SlideShare a Scribd company logo
NETWORKING
DEPARTMENT OF INFORMATION SYSTEMS
COLLEGE OF COMPUTER STUDIES
XAVIER UNIVERSITY – ATENEO DE CAGAYAN
Data Communications and
Networking
What is a Network?
• Defined as two or more computing devices connected
together in such a way that they can share resources
• Resources:
• files
• folders
• printers
• disk drives
• etc.
3
What is a Network?
• A collection of computers or other hardware devices that are
connected together, either physically or logically, using special
hardware and software, to allow them to exchange information and
cooperate
4
What is Networking?
• Term that describes the process involved in designing,
implementing, upgrading, managing, and otherwise working with
networks and network technologies
5
Advantages of Networking
• Connectivity and Communication
• Data Sharing
• Hardware Sharing
• Internet Access
• Internet Access Sharing
• Data Security and Management
• Performance Enhancement and Balancing
• Entertainment
6
Disadvantages of Networking
• Cost of setup
• Management and administration costs
• Undesirable sharing
• Illegal or undesirable behavior
• Data security concerns
7
Basic Components of a Network
• Server
• core component of the network
• provides link to the resources necessary to perform any task
• Client
• requests and receives information over the network client
• depends primarily on central server for processing activities
• Circuit
• cables, ports and other devices that connect the server and the client
computers
8
Network Interface Card (NIC)
• Circuit board that fits in one of the computer’s internal expansion
slots
• Contains circuitry that handles sending, receiving, and error
checking of transmitted data
9
Key Points in Networking
• Important characteristics that influence transmission technologies
and communication protocols
• size
• shape
• Networks are classified according to area over which they extend
• Size and extension depend on number of nodes that need to
communicate, and where these nodes are in relation to each other
10
Network Classifications
• PAN (personal area
network)
• refer to the
interconnection of
personal digital
devices or consumer
electronics w/n the
range of 30ft (10m)
and without the use
of wires or cables
11
Network Classifications
• LAN (local area network)
• data communications
network the connects
personal computers within a
very limited geographical
area
• school computer labs
• home networks
12
Network Classifications
• MAN (metropolitan
area network)
• public high-speed
network capable of
voice and data
transmission within
the range of 50mi
(80km)
• ISPs
• small cable TV
companies
• local telephone
companies
13
Network Classifications
• WAN (wide area
network)
• covers large
geographical area
and usually consists
of smaller networks
• nationwide banks
• large cable TV
companies
• multi-location
superstores
• internet
14
Network Topologies
• Architectural “drawings” to show the overall physical configuration
for a given communications system
• Indicates the access methods and governs the rules that are used to
design and implement the communication system
15
Network Topologies
• Bus topology
• Single electrical circuit
to which all devices in
network are connected
16
Network Topologies
• Star topology
• individual computers are
connected to a central
device such as a hub or a
switch
17
Network Topologies
• Ring topology
• a collection of separate point-to-
point links arranged to make a
ring
• each nodes NIC has one input and
one output connection
• so each node has two links
18
Communications Model
19
Source
Transmitter Receiver
Destination
Source
System
Destination
System
Transmission
System
Communications Model
20
Personal
Computer
Modem
Broadband
Connection
Modem
Server
NETWORK TOPOLOGY CASE STUDY:
This will serve as your ACTIVITY 2.
SEARCH FOR ONE (1) CASE STUDY IN EITHER OF THE FOLLOWING
TOPOLOGY ARE PRESENT:
* BUS TOPOLOGY * STAR TOPOLOGY * RING TOPOLOGY
Take note what are the advantages and disadvantages of your chosen
topology based on your case study. Put it in Word, then save as
“<Lastname>_Activity2”
Be ready! I will call some students to present their research
Network Building Blocks
COLLEGE OF COMPUTER STUDIES
XAVIER UNIVERSITY – ATENEO DE CAGAYAN
Network Devices
• Sometimes referred to as a network appliance
• Any electronic device that broadcasts network data, boosts signals,
or routes data to its destination
Network Devices
• Node
• Each connection point on a network
• Usually contains:
• Computer
• Networked peripheral
• Network device
• Workstation
• Personal computer connected to a network
Network Devices
• Network Interface Card (NIC)
• Circuitry to connect to LAN
• Sometimes built-in in some personal computers
• Can be added to an expansion slot or USB port
• Networked peripheral
• Any device that contains network circuitry to directly connect to a network
• Examples: printers, scanners, storage devices
Network Devices
• Router
• Central
distribution point
for getting data to
its destination
Network Devices
• Hubs
• Extends a wired network by adding additional ports
Network Devices
• Switches
• Intelligently facilitates communication among multiple devices on a network
Network Devices
• Gateways
• Joins two different types of networks, such as your home network and the
Internet
Network Devices
• Bridges
• Connects two similar networks
Network Devices
• Wireless access points
• Allows wireless devices to connect to a wired network
Network Devices
• Repeaters
• Extends the range of a network by restoring signals to maximum strength
and retransmitting them
Sample LAN Setup
Network Links
• Links
• Communications channel
• Physical path or a frequency for signal transmissions
• Wired – cables
• Cat 5 or Cat 6 (max length of 100m)
• RJ45 connector
Network Links
• Bandwidth
• Transmission capacity of communications channel
• High-bandwidth (broadband) can carry more data than low-bandwidth
(narrowband)
• Digital bandwidth is measured in bits per second (bps)
• Analog bandwidth is measured in hertz (Hz)
Communications Protocol
• Protocol
• Set of rules for interacting and negotiating
• Communications protocol
• Set of rules for efficiently transmitting data from one network node to
another
• TCP/IP
• Transmission Control Protocol/Internet Protocol
• Internet data support and standards for LANs
Communications Protocol
• Aspects of network communications that communications protocol
handles
• Dividing messages into packets
• Affixing addresses to packets
• Initiating transmission
• Regulating flow of data
• Checking for transmissions errors
• Acknowledging receipt of transmitted data
Communications Protocol
• Packets
• A parcel of data that is sent across a computer network
• Contains:
• Address of sender
• Destination address
• Sequence number
• Some data
Communications Protocol
• Data are broken down into packets and reassembled in the destination
according to sequence number
Communications Protocol
• Circuit switching
• Used by some technologies like telephone system
• Dedicated private link between one telephone to another telephone for the
duration of the call
• Inefficient
Communications Protocol
• Packet switching
• Divides message into several packets that can be routed independently to
their destination
• Messages divided into equal-size packets are easier to handle than an
assortment of small, medium, large, and huge files
• Packets are shipped over the circuit on a first-come, first-served basis
Communications Protocol
Communications Protocol
Communications Protocol
• Routing of packets
• Each packet contains the address of the destination device
• Communications protocol specify the proper format of addresses
• Two commonly used addresses:
• MAC address
• IP address
Communications Protocol
• MAC address
• Media Access Control address
• Unique number assigned to a network interface card when it is
manufactured
• Used in low-level network functions and can also be employed to establish
network security
Communications Protocol
• IP address
• Internet Protocol address
• Series of numbers used to identify a network device (computers, servers,
peripherals, and devices)
• Originally used in the internet but used in LANs
• Example: 204.127.129.1
• Four groups of numbers separated by period
• Octet (eight bits in binary)
Communications Protocol
• IP address
• Assigned by ISPs or system managers
• Sometimes assigned by DHCP
• Dynamic Host Configuration Protocol
• Automatically distributes IP addresses
• Computers send a query to the network device acting as the DHCP server
• IP address is good for that session only

More Related Content

What's hot

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
Muhammad Zia
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
Michal Jarski
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
Akhila Param
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
RanjitUpadhyay4
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
Vivek Gandhi
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
Purushottam Naidu
 
Network security ppt
Network security pptNetwork security ppt
Software defined network
Software defined networkSoftware defined network
Software defined network
Deeptiman Mallick
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
Reza Pahlava
 
Information security
Information security Information security
Information security
razendar79
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Datta Dharanikota
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
DebrajKarmakar
 
Network security
Network securityNetwork security
Network security
Simranpreet Singh
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
CH Asim Zubair
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
Parth Makadiya
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 

What's hot (20)

Wireless security presentation
Wireless security presentationWireless security presentation
Wireless security presentation
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
 
Cloud computing security
Cloud computing security Cloud computing security
Cloud computing security
 
Presentation on 5G security
Presentation on 5G securityPresentation on 5G security
Presentation on 5G security
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Wi fi presentation
Wi fi presentationWi fi presentation
Wi fi presentation
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Software defined network
Software defined networkSoftware defined network
Software defined network
 
Security on Cloud Computing
Security on Cloud Computing Security on Cloud Computing
Security on Cloud Computing
 
Network security
Network securityNetwork security
Network security
 
Information security
Information security Information security
Information security
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Network security
Network securityNetwork security
Network security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 

Similar to Lesson 3 - Networking

Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
nesarahmad37
 
Basic networking
Basic networkingBasic networking
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
Samit Singh
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
Aneesh Nelavelly
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
Universidad De Manila
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
ssuser07362a
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
ADITYAKUMAR554673
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
TheMaverick5
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
FA20BCS061GHANAKAMAL
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
NETWORKS.pptx
NETWORKS.pptxNETWORKS.pptx
NETWORKS.pptx
DhineshKumarJaganath
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise NetworksVisualBee.com
 
Computer networks
Computer networksComputer networks
Computer networks
Nilesh Thadani
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
Arti Parab Academics
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
Kiran Buriro
 

Similar to Lesson 3 - Networking (20)

Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Computer networks
Computer networksComputer networks
Computer networks
 
NETWORKS.pptx
NETWORKS.pptxNETWORKS.pptx
NETWORKS.pptx
 
Fundamentals of Enterprise Networks
Fundamentals ofEnterprise NetworksFundamentals ofEnterprise Networks
Fundamentals of Enterprise Networks
 
computer network 2
computer network 2computer network 2
computer network 2
 
Computer networks
Computer networksComputer networks
Computer networks
 
COMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptxCOMPUTER APPLICATIONS Module 3.pptx
COMPUTER APPLICATIONS Module 3.pptx
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 

Recently uploaded

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Lesson 3 - Networking

  • 1. NETWORKING DEPARTMENT OF INFORMATION SYSTEMS COLLEGE OF COMPUTER STUDIES XAVIER UNIVERSITY – ATENEO DE CAGAYAN
  • 3. What is a Network? • Defined as two or more computing devices connected together in such a way that they can share resources • Resources: • files • folders • printers • disk drives • etc. 3
  • 4. What is a Network? • A collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate 4
  • 5. What is Networking? • Term that describes the process involved in designing, implementing, upgrading, managing, and otherwise working with networks and network technologies 5
  • 6. Advantages of Networking • Connectivity and Communication • Data Sharing • Hardware Sharing • Internet Access • Internet Access Sharing • Data Security and Management • Performance Enhancement and Balancing • Entertainment 6
  • 7. Disadvantages of Networking • Cost of setup • Management and administration costs • Undesirable sharing • Illegal or undesirable behavior • Data security concerns 7
  • 8. Basic Components of a Network • Server • core component of the network • provides link to the resources necessary to perform any task • Client • requests and receives information over the network client • depends primarily on central server for processing activities • Circuit • cables, ports and other devices that connect the server and the client computers 8
  • 9. Network Interface Card (NIC) • Circuit board that fits in one of the computer’s internal expansion slots • Contains circuitry that handles sending, receiving, and error checking of transmitted data 9
  • 10. Key Points in Networking • Important characteristics that influence transmission technologies and communication protocols • size • shape • Networks are classified according to area over which they extend • Size and extension depend on number of nodes that need to communicate, and where these nodes are in relation to each other 10
  • 11. Network Classifications • PAN (personal area network) • refer to the interconnection of personal digital devices or consumer electronics w/n the range of 30ft (10m) and without the use of wires or cables 11
  • 12. Network Classifications • LAN (local area network) • data communications network the connects personal computers within a very limited geographical area • school computer labs • home networks 12
  • 13. Network Classifications • MAN (metropolitan area network) • public high-speed network capable of voice and data transmission within the range of 50mi (80km) • ISPs • small cable TV companies • local telephone companies 13
  • 14. Network Classifications • WAN (wide area network) • covers large geographical area and usually consists of smaller networks • nationwide banks • large cable TV companies • multi-location superstores • internet 14
  • 15. Network Topologies • Architectural “drawings” to show the overall physical configuration for a given communications system • Indicates the access methods and governs the rules that are used to design and implement the communication system 15
  • 16. Network Topologies • Bus topology • Single electrical circuit to which all devices in network are connected 16
  • 17. Network Topologies • Star topology • individual computers are connected to a central device such as a hub or a switch 17
  • 18. Network Topologies • Ring topology • a collection of separate point-to- point links arranged to make a ring • each nodes NIC has one input and one output connection • so each node has two links 18
  • 21. NETWORK TOPOLOGY CASE STUDY: This will serve as your ACTIVITY 2. SEARCH FOR ONE (1) CASE STUDY IN EITHER OF THE FOLLOWING TOPOLOGY ARE PRESENT: * BUS TOPOLOGY * STAR TOPOLOGY * RING TOPOLOGY Take note what are the advantages and disadvantages of your chosen topology based on your case study. Put it in Word, then save as “<Lastname>_Activity2” Be ready! I will call some students to present their research
  • 22. Network Building Blocks COLLEGE OF COMPUTER STUDIES XAVIER UNIVERSITY – ATENEO DE CAGAYAN
  • 23. Network Devices • Sometimes referred to as a network appliance • Any electronic device that broadcasts network data, boosts signals, or routes data to its destination
  • 24. Network Devices • Node • Each connection point on a network • Usually contains: • Computer • Networked peripheral • Network device • Workstation • Personal computer connected to a network
  • 25. Network Devices • Network Interface Card (NIC) • Circuitry to connect to LAN • Sometimes built-in in some personal computers • Can be added to an expansion slot or USB port • Networked peripheral • Any device that contains network circuitry to directly connect to a network • Examples: printers, scanners, storage devices
  • 26. Network Devices • Router • Central distribution point for getting data to its destination
  • 27. Network Devices • Hubs • Extends a wired network by adding additional ports
  • 28. Network Devices • Switches • Intelligently facilitates communication among multiple devices on a network
  • 29. Network Devices • Gateways • Joins two different types of networks, such as your home network and the Internet
  • 30. Network Devices • Bridges • Connects two similar networks
  • 31. Network Devices • Wireless access points • Allows wireless devices to connect to a wired network
  • 32. Network Devices • Repeaters • Extends the range of a network by restoring signals to maximum strength and retransmitting them
  • 34. Network Links • Links • Communications channel • Physical path or a frequency for signal transmissions • Wired – cables • Cat 5 or Cat 6 (max length of 100m) • RJ45 connector
  • 35. Network Links • Bandwidth • Transmission capacity of communications channel • High-bandwidth (broadband) can carry more data than low-bandwidth (narrowband) • Digital bandwidth is measured in bits per second (bps) • Analog bandwidth is measured in hertz (Hz)
  • 36. Communications Protocol • Protocol • Set of rules for interacting and negotiating • Communications protocol • Set of rules for efficiently transmitting data from one network node to another • TCP/IP • Transmission Control Protocol/Internet Protocol • Internet data support and standards for LANs
  • 37. Communications Protocol • Aspects of network communications that communications protocol handles • Dividing messages into packets • Affixing addresses to packets • Initiating transmission • Regulating flow of data • Checking for transmissions errors • Acknowledging receipt of transmitted data
  • 38. Communications Protocol • Packets • A parcel of data that is sent across a computer network • Contains: • Address of sender • Destination address • Sequence number • Some data
  • 39. Communications Protocol • Data are broken down into packets and reassembled in the destination according to sequence number
  • 40. Communications Protocol • Circuit switching • Used by some technologies like telephone system • Dedicated private link between one telephone to another telephone for the duration of the call • Inefficient
  • 41. Communications Protocol • Packet switching • Divides message into several packets that can be routed independently to their destination • Messages divided into equal-size packets are easier to handle than an assortment of small, medium, large, and huge files • Packets are shipped over the circuit on a first-come, first-served basis
  • 44. Communications Protocol • Routing of packets • Each packet contains the address of the destination device • Communications protocol specify the proper format of addresses • Two commonly used addresses: • MAC address • IP address
  • 45. Communications Protocol • MAC address • Media Access Control address • Unique number assigned to a network interface card when it is manufactured • Used in low-level network functions and can also be employed to establish network security
  • 46. Communications Protocol • IP address • Internet Protocol address • Series of numbers used to identify a network device (computers, servers, peripherals, and devices) • Originally used in the internet but used in LANs • Example: 204.127.129.1 • Four groups of numbers separated by period • Octet (eight bits in binary)
  • 47. Communications Protocol • IP address • Assigned by ISPs or system managers • Sometimes assigned by DHCP • Dynamic Host Configuration Protocol • Automatically distributes IP addresses • Computers send a query to the network device acting as the DHCP server • IP address is good for that session only