0% found this document useful (0 votes)
26 views37 pages

N'importe

The document provides an overview of computer networks, detailing their definitions, advantages, types (PAN, LAN, MAN, WAN), topologies (star, bus, ring, mesh), the OSI model, and various network devices. It emphasizes the importance of communication protocols and the roles of different network components in facilitating data exchange. Additionally, it covers network media used for interconnecting nodes, including wired and wireless options.

Uploaded by

lili lilyana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views37 pages

N'importe

The document provides an overview of computer networks, detailing their definitions, advantages, types (PAN, LAN, MAN, WAN), topologies (star, bus, ring, mesh), the OSI model, and various network devices. It emphasizes the importance of communication protocols and the roles of different network components in facilitating data exchange. Additionally, it covers network media used for interconnecting nodes, including wired and wireless options.

Uploaded by

lili lilyana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Computer Networks

Basics, Concepts

© Pr. Rafik Djemili. Dept. Génie Electrique, Univ. 20 Août 1955-Skikda


Course Content
The Computer Network
 A computer network is a group of computers/devices (Nodes) that
use a set of common communication protocols over digital
interconnections for the purpose of sharing resources located on or
provided by the network nodes.
 The nodes of a computer network may include personal
computers, servers, networking hardware, or other specialised or
general-purpose hosts.
 The interconnections between nodes are formed from a broad
spectrum of telecommunication network technologies, based on
physically wired, optical, and wireless technologies.
 A communication protocol is a set of rules for exchanging
information over a network.
The Advantages/Uses of Network

 Simultaneous Access
There are moments in any business when several workers may
need to use the same data at the same time.

 Shared Peripheral Devices

 Personal Communications
 Videoconferencing
 Voice over Internet Protocol (VoIP):-VoIP transmits the sound of
voice over a computer network using the Internet Protocol (IP )
rather than sending the signal over traditional phone wires
Types of Computer Networks
Types of Computer Networks
Personal Area Network (PAN)
 Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network.
 Personal Area Network is a network arranged within an individual person,
typically within a range of 10 meters.
 Personal Area Network is used for connecting the computer devices for
personal use.
 Personal computer devices that are used to develop the personal area
network are the laptop, mobile phones, media player and play stations.
 Two subtypes of PAN
 Wired Personal Area Network
 Wireless Personal Area Network
Types of Computer Networks
Local Area Network (LAN)
 Local Area Network is a group of computers connected to each
other in a small area such as building, office.
 LAN is used for connecting two or more personal computers
through a communication medium such as twisted pair, coaxial
cable, etc.
 It is less costly as it is built with inexpensive hardware such as hubs,
network adapters, and Ethernet cables.
 The data is transferred at an extremely faster rate in Local Area
Network.
 Local Area Network provides higher security.
 Local Area Network covers an area of 1-2 Kms.
Types of Computer Networks
Metropolitan Area Network (MAN)
 A metropolitan area network is a network that covers a larger
geographic area by interconnecting a different LANs to form a
larger network.
 In MAN, various LANs are connected to each other through a
telephone exchange line.
 It has a higher range than Local Area Network(LAN).
 MAN covers an area of 10 Kms
 The most widely used protocols in MAN are RS-232, Frame Relay,
ATM, ISDN, OC-3, ADSL, etc.
 Government agencies use MAN to connect to the citizens and
private industries.
Types of Computer Networks
Wide Area Network (WAN)
 A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
 A Wide Area Network is quite bigger network than the MAN.
 A Wide Area Network is not limited to a single location, but it spans
over a large geographical area through a telephone line, fiber
optic cable or satellite links.
 The internet is one of the biggest WAN in the world.
 A Wide Area Network is widely used in the field of Business,
government, and education.
LAN Topologies
LAN Topologies
LAN Topologies
Star topology
 In a star network, every host (node, station) is connected to a
central hub. Data on a star network passes through the hub before
continuing to its destination. The hub manages and controls all functions
of the network. It also acts as a repeater for the data flow.
 Advantages:
 If one node or its connection breaks, it does not affect the other
computers nor their connections and it is the big advantage of it
 Devices can be added or removed without disturbing the network
 Works well under heavy load, appropriate for a large network.
 Disadvantages:
 Expensive due to the number and length of cables needed to wire
each host to the central hub
 The central hub is a single point of failure for the network
LAN Topologies
Bus topology
 Each node in the bus is directly connected to a common half-
duplex link called a bus. In order for nodes to share the bus, they
use a medium access control technology such as carrier-sense
multiple access(CSMA).
 Characteristics:
 Multipoint medium,
 Transmission propagates throughout medium,
 Heard by all stations (need to identify target station),
 Need to regulate transmission (To avoid collisions, to avoid
hogging),
 Terminator absorbs frames at end of medium.
 Advantages/Disadvantages:
 Easy to connect and install.
 The entire network shuts down if there is a failure in the central
connecting cable.
 Fault detection is difficult and time consuming.
LAN Topologies
Frame transmission on Bus LAN
LAN Topologies
Ring topology
 Each node connects to exactly two other nodes, forming a single
continuous pathway for signals through each node. Data travels from
node to node. Rings can be unidirectional, with all traffic travelling either
clockwise or anticlockwise around the ring, or bidirectional (SONET).
 Advantages:
 Very orderly network where every device has access to the token and
the opportunity to transmit
 Performs better than a bus topology under heavy network load
 Due to the point-to-point line configuration of devices with a device on
either side (each device is connected to its immediate neighbor), it is
quite easy to install and reconfigure since adding or removing a device
requires moving just two connections.
 Disadvantages:
 One malfunctioning workstation can create problems for the
entire network. This can be solved by using a dual ring or a switch
that closes off the break.
 Communication delay is directly proportional to number of
nodes in the network.
LAN Topologies
Frame Transmission
Ring LAN
LAN Topologies
Mesh topology
 Each host has its connections to all other hosts. Mesh topology is
implemented to provide as much protection as possible from
interruption of service. A nuclear power plant might use a mesh
topology in the networked control systems.
 Advantages:
 The use of dedicated links guarantees that each connection
can carry its data load, thus eliminating the traffic problems that
can occur when links must be shared by multiple devices.
 It is robust, if one link becomes unusable, it does not
incapacitate (affect) the entire system.
 Privacy and Security (every message sent travels along a
dedicated line; only the intended recipient sees it).
 Point-to-point links make fault identification and fault isolation
easy.
 Disadvantages:
 A large amount of cabling required.
 A large amount of I/O ports required.
 Installation and reconfiguration are difficult.
 The sheer bulk of the wiring can be greater than the available
space (in the walls, floors) can accommodate.
 The hardware required to connect each link (I/O ports and
cables) can be prohibitively expensive.
LAN Topologies
Choice of topology
 Reliability
 Expandability
 Performance
 Needs considering of:
 Medium
 Wiring layout
 Access control
OSI Model
 The Open Systems Interconnection model (OSI model) is a conceptual
model from the International Organization for Standardization (ISO) that
provides a common basis for the coordination of standards development
for the purpose of systems interconnection. In the OSI reference model, the
communications between a computing system are split into seven different
abstraction layers: Physical, Data Link, Network, Transport, Session,
Presentation, and Application.
 The model partitions the flow of data in a communication system into
seven abstraction layers to describe networked communication from the
physical implementation of transmitting bits across a communications
medium to the highest level representation of data of a distributed
application. Each intermediate layer serves a class of functionality to the
layer above it and is served by the layer below it.
 Classes of functionality are realized in all software development through all
standardized communication protocols.
 Each layer in the OSI model has well-defined functions,
OSI Model
OSI Model
Layer Protocol Function
Data Unit
(PDU)

Application Data High-level protocols such as for resource sharing or remote file access,
e.g. HTTP.
Host
Layers Presentation Data Translation of data between a networking service and an application;
including character encoding, data compression and encryption/decryption

Session Data Managing communication sessions, i.e., continuous exchange of information


in the form of multiple back-and-forth transmissions between two nodes

Transport Segment, Reliable transmission of data segments between points on a network,


Datagram including segmentation, acknowledgement and mutliplixing.

Network Packet Structuring and managing a multi-node network, including addressing,


Media routing and traffic control
Layers
Link Frame Transmission of data frames between two nodes connected by a physical
layer
Physical Bit, Symbol
Transmission and reception of raw bit streams over a physical medium
OSI Model
 Application layer
 Utilities support end-user application program
 Determine data to be send at originating end
 Process data at receiving end
 Presentation layer
 Change data format
 Compression/expansion
 Encryption/decryption
 Session layer
 Communication rules of machines or application programs
 Accounting functions
OSI Model
Transport layer
 Identify receiving address
 Flow control: rate of transmission
 Recovery: calculate and check checksum of entire
message
Network layer
 Route message
 Dissemble and assemble data (packets)
 Accounting functions
OSI Model
 Data Link layer
 By IEEE 802
 Establish link between two ends
 Detect and correct transmission error
 Add header and trailer
 Divide data unit for transmission (frames)
 Sublayers
 Media access control (MAC): token ring or Ethernet
 Logical link control (LLC): assembling and disassembling frames,
error control, flow control
 Physical layer
 Electrical, mechanical, procedural specifications for data
transmission
 Hardware specification by RS-232-C
OSI Model
Standards

OSI IEEE IEEE Standards  IEEE 802.2: LLC protocol


7 : Application
6 : Presentation
5 : Session
 IEEE 802.3: CSMA/CD baseband bus
4 : Transport
3 : Network  IEEE 802.4: token passing bus
LLC
Logical Link Control 802.2  IEEE 802.5: token passing ring
2 : Data Link
MAC
 IEEE 802.11: Wireless LAN (Wi-Fi)
Medium Access 802.3 802.5
Control 802.11 802.15  IEEE 802.15.1: Bluetooth
PHY
Physical Signaling
 IEEE 802.15.4: Zigbee
1 : Physical
Layer
 Fiber Distributed Data Interface (FDDI)
Standard
Network Devices

A. Network Interface Card


B. Repeater
C. Hub
D. Switch
E. Bridge
F. Router
G. Gateway
H. Firewall
A. Network Interface Card (NIC)

 NIC is used to physically connect


host devices to the network media.
 A NIC is a printed circuit board that
fits into the expansion slot of a bus
on a computer motherboard.
 Each NIC is identified by a unique
code called a Media Access
Control (MAC) address. This
address is used to control data
communication for the host on the
network.
B. Repeater

 A repeater is a network device


used to regenerate a signal.
 Repeaters regenerate analog or
digital signals that are distorted by
transmission loss due to attenuation.
 A repeater does not make an
intelligent decision concerning
forwarding packets
C. Hub

 Hubs concentrate on
connections. In other
words, they take a group of
hosts and allow the
network to see them as a
single unit. This is done
passively, without any other
effect on the data
transmission.
 Active hubs concentrate
hosts and also regenerate
signals.
D. Switch

 Switches add more intelligence to


data transfer management.
 They can determine if data should
remain on a LAN and transfer
data only to the connection that
needs it.
 Another difference between a
bridge and switch is that a switch
does not convert data
transmission formats
E. Bridge

 Bridges provide
connections between
LANs.
 Bridges convert network
data formats and perform
basic data transmission
management.
 They also check data to
determine if it should cross
the bridge. This makes
each part of the network
more efficient
 Operates at level 2 OSI
model,
F. Router

 Routers have all the capabilities listed above.


 Routers can regenerate signals, concentrate
multiple connections, convert data transmission
formats.
 They can also connect to a WAN, which allows them
to connect LANs that are separated by great
distances
 A router is a networking device that
forwards data packets between computer
networks. Routers perform the traffic directing
functions between networks and on the
global Internet. Data sent through a network,
such as a web page or email, is in the form
of data packets. A packet is typically forwarded
from one router to another router through the
networks that constitute an internetwork (e.g. the
Internet) until it reaches its destination node
G. Gateway

 A gateway (une passerelle) is the generic name for a device


that connects two computer networks of different types, for
example a local area network (LAN) and the Internet.
 The term gateway more commonly designates the modem-
router which makes it possible to connect a local network to
the Internet network. A gateway therefore performs the
routing of the packets but can also perform more advanced
processing on them. Most often, it also serves as a firewall,
proxy, performs quality of service, …
 There are different types of gateways:
 a repeater is a level 1 gateway
 a bridge a level 2 gateway
 a router, a layer 3 gateway
F. Firewall

 A firewall is a network device or software for


controlling network security and access rules.
 Firewalls are inserted in connections between
secure internal networks and potentially
insecure external networks such as the
Internet.
 Firewalls are typically configured to reject
access requests from unrecognized sources
while allowing actions from recognized ones.
 The vital role firewalls play in network security
grows in parallel with the constant increase in
cyber attacks.
Network Media

 Network media refers to the communication channels used to


interconnect nodes on a computer network.
 Wired media: used in wired networks
 Copper cable
 coaxial cable
 Unshielded twisted pair (UTP)
 Shielded twisted pair (STP)
 Fiber optic cable
 Wireless data communication networks : radio waves
© Pr. Rafik Djemili. Dept. Génie Electrique, Univ. 20 Août 1955-Skikda

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy