEN AQEEL Universal Serial Bus (USB) USB card are easy to use and connect via USB port. Computers automatically detect USB card and can install the drivers required to support the USB network card automatically. Computer - Internet and Intranet Internet It is a worldwide system which has the following characteristics:  Internet is a world-wide / global system of interconnected computer networks.  Internet uses the standard Internet Protocol (TCP/IP)  Every computer in internet is identified by a unique IP address.  IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location.  A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • 6. Computer - Networking TEACHER:MAHEEN AQEEL  For example, a DNS server will resolve a name http://www.google.com to a particular IP address to uniquely identify the computer on which this website is hosted.  Internet is accessible to every user all over the world. Intranet  Intranet is system in which multiple PCs are connected to each other.  PCs in intranet are not available to the world outside the intranet.  Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet.  Each computer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet.
  • 7. Computer - Networking TEACHER:MAHEEN AQEEL Similarities in Internet and Intranet  Intranet uses the internet protocols such as TCP/IP and FTP.  Intranet sites are accessible via web browser in similar way as websites in internet. But only members of Intranet network can access intranet hosted sites.  In Intranet, own instant messengers can be used as similar to yahoo messenger/ gtalk over the internet. Differences in Internet and Intranet  Internet is general to PCs all over the world whereas Intranet is specific to few PCs.  Internet has wider access and provides a better access to websites to large population whereas Intranet is restricted.  Internet is not as safe as Intranet as Intranet can be safely privatized as per the need.
  • 8. Computer - Networking TEACHER:MAHEEN AQEEL Data Communication & Computer Network Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet. DCN - Computer Network Types Generally, networks are distinguished based on their geographical span. A network can be as small as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole geographical world, Personal Area Network A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes.
  • 9. Computer - Networking TEACHER:MAHEEN AQEEL For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices connected together in a master-slave fashion. Local Area Network A computer network spanned inside a building and operated under single administrative system is generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools, colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as 16 million. LAN provides a useful way of sharing the resources between end users.The resources such as printers, file servers, scanners, and internet are easily sharable among computers.
  • 10. Computer - Networking TEACHER:MAHEEN AQEEL LANs are composed of inexpensive networking and routing equipment. It may contains local servers serving file storage and other locally shared applications. It mostly operates on private IP addresses and does not involve heavy routing. LAN works under its own local domain and controlled centrally. LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. LAN can be wired,wireless, or in both forms at once. Metropolitan Area Network The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
  • 11. Computer - Networking TEACHER:MAHEEN AQEEL Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet. Wide Area Network As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across provinces and even a whole country. Generally, telecommunication networks are Wide Area Network. These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed backbone, WANs use very expensive network equipment.
  • 12. Computer - Networking TEACHER:MAHEEN AQEEL WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple administration. Internetwork A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server model. Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by client software known as Web Browsers. When a user requests a page using some web browser located on some Web Server
  • 13. Computer - Networking TEACHER:MAHEEN AQEEL anywhere in the world, the Web Server responds with the proper HTML page. The communication delay is very low. Internet is serving many proposes and is involved in many aspects of life. Some of them are:  Web sites  E-mail  Instant Messaging  Blogging  Social Media  Marketing  Networking  Resource Sharing  Audio and Video Streaming DCN - Computer Network Toplogies A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network. Point-to-Point Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa.
  • 14. Computer - Networking TEACHER:MAHEEN AQEEL If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly. Bus Topology In case of Bus topology, all devices share single communication line or cable.Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning. Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line.
  • 15. Computer - Networking TEACHER:MAHEEN AQEEL Star Topology All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point connection. That is, there exists a point to point connection between hosts and hub. The hub device can be any of the following:  Layer-1 device such as hub or repeater  Layer-2 device such as switch or bridge  Layer-3 device such as router or gateway As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place through only the hub.Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple.
  • 16. Computer - Networking TEACHER:MAHEEN AQEEL Ring Topology In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring.
  • 17. Computer - Networking TEACHER:MAHEEN AQEEL Mesh Topology In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. Mesh technology comes into two types:  Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies.  Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.
  • 18. Computer - Networking TEACHER:MAHEEN AQEEL Tree Topology Also known as Hierarchical Topology, this is the most common form of network topology in use presently.This topology imitates as extended Star topology and inherits properties of bus topology. This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. The lowermost is access-layer where computers are attached. The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. All neighboring hosts have point-to-point connection between them.Similar to the Bus topology, if the root goes down, then the entire network suffers even.though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment.
  • 19. Computer - Networking TEACHER:MAHEEN AQEEL Hybrid Topology A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. The above picture represents an arbitrarily hybrid topology. The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology
  • 20. Computer - Networking TEACHER:MAHEEN AQEEL DCN – Overview A system of interconnected computers and computerized peripherals such as printers is called computer network. This interconnection among computers facilitates information sharing among them. Computers may connect to each other by either wired or wireless media. Classification of Computer Networks Computer networks are classified based on various factors.They includes:  Geographical span  Inter-connectivity  Administration  Architecture Geographical Span Geographically a network can be seen in one of the following categories:  It may be spanned across your table, among Bluetooth enabled devices,. Ranging not more than few meters.  It may be spanned across a whole building, including intermediate devices to connect all floors.  It may be spanned across a whole city.  It may be spanned across multiple cities or provinces.  It may be one network covering whole world. Inter-Connectivity Components of a network can be connected to each other differently in some fashion. By connectedness we mean either logically , physically , or both ways.  Every single device can be connected to every other device on network, making the network mesh.
  • 21. Computer - Networking TEACHER:MAHEEN AQEEL  All devices can be connected to a single medium but geographically disconnected, created bus like structure.  Each device is connected to its left and right peers only, creating linear structure.  All devices connected together with a single device, creating star like structure.  All devices connected arbitrarily using all previous ways to connect each other, resulting in a hybrid structure. Administration From an administrator’s point of view, a network can be private network which belongs a single autonomous system and cannot be accessed outside its physical or logical domain.A network can be public which is accessed by all. Network Architecture Computer networks can be discriminated into various types such as Client- Server,peer-to-peer or hybrid, depending upon its architecture.  There can be one or more systems acting as Server. Other being Client, requests the Server to serve requests.Server takes and processes request on behalf of Clients.  Two systems can be connected Point-to-Point, or in back-to-back fashion. They both reside at the same level and called peers.  There can be hybrid network which involves network architecture of both the above types. Network Applications Computer systems and peripherals are connected to form a network.They provide numerou advantages:  Resource sharing such as printers and storage devices  Exchange of information by means of e-Mails and FTP  Information sharing by using Web or Internet  Interaction with other users using dynamic web pages  IP phones
  • 22. Computer - Networking TEACHER:MAHEEN AQEEL  Video conferences  Parallel computing  Instant messaging