SlideShare a Scribd company logo
1 of 58
1
Introduction to Computer
Lecture 7
Computer Networks
2
Today’s Goals:
(Computer Networks)
• We will become able to appreciate the role of
networks in computing
• We will look at several different types of
networks
• We will familiarize ourselves with networking
topologies and protocols
3
All of you have used
computer networks.
What is a
computer network?
4
Computer Network
Multiple computers that are
connected together to share
information and other resources
5
Examples of Computer Network Usage
• I can send an eMail message to a remote
computer using the SMTP protocol
• I can browse documents residing on a remote
computer using the HTTP protocol
• I can download or upload files to a remote
computer using the FTP protocol
• I can run a program on a remote computer
using the TELNET protocol
6
Computer
C
Computer
D
Computer
E
Computer
A
Computer
B
Hub
Example of
a Computer
Network
7
Components of Conventional Computer Networks
1. Computers
2. Network Interface Cards (NIC)
– I/O device that plugs into the computer
– Enables it to communicate over a network
3. Hub
– The network traffic controller
8
Components of Conventional Computer Networks
4. Cables
– Are either electrical or optical
– Not required at all for wireless networks
5. Protocol
– Rules governing communications over the
network
In computing, a protocol or communication protocol is a set of rules in which
computers communicate with each other. The protocol says what part of the
conversation comes at which time. It also says how to end the communication. ...
Simple Mail Transfer Protocol (SMTP), is used for transferring e-mail between
computers.
9
How Does a Conventional Network Work?
1. Suppose computer A wants to send a
message to D
2. Computer A sends the message to its NIC
3. The NIC translates the message into electrical
pulses suitable for the computer network in
use & transmits it to the hub through the cable
10
How Does a Conventional Network Work?
4. The hub receives them and forwards them to
all computers connected to the it
5. The NICs of all computers connected to the
hub receive the forwarded electrical pulses
6. The NIC of computer D decides that the
message is for it, & translates the pulses back
to a form suitable for the computer
11
Hub (1)
• A device that is used to connect several
computers to form a network
• A hub has several ports. The number generally
is 8, 12, 16, 24, 32, or 48
12
Hub (2)
• Each computer in a network is connected to
one of those ports through a cable
• A computer wanting to send a message to one
of the others in the network sends a message
to the hub, which, in turn, broadcasts the
message to all others connected to it
13
Packet (1)
• The smallest unit of data transmitted over a
computer network
• A message to be transferred over the network is
broken up into small packets by the sending
computer
• Each packet contains the following info:
– Sender's address
– Destination address
– Data
– Error-recovery info
14
Packet (2)
• All packets travel independently
• When all packets are received by the
destination computer, it reassembles them to
form the original message
15
Types of Computer Networks
according to the network access policy
• Private
• Public
16
Private Networks (1)
• Organizations having many computers usually
connect them in the form of private networks
• Access to these network is restricted to
authorized computers only
17
Private Networks (2)
• This allows computers from within the
organization to exchange info, but keeps the
info private and protected from outsiders
• All equipment on a private network is generally
for the exclusive use of that organization
18
Public Networks
• All networks that are not private, are … public
• Example: Internet
• Communication equipment used in these
networks is generally being used by users
belonging to several (possibly thousands of)
organizations as well as those belonging to no
organization
19
VPN: Virtual Private Network (1)
• From the user’s point-of-view, a VPN looks like
a secure, private network
• VPNs use public telecom infrastructure,
maintaining privacy through security procedures
20
VPN: Virtual Private Network (2)
• VPNs provide secure network connections for
distance computers without using dedicated,
private channels to supply the connection
• Key benefit of VPNs over conventional PNs:
Lower cost
21
Types of Computer Networks
according to the distance between nodes
• LAN: Local Area Network)
• WAN: Wide Area Network)
22
LAN
• A network of computers located in the same
building or a handful of nearby buildings
• Examples:
– Computer network at your Organization
– Computer network of a University campus
23
WAN
• A network in which computers are separated by
great distances, typically across cities or even
continents
• May consist of several interconnected LANs
• Example:
– The network connecting the ATM of a bank located
in various cities
– Internet
24
Connecting LANs to other Networks
Special-purpose devices are used to link
LANs to other networks
They may belong to one of the following
categories:
– Routers
– Bridges
– Gateways
– Modems
25
Router
• A special-purpose device that directs data traffic
when several paths are available
• A router examines the destination info in each
arriving packet and then routes it through the
most efficient path available
• The router either delivers the packet to the
destination computer across a local network or
forwards the packet to another router that is
closer to the final destination
26
Bridge
• Used to form a connection between two
separate, but similar networks
• In a way, it creates an extended LAN by
passing information between two or more LANs
27
Gateway
• A special-purpose device that connects and
translates between networks that use different
communications protocols
• LAN’s may use a gateway (or router) to connect
to the Internet
28
Modem (1)
• I/O device used for connecting two
computers over telephone lines
• modem = modulator + demodulator
29
Modem (2)
• Modulator converts computer messages to
electrical pulses that are suitable for
transmission over the telephone lines
• Demodulator converts electrical pulses
received over telephone lines into messages
that are comprehensible for computers
30
Network Topologies
• The pattern in which computers are connected
to form a network
• Popular patterns:
– Point-to-point
– Star
– Bus
– Ring
• Networks are also formed by combining 2 or
more of these 4 basic patterns
31
P2P
Computer
A
Computer
B
32
P2P
• Inexpensive
• Limited connectivity
• Quite often used for connecting two LANs to
form a WAN
33
Star
Computer
A
Computer
D
Computer
C
Computer
B
Server
34
Star (1)
• A computer sends the address of the intended
receiver and the data to the server
• The server then sends the message to the
intended receiver
• This topology allows multiple messages to be
sent simultaneously
35
Star (2)
• Costly, because it uses an additional computer
to direct the data
• Costly, because each node is individually wired
to the hub
• If the server goes down, so does the network
• If any of the nodes goes down, the rest of the
network is not affected
36
Bus
Computer
A
Computer
C
Computer
D
Computer
B
Bus: A high
speed cable
37
Bus (1)
• No server is required
• One computer sends data to another by
broadcasting the address of the receiver and
the data over the bus
• All the computers in the network look at the
address simultaneously, and the intended
recipient accepts the data
38
Bus (2)
• A bus network, unlike ring or star networks,
allows data to be sent directly from one
computer to another
• However, only one computer at a time can
transmit data. The others must wait to until the
bus gets idle
• If any of the nodes goes down, the rest of the
network is not affected
39
Ring
Computer
A
Computer
D
Computer
C
Computer
B
40
Ring (1)
• No server is required
• A computer sends the message to its neighbor.
The neighbor examines the message to
determine if it is the intended recipient
• If the data are not intended for that particular
neighbor, it passes the message to the next
computer in the ring
41
Ring (2)
• This process is repeated until the data arrive at
their intended recipient
• This topology allows multiple messages to be
carried, simultaneously
• Data transmission is slow since each message
is checked by each computer
42
Ring (3)
• New nodes are difficult to add
• Messages propagate in one direction only
• The network fails if a single node fails
43
Combination
Computer
B
Computer
A
Computer
C
Hub
Computer
E
Computer
D
Computer
F
Hub
44
Networking Protocols
• Networks use protocols, or rules, to exchange
info through shared channels
• Protocols prevent collisions of packets caused
by simultaneous transmission between two or
more computers
• Several protocols are available for various
types of networks. Here we discuss two that
are popular for LANs: Ethernet; Token Ring
45
Ethernet Protocol
• A computer using this protocol checks if a
shared connection is in use before transmitting
a message
• If not, the computer transmits data
• Two computers may sense an idle connection
and may send packets simultaneously. To
account for such situations, transmitting
computers continue to monitor the connection
and re-transmit if a packet collision occurs
46
Token Ring Protocol
• This protocol passes a special message called
a token through the network
• A computer that receives the token is given
permission to send a packet of information
• If the computer has no packet to send, it passes
the token to the next computer
47
Computer Networks
=
Computers
+
Communications
48
Types of Communication Channels
1. Wire
2. Wireless
A key characteristic of these channels is bandwidth
49
Bandwidth
• Capacity of a communication channel for
carrying data
• Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s
• Optical fiber channels have the highest (1 Tb/s)
• Telephone lines the lowest (56 kb/s)
50
Types of Communication Channels
Wire
–Copper
• Twisted-pair
• Coaxial cable
–Optical fiber
Wireless
–Line-of-sight
• Microwave
• Optical
–Non-line-of-sight
• Satellite
• Radio
• Cellular
51
Wireless (Radio) LANs Are Becoming Popular
Key benefits:
– Set-up time
– Set-up cost
– Maintenance cost
– Cost Key challenges:
– Security & privacy
– Quality of service
– Cost
52
Network Security (1)
• Keeping an eye on the security of private
networks (e.g. LANs) is relatively easy
• However, their connections to other networks
(e.g. the Internet) pose a security risk because
the one has no control over users on those
networks
53
Network Security (2)
• Applications transferred from the Internet to the
LAN may contain computer viruses
• External, unauthorized users may gain access
to sensitive data
• A special type of gateway - a firewall – can
keep external users from accessing resources
on the LAN while letting LAN users access the
external info
54
Firewall
• A system that guards a private network,
enforcing an access/deny policy to all traffic
going to and coming from the Internet
• It keeps an eye on all the packets that go in and
out of the private network and blocks them or
allows them to continue to their destination
according to the policy
55
Private
Network
Internet
Firewall
56
Firewall Policy: Example
One can configure a firewall to allow only
eMail to enter the private network, thus
shielding it from any malicious attacks
except for those via eMail
57
In Today’s Lecture
• We looked at the role of networks in
computing
• We looked at several different types of
networks
• We familiarized ourselves with networking
topologies and protocols
58
Next Lecture:
Introduction to the Internet
• To become able to appreciate the role of the
Internet in today’s computing
• To become familiar with the history and
evolution of the Internet

More Related Content

Similar to Explaination of Computer Network start to end

Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7samina khan
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic conceptsMd Irfan Ansari
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Gaurav Goyal
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receivingctedds
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standardsbhavanatmithun
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standardsMidhun Menon
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 
Networking_and_Data_communication.pptx
Networking_and_Data_communication.pptxNetworking_and_Data_communication.pptx
Networking_and_Data_communication.pptxUniversity of Lucknow
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)welcometofacebook
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtapVikas Jagtap
 

Similar to Explaination of Computer Network start to end (20)

Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Network basic
Network basic Network basic
Network basic
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Computer networks grade 7
Computer networks grade 7Computer networks grade 7
Computer networks grade 7
 
Computer network and email basic concepts
Computer network and email basic conceptsComputer network and email basic concepts
Computer network and email basic concepts
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01Networkprotocolstructurescope 130719081246-phpapp01
Networkprotocolstructurescope 130719081246-phpapp01
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
12 ipt 0303 transmitting and receiving
12 ipt 0303   transmitting and receiving12 ipt 0303   transmitting and receiving
12 ipt 0303 transmitting and receiving
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
computernetworking.pdf
computernetworking.pdfcomputernetworking.pdf
computernetworking.pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Networking_and_Data_communication.pptx
Networking_and_Data_communication.pptxNetworking_and_Data_communication.pptx
Networking_and_Data_communication.pptx
 
Ch 1 network
Ch 1  networkCh 1  network
Ch 1 network
 
Internetworking devices(networking)
Internetworking devices(networking)Internetworking devices(networking)
Internetworking devices(networking)
 
Introduction to networking by vikas jagtap
 Introduction to networking by vikas jagtap Introduction to networking by vikas jagtap
Introduction to networking by vikas jagtap
 

Recently uploaded

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 

Recently uploaded (20)

Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Halmar dropshipping via API with DroFx
Halmar  dropshipping  via API with DroFxHalmar  dropshipping  via API with DroFx
Halmar dropshipping via API with DroFx
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
VIP Call Girls Service Charbagh { Lucknow Call Girls Service 9548273370 } Boo...
 

Explaination of Computer Network start to end

  • 2. 2 Today’s Goals: (Computer Networks) • We will become able to appreciate the role of networks in computing • We will look at several different types of networks • We will familiarize ourselves with networking topologies and protocols
  • 3. 3 All of you have used computer networks. What is a computer network?
  • 4. 4 Computer Network Multiple computers that are connected together to share information and other resources
  • 5. 5 Examples of Computer Network Usage • I can send an eMail message to a remote computer using the SMTP protocol • I can browse documents residing on a remote computer using the HTTP protocol • I can download or upload files to a remote computer using the FTP protocol • I can run a program on a remote computer using the TELNET protocol
  • 7. 7 Components of Conventional Computer Networks 1. Computers 2. Network Interface Cards (NIC) – I/O device that plugs into the computer – Enables it to communicate over a network 3. Hub – The network traffic controller
  • 8. 8 Components of Conventional Computer Networks 4. Cables – Are either electrical or optical – Not required at all for wireless networks 5. Protocol – Rules governing communications over the network In computing, a protocol or communication protocol is a set of rules in which computers communicate with each other. The protocol says what part of the conversation comes at which time. It also says how to end the communication. ... Simple Mail Transfer Protocol (SMTP), is used for transferring e-mail between computers.
  • 9. 9 How Does a Conventional Network Work? 1. Suppose computer A wants to send a message to D 2. Computer A sends the message to its NIC 3. The NIC translates the message into electrical pulses suitable for the computer network in use & transmits it to the hub through the cable
  • 10. 10 How Does a Conventional Network Work? 4. The hub receives them and forwards them to all computers connected to the it 5. The NICs of all computers connected to the hub receive the forwarded electrical pulses 6. The NIC of computer D decides that the message is for it, & translates the pulses back to a form suitable for the computer
  • 11. 11 Hub (1) • A device that is used to connect several computers to form a network • A hub has several ports. The number generally is 8, 12, 16, 24, 32, or 48
  • 12. 12 Hub (2) • Each computer in a network is connected to one of those ports through a cable • A computer wanting to send a message to one of the others in the network sends a message to the hub, which, in turn, broadcasts the message to all others connected to it
  • 13. 13 Packet (1) • The smallest unit of data transmitted over a computer network • A message to be transferred over the network is broken up into small packets by the sending computer • Each packet contains the following info: – Sender's address – Destination address – Data – Error-recovery info
  • 14. 14 Packet (2) • All packets travel independently • When all packets are received by the destination computer, it reassembles them to form the original message
  • 15. 15 Types of Computer Networks according to the network access policy • Private • Public
  • 16. 16 Private Networks (1) • Organizations having many computers usually connect them in the form of private networks • Access to these network is restricted to authorized computers only
  • 17. 17 Private Networks (2) • This allows computers from within the organization to exchange info, but keeps the info private and protected from outsiders • All equipment on a private network is generally for the exclusive use of that organization
  • 18. 18 Public Networks • All networks that are not private, are … public • Example: Internet • Communication equipment used in these networks is generally being used by users belonging to several (possibly thousands of) organizations as well as those belonging to no organization
  • 19. 19 VPN: Virtual Private Network (1) • From the user’s point-of-view, a VPN looks like a secure, private network • VPNs use public telecom infrastructure, maintaining privacy through security procedures
  • 20. 20 VPN: Virtual Private Network (2) • VPNs provide secure network connections for distance computers without using dedicated, private channels to supply the connection • Key benefit of VPNs over conventional PNs: Lower cost
  • 21. 21 Types of Computer Networks according to the distance between nodes • LAN: Local Area Network) • WAN: Wide Area Network)
  • 22. 22 LAN • A network of computers located in the same building or a handful of nearby buildings • Examples: – Computer network at your Organization – Computer network of a University campus
  • 23. 23 WAN • A network in which computers are separated by great distances, typically across cities or even continents • May consist of several interconnected LANs • Example: – The network connecting the ATM of a bank located in various cities – Internet
  • 24. 24 Connecting LANs to other Networks Special-purpose devices are used to link LANs to other networks They may belong to one of the following categories: – Routers – Bridges – Gateways – Modems
  • 25. 25 Router • A special-purpose device that directs data traffic when several paths are available • A router examines the destination info in each arriving packet and then routes it through the most efficient path available • The router either delivers the packet to the destination computer across a local network or forwards the packet to another router that is closer to the final destination
  • 26. 26 Bridge • Used to form a connection between two separate, but similar networks • In a way, it creates an extended LAN by passing information between two or more LANs
  • 27. 27 Gateway • A special-purpose device that connects and translates between networks that use different communications protocols • LAN’s may use a gateway (or router) to connect to the Internet
  • 28. 28 Modem (1) • I/O device used for connecting two computers over telephone lines • modem = modulator + demodulator
  • 29. 29 Modem (2) • Modulator converts computer messages to electrical pulses that are suitable for transmission over the telephone lines • Demodulator converts electrical pulses received over telephone lines into messages that are comprehensible for computers
  • 30. 30 Network Topologies • The pattern in which computers are connected to form a network • Popular patterns: – Point-to-point – Star – Bus – Ring • Networks are also formed by combining 2 or more of these 4 basic patterns
  • 32. 32 P2P • Inexpensive • Limited connectivity • Quite often used for connecting two LANs to form a WAN
  • 34. 34 Star (1) • A computer sends the address of the intended receiver and the data to the server • The server then sends the message to the intended receiver • This topology allows multiple messages to be sent simultaneously
  • 35. 35 Star (2) • Costly, because it uses an additional computer to direct the data • Costly, because each node is individually wired to the hub • If the server goes down, so does the network • If any of the nodes goes down, the rest of the network is not affected
  • 37. 37 Bus (1) • No server is required • One computer sends data to another by broadcasting the address of the receiver and the data over the bus • All the computers in the network look at the address simultaneously, and the intended recipient accepts the data
  • 38. 38 Bus (2) • A bus network, unlike ring or star networks, allows data to be sent directly from one computer to another • However, only one computer at a time can transmit data. The others must wait to until the bus gets idle • If any of the nodes goes down, the rest of the network is not affected
  • 40. 40 Ring (1) • No server is required • A computer sends the message to its neighbor. The neighbor examines the message to determine if it is the intended recipient • If the data are not intended for that particular neighbor, it passes the message to the next computer in the ring
  • 41. 41 Ring (2) • This process is repeated until the data arrive at their intended recipient • This topology allows multiple messages to be carried, simultaneously • Data transmission is slow since each message is checked by each computer
  • 42. 42 Ring (3) • New nodes are difficult to add • Messages propagate in one direction only • The network fails if a single node fails
  • 44. 44 Networking Protocols • Networks use protocols, or rules, to exchange info through shared channels • Protocols prevent collisions of packets caused by simultaneous transmission between two or more computers • Several protocols are available for various types of networks. Here we discuss two that are popular for LANs: Ethernet; Token Ring
  • 45. 45 Ethernet Protocol • A computer using this protocol checks if a shared connection is in use before transmitting a message • If not, the computer transmits data • Two computers may sense an idle connection and may send packets simultaneously. To account for such situations, transmitting computers continue to monitor the connection and re-transmit if a packet collision occurs
  • 46. 46 Token Ring Protocol • This protocol passes a special message called a token through the network • A computer that receives the token is given permission to send a packet of information • If the computer has no packet to send, it passes the token to the next computer
  • 48. 48 Types of Communication Channels 1. Wire 2. Wireless A key characteristic of these channels is bandwidth
  • 49. 49 Bandwidth • Capacity of a communication channel for carrying data • Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s • Optical fiber channels have the highest (1 Tb/s) • Telephone lines the lowest (56 kb/s)
  • 50. 50 Types of Communication Channels Wire –Copper • Twisted-pair • Coaxial cable –Optical fiber Wireless –Line-of-sight • Microwave • Optical –Non-line-of-sight • Satellite • Radio • Cellular
  • 51. 51 Wireless (Radio) LANs Are Becoming Popular Key benefits: – Set-up time – Set-up cost – Maintenance cost – Cost Key challenges: – Security & privacy – Quality of service – Cost
  • 52. 52 Network Security (1) • Keeping an eye on the security of private networks (e.g. LANs) is relatively easy • However, their connections to other networks (e.g. the Internet) pose a security risk because the one has no control over users on those networks
  • 53. 53 Network Security (2) • Applications transferred from the Internet to the LAN may contain computer viruses • External, unauthorized users may gain access to sensitive data • A special type of gateway - a firewall – can keep external users from accessing resources on the LAN while letting LAN users access the external info
  • 54. 54 Firewall • A system that guards a private network, enforcing an access/deny policy to all traffic going to and coming from the Internet • It keeps an eye on all the packets that go in and out of the private network and blocks them or allows them to continue to their destination according to the policy
  • 56. 56 Firewall Policy: Example One can configure a firewall to allow only eMail to enter the private network, thus shielding it from any malicious attacks except for those via eMail
  • 57. 57 In Today’s Lecture • We looked at the role of networks in computing • We looked at several different types of networks • We familiarized ourselves with networking topologies and protocols
  • 58. 58 Next Lecture: Introduction to the Internet • To become able to appreciate the role of the Internet in today’s computing • To become familiar with the history and evolution of the Internet