SlideShare a Scribd company logo
1 of 17
HOW
NETWORKS
TIE
COMPUTERS
TOGETHER
Chapter 17
TYPE OF
NETWORK
o LAN: Local Area Network, is a
network that covers a small
geographical area
o WAN: Wide Area Network, is a
network that covers larger
geographical areas
o PAN: is a Personnel Area Network
o HAN: is a Home Area Network
o CAN: Campus Area Network
o MAN: Metropolitan Area Network
NETWORK
o Several computers using some network tools with a small
geographical area.
o The purpose of the network is to connect computers together,
exchange data, and provide shared access to hardware, and
software solutions. Where data are saved on the server.
o Usually Network is made of:
o Server: a computer that serves many connected
computers
o Client/Node: one of the connected computer
o Router: a device that establishes a connection
between two networks
o Modem: establish a connection between the Internet
and the network
o Data Packets
o Cable/wire
NETWORK IS MADE
OF - (CONT)
o Hub:Hubs connect networking devices
physically together. Hubs use twisted
pair cabling to connect devices. and act
as pathways and transmit the information
regardless if a data packet is destined for
the device connected or not.
o A switch:The switch does ‘filter and
forwarding’., each computer is connected
through a single line. However, the switch
is smarter about where it sends data that
comes in through one of its ports
• Router:A router is a device that routes
packets from one network to another. uses
IP addresses to figure out where to send
packets. It Connect two different network
together.
SERVERS
o Different kinds of servers
o File Server:
A specialized computer with multiple hard drives that
connect to PCs using the network (called clients or nodes)
where data are stored and retrieved by the clients.
o Clients:
Computers connected to network connected by the server.
o Internet Server:
Connect to World Wide Web (WWW).
o Print Servers:
Printers connected to everyone on the network used for
printing.
HOW COMPUTERS CONNECT TO EACH
OTHER (2)
o Network Interface
o To become part of a network, a
computer/device uses a network interface to
communicate with the local network’s
backbone: High-speed Internet or network
routes.
o Data packets passed in the network through
the backbone
o Many wires/Cables are used in the
backbone The combination of connector,
circuitry, wiring, and wave determines the
network’s bandwidth.
. HOW COMPUTERS CONNECT
TO EACH OTHER (1)
o Connection in network can be made through :
o Twisted-Pair Wiring
o The type most used to physically connect a computer to a modem or router.
o In this type of wiring, two conductors of a single circuit are twisted together for
the purposes of improving electromagnetic.
o Coaxial Cable
o Coaxial cable consists of a single copper wire, which is covered by plastic and
braided copper that shields the center wire from electrical disturbances.
o Electrical signal flows through the center conductor; like that used for cable
television.
o Fiber optic cable:
o carries 1 billion bits a second, depending on light, Hair-thin fibers
consist of two layers of pure silica glass covered with a
reflective cladding, like a tunnel lined with mirrors. Varying pulses
carry the data bouncing off the cladding
o Wireless:
o most nodes on modern networks connect to the switch or router
via Wi-Fi radio signals
o infrared light
TYPE OF NETWORK AND NETWORK
ARCHITECTURE
o Star Configurations: this is the most common configuration of
computers for a Local Area Network (LAN) in which all nodes are
individually connected to a central connection point, like a router or
a switch.
o Network has two types of relations
o Peer to Peer network where each PC have equal relation or a
peer-to-peer to other devices. This network exists at home or
in small offices with less than 10 employees.
o Client/server network: where there exists a server and
client and the server is in control and responds to the
client’s request
HOW DATA TRAVELS BETWEEN
COMPUTERS(1)
• Analogue Data, use carrier wave or carrier signal with
amplitude and frequency. It is a regular or constant waveform.
Whereas the Information wave is all the time irregular.
• Digital data is the most common way for transferring data
using a data packets.
• IP address: Internet protocol addresses is an identifier for a
computer on a TCP/IP network protocol route message
• TCP/IP : transmission control protocol: a collection of methods
to connect servers on the network and to transfer data to a
specific IP address. It is a universal standard
HOW WI-FI MAKES INTERNET
PORTABLE
o All Wi-Fi networks use access point (AP):
a network node connected directly to a
wired local area network or to the Internet.
o Wireless nodes, called stations, each
have a transmitter/ receiver
o When a device connects to the network,
it broadcasts a probe request identifying
itself and connect within range.
o Connection can be point to point or
extensions points.
HOW DATA TRAVELS BETWEEN
COMPUTERS(2)
How Digital Data Move in Packets?
The organization of data packets varies to match the type of data they contain, and they may be called frames, segments, or blocks. And
data packets include:
• Preamble—Synchronizes the network nodes
• Destination Address—A single PC or all PCs on a network, IP address
• Source Address—The address of the computer from which the packet originated, IP Address
• Data Type—Defines the format used for the data
• Data—The actual data
• CRC—Cyclical Redundancy Check, which is used to spot transmission errors or missing errors : it is an
algorithm that are calculated and compared at the data delivery
4. HOW BLUETOOTH KEEPS DEVICES
CONNECTED
• Bluetooth, named for the
Danish King Harald
Bluetooth, a Scandinavian, is
a standard protocol for
unifying wireless voice and
data communications among
different devices.
• It connects all the equipment
through one universal short-
range radio link.
• It is incorporated in a radio
module, a microchip that can send
both voice and data signals for
about 30 feet/ 10 meters.
4. HOW BLUETOOTH KEEPS DEVICES
CONNECTED
o Bluetooth protocol has a link manager
(LM) software.
o The LM software identifies other
Bluetooth devices, creates links with
them for voice or data, and sends and
receives data.
o After a link is established, Bluetooth
sends data in packets or
correction in case a packet is
dropped.
BLUETOOTH
MODES
Standby, or sniff, mode: An unconnected unit periodically
listens for messages every 1.28 seconds.
Page mode: A Bluetooth device makes itself a master by
initiating a link to another device, the slave
Inquiry mode: if the master doesn’t know what other devices
are available, ex: public printers the master transmits an
inquiry on the remaining hop frequencies. This causes
receiving devices to identify themselves and send specific
Park mode :A device wakes up at regular intervals to listen to
the link, synchronize with the rest of the devices,
Hold mode: When a device is turned off to save power, any
other Bluetooth device can wake it up.
4. HOW NFC LETS SMART DEVICES
MAKE CLOSE CALLS
NFC (Near Field Communications):
o Is a short-range wireless technology that allows the exchange of data between
devices.
o It only works with short distances of about four inches at the most.
o NFC uses magnetic fields to communicate.
CONT. HOW NFC LETS SMART DEVICES MAKE
CLOSE CALLS
NFC devices can be passive or active:
o A passive NFC contains information that other devices
can read and can’t receive any information other
devices may have to offer.
o Examples: the nametags that unlock doors, and authorize
elevators to stop on a particular floor.
o Active NFC devices can both send and receive
information.
They can decide if another device has the right to
read the information they have, and the ability to grant
or refuse another device to change the information
they have.
Examples:
o using smartphones to exchange business cards or
playlists.
o The data in an NFC session could be
intercepted by other devices. For that
reason NFC communications that
involve such info as a credit card or
bank account number are sent along
secure channels and encrypted.
o Users can add antivirus software to
smartphones and store sensitive data
behind a password.
Cont. How NFC Lets Smart Devices Make Close
Calls

More Related Content

Similar to How Networks Tie Computers Together-chapter 17(1).pptx

SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
Data communications and computer networks
Data communications and computer networksData communications and computer networks
Data communications and computer networksobaid-ur-rehman
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptnilesh405711
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptxSelfUse
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptrcbcrtm
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptgauravgoswami78
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.pptrakesh132809
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 

Similar to How Networks Tie Computers Together-chapter 17(1).pptx (20)

Computer networking
Computer networkingComputer networking
Computer networking
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
W 10 introduction to network
W 10 introduction to networkW 10 introduction to network
W 10 introduction to network
 
Data communications and computer networks
Data communications and computer networksData communications and computer networks
Data communications and computer networks
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
OSI LAyer.ppt
OSI LAyer.pptOSI LAyer.ppt
OSI LAyer.ppt
 
Gunn 8th- Lily.pptx
Gunn 8th- Lily.pptxGunn 8th- Lily.pptx
Gunn 8th- Lily.pptx
 
network class 4&5.pptx
network class 4&5.pptxnetwork class 4&5.pptx
network class 4&5.pptx
 
cpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.pptcpct NetworkING BASICS AND NETWORK TOOL.ppt
cpct NetworkING BASICS AND NETWORK TOOL.ppt
 
introduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).pptintroduction to computer Network-20210426203825 (1).ppt
introduction to computer Network-20210426203825 (1).ppt
 
Concepts of Networking.ppt
Concepts of Networking.pptConcepts of Networking.ppt
Concepts of Networking.ppt
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
COMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptxCOMPUTER NETWORKS.pptx
COMPUTER NETWORKS.pptx
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Note1
Note1Note1
Note1
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 

Recently uploaded

Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1DianaGray10
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityScyllaDB
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Julian Hyde
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 

Recently uploaded (20)

Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 

How Networks Tie Computers Together-chapter 17(1).pptx

  • 2. TYPE OF NETWORK o LAN: Local Area Network, is a network that covers a small geographical area o WAN: Wide Area Network, is a network that covers larger geographical areas o PAN: is a Personnel Area Network o HAN: is a Home Area Network o CAN: Campus Area Network o MAN: Metropolitan Area Network
  • 3. NETWORK o Several computers using some network tools with a small geographical area. o The purpose of the network is to connect computers together, exchange data, and provide shared access to hardware, and software solutions. Where data are saved on the server. o Usually Network is made of: o Server: a computer that serves many connected computers o Client/Node: one of the connected computer o Router: a device that establishes a connection between two networks o Modem: establish a connection between the Internet and the network o Data Packets o Cable/wire
  • 4. NETWORK IS MADE OF - (CONT) o Hub:Hubs connect networking devices physically together. Hubs use twisted pair cabling to connect devices. and act as pathways and transmit the information regardless if a data packet is destined for the device connected or not. o A switch:The switch does ‘filter and forwarding’., each computer is connected through a single line. However, the switch is smarter about where it sends data that comes in through one of its ports • Router:A router is a device that routes packets from one network to another. uses IP addresses to figure out where to send packets. It Connect two different network together.
  • 5. SERVERS o Different kinds of servers o File Server: A specialized computer with multiple hard drives that connect to PCs using the network (called clients or nodes) where data are stored and retrieved by the clients. o Clients: Computers connected to network connected by the server. o Internet Server: Connect to World Wide Web (WWW). o Print Servers: Printers connected to everyone on the network used for printing.
  • 6. HOW COMPUTERS CONNECT TO EACH OTHER (2) o Network Interface o To become part of a network, a computer/device uses a network interface to communicate with the local network’s backbone: High-speed Internet or network routes. o Data packets passed in the network through the backbone o Many wires/Cables are used in the backbone The combination of connector, circuitry, wiring, and wave determines the network’s bandwidth.
  • 7. . HOW COMPUTERS CONNECT TO EACH OTHER (1) o Connection in network can be made through : o Twisted-Pair Wiring o The type most used to physically connect a computer to a modem or router. o In this type of wiring, two conductors of a single circuit are twisted together for the purposes of improving electromagnetic. o Coaxial Cable o Coaxial cable consists of a single copper wire, which is covered by plastic and braided copper that shields the center wire from electrical disturbances. o Electrical signal flows through the center conductor; like that used for cable television. o Fiber optic cable: o carries 1 billion bits a second, depending on light, Hair-thin fibers consist of two layers of pure silica glass covered with a reflective cladding, like a tunnel lined with mirrors. Varying pulses carry the data bouncing off the cladding o Wireless: o most nodes on modern networks connect to the switch or router via Wi-Fi radio signals o infrared light
  • 8. TYPE OF NETWORK AND NETWORK ARCHITECTURE o Star Configurations: this is the most common configuration of computers for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a router or a switch. o Network has two types of relations o Peer to Peer network where each PC have equal relation or a peer-to-peer to other devices. This network exists at home or in small offices with less than 10 employees. o Client/server network: where there exists a server and client and the server is in control and responds to the client’s request
  • 9. HOW DATA TRAVELS BETWEEN COMPUTERS(1) • Analogue Data, use carrier wave or carrier signal with amplitude and frequency. It is a regular or constant waveform. Whereas the Information wave is all the time irregular. • Digital data is the most common way for transferring data using a data packets. • IP address: Internet protocol addresses is an identifier for a computer on a TCP/IP network protocol route message • TCP/IP : transmission control protocol: a collection of methods to connect servers on the network and to transfer data to a specific IP address. It is a universal standard
  • 10. HOW WI-FI MAKES INTERNET PORTABLE o All Wi-Fi networks use access point (AP): a network node connected directly to a wired local area network or to the Internet. o Wireless nodes, called stations, each have a transmitter/ receiver o When a device connects to the network, it broadcasts a probe request identifying itself and connect within range. o Connection can be point to point or extensions points.
  • 11. HOW DATA TRAVELS BETWEEN COMPUTERS(2) How Digital Data Move in Packets? The organization of data packets varies to match the type of data they contain, and they may be called frames, segments, or blocks. And data packets include: • Preamble—Synchronizes the network nodes • Destination Address—A single PC or all PCs on a network, IP address • Source Address—The address of the computer from which the packet originated, IP Address • Data Type—Defines the format used for the data • Data—The actual data • CRC—Cyclical Redundancy Check, which is used to spot transmission errors or missing errors : it is an algorithm that are calculated and compared at the data delivery
  • 12. 4. HOW BLUETOOTH KEEPS DEVICES CONNECTED • Bluetooth, named for the Danish King Harald Bluetooth, a Scandinavian, is a standard protocol for unifying wireless voice and data communications among different devices. • It connects all the equipment through one universal short- range radio link. • It is incorporated in a radio module, a microchip that can send both voice and data signals for about 30 feet/ 10 meters.
  • 13. 4. HOW BLUETOOTH KEEPS DEVICES CONNECTED o Bluetooth protocol has a link manager (LM) software. o The LM software identifies other Bluetooth devices, creates links with them for voice or data, and sends and receives data. o After a link is established, Bluetooth sends data in packets or correction in case a packet is dropped.
  • 14. BLUETOOTH MODES Standby, or sniff, mode: An unconnected unit periodically listens for messages every 1.28 seconds. Page mode: A Bluetooth device makes itself a master by initiating a link to another device, the slave Inquiry mode: if the master doesn’t know what other devices are available, ex: public printers the master transmits an inquiry on the remaining hop frequencies. This causes receiving devices to identify themselves and send specific Park mode :A device wakes up at regular intervals to listen to the link, synchronize with the rest of the devices, Hold mode: When a device is turned off to save power, any other Bluetooth device can wake it up.
  • 15. 4. HOW NFC LETS SMART DEVICES MAKE CLOSE CALLS NFC (Near Field Communications): o Is a short-range wireless technology that allows the exchange of data between devices. o It only works with short distances of about four inches at the most. o NFC uses magnetic fields to communicate.
  • 16. CONT. HOW NFC LETS SMART DEVICES MAKE CLOSE CALLS NFC devices can be passive or active: o A passive NFC contains information that other devices can read and can’t receive any information other devices may have to offer. o Examples: the nametags that unlock doors, and authorize elevators to stop on a particular floor. o Active NFC devices can both send and receive information. They can decide if another device has the right to read the information they have, and the ability to grant or refuse another device to change the information they have. Examples: o using smartphones to exchange business cards or playlists.
  • 17. o The data in an NFC session could be intercepted by other devices. For that reason NFC communications that involve such info as a credit card or bank account number are sent along secure channels and encrypted. o Users can add antivirus software to smartphones and store sensitive data behind a password. Cont. How NFC Lets Smart Devices Make Close Calls