0% found this document useful (0 votes)
34 views52 pages

Module 3

Computer networks are essential systems that connect various devices, enabling efficient communication and resource sharing across different sectors. They can be classified based on geographical scope (LAN, WAN, MAN, PAN), architecture (client-server), and purpose (enterprise, home, internet, intranet). Understanding network topologies, protocols, and security measures is crucial for effective network design and management.

Uploaded by

shalombacha89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views52 pages

Module 3

Computer networks are essential systems that connect various devices, enabling efficient communication and resource sharing across different sectors. They can be classified based on geographical scope (LAN, WAN, MAN, PAN), architecture (client-server), and purpose (enterprise, home, internet, intranet). Understanding network topologies, protocols, and security measures is crucial for effective network design and management.

Uploaded by

shalombacha89
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 52

Unit 1

Basic Computer Network


Introduction to Computer Network
• Computer networks are crucial systems that connect
devices like computers, servers, printers, and mobile
devices, enabling efficient communication and resource
sharing. They are essential in various sectors like
business, education, healthcare, government, research,
and entertainment. Key components of a computer
network include computers and devices, network media,
network protocols, networking devices, and network
services. These networks can be established within a
small area, across multiple buildings, or globally.
Benefits of computer networks:

➢ Resource Sharing: Networks enable the sharing of


devices, software, and data, reducing costs and improving
efficiency.
➢ Communication and Collaboration: Networks facilitate
real-time communication and collaboration between
individuals and teams, regardless of their physical location.
➢ Data Sharing and Storage: Networks enable centralized
data storage and sharing, allowing multiple users to access
and collaborate on the same files and documents etc.
Types of Networks
• Computer networks can be classified based on
their geographical scope, their architecture,
and their purpose. Here are some common
network classifications:
A. Based on Geographical or Network Scope:
Computer networks can be classified according
to the geographical extent covered by the
network transmission into:
1. Local Area Network (LAN)

• A LAN is a network that covers a small


geographical area, such as a home, office, or
campus. LANs typically use Ethernet cables or
Wi-Fi for communication and are owned and
managed by a single organization. A local area
network is a high-speed, medium-distance
communication system.
2. Wide Area Network (WAN)

• A WAN covers a large geographical area and


connects multiple LANs or remote sites.
WANs can use different communication
technologies, such as leased lines, fiber-optic
cables, or satellite links, to connect
geographically dispersed locations. It is a
computer network that covers a large
geographical area consisting of two or more
LANs or MANs.
3. Metropolitan Area Network (MAN)
• A Metropolitan Area Network (MAN) is a type of
computer network that spans over a metropolitan area,
typically a city. It provides high-speed data
communication services such as video, audio, and data
transfer between multiple LANs (Local Area Networks)
and WANs (Wide Area Networks). The main purpose of
a MAN is to connect different LANs in a city to share
resources and exchange data, as well as to provide
internet access to users. A MAN typically covers a
geographic area of several kilometers and is larger than
a LAN but smaller than a WAN.
3. Personal Area Network (PAN)
• A PAN is a network that connects personal
devices in close proximity, such as
smartphones, tablets, laptops, and wearable
devices. PANs are often established using
wireless technologies like Bluetooth or
infrared. There are two types of PANs:
wireless and wired.
SIMILARITY OF PAN AND LAN
• PANs and LANs are unique in their own ways.
The major difference between these networks
is that a PAN connects the devices within the
short range of an individual person, whereas a
LAN connects devices at a single site,
typically an office building. Similar to a PAN,
a LAN can be both wired and wireless.
B. Based on Architecture or Services:

1. Client-Server Network:- In a client-server


network, one or more powerful servers provide
resources, services, and data to multiple client
devices. Clients request and receive resources
from the server, which centrally manages and
controls the network. Client-server architecture
is a computing model in which the server hosts,
delivers and manages most of the resources and
services to be consumed by the client.
• Client-server architecture is also known as a
networking computing model or client-server
network because all the requests and services
are delivered over a network.
• Client: a piece of software or application that
takes the input and sends request to the
servers.
• Server: a piece of software that receives and
processes requests from clients.
C. Based on Purpose
I. Enterprise Network An enterprise network is
designed to connect devices within an organization
or business. It enables employees to communicate,
collaborate, and access shared resources, such as
files, databases, and applications.
II. Home Network A home network connects devices
within a household, allowing family members to
share an internet connection, printers, files, and
media. Home networks are typically simpler and
smaller than enterprise networks.
Internet
III. The internet is a global network of interconnected
networks, allowing users worldwide to access and
share information and services. It is a massive network
that spans geographical boundaries and connects
billions of devices.
IV. Intranet An intranet is a private network within an
organization, accessible only to authorized users. It is
designed for internal communication, collaboration,
and sharing of resources, such as documents,
calendars, and internal websites.
SELF CHECK
1. Describe the key components of computer
network?
2. Write the benefits of computer network?
3. Write the types of common computer network
classifications?
Network Topologies
• In computer networking, a network topology
refers to the arrangement of nodes (devices)
and links (connections) in a network. Different
network topologies offer distinct advantages
and disadvantages in terms of cost, scalability,
and fault tolerance. Here are some common
types of network topologies:
A. BUS TOPOLOGY:
• In a bus topology, all nodes are connected to a
central cable called a "bus". Nodes transmit data
onto the bus, and the data is received by all other
nodes connected to the bus. This topology is
straightforward and cost-effective for small
networks but can suffer from a single point of
failure if the central bus is damaged. It is
sometimes called a line topology or backbone
topology. Data flow on the network follows the
route of the cable, moving in one direction.
Advantages of Bus Topology:
• Bus topologies are a good, cost-effective
choice for smaller networks because the layout
is simple, allowing all devices to be connected
via a single coaxial cable. If needed, more
nodes can be easily added to the network by
joining additional cables.
Disadvantages of Bus Topology:
• However, because bus topologies use a single cable
to transmit data, they are somewhat vulnerable. If
the cable experience a failure, the whole network
goes down.
B. STAR TOPOLOGY:
A star topology connects all nodes to a central device,
allowing high scalability and easy addition or
removal. It requires more cabling than a bus
topology. The central node manages data
transmission and acts as a repeater, preventing data
loss.
Advantages of Star Topology:
• Star topologies are popular for managing
networks from a single location, as they allow
for secure, independent node connections to
the central hub. This design simplifies
administration by allowing easy identification
of errors or performance issues.
Disadvantages of Star Topology:
• On the other hand, if the central hub goes
down, the rest of the network can’t function.
C. RING TOPOLOGY: A ring topology
connects nodes in a circular loop, where each
node is connected to the adjacent nodes. Data
circulates through the network in one direction,
and each node repeats the signal before passing
it to the next node.
D. MESH TOPOLOGY:
• A mesh topology connects each node directly
to every other node in the network. It can be
either a full-mesh (every node is connected to
every other node) or a partial-mesh (only some
nodes are directly connected).
Advantages of Mesh Topology:
• Mesh topologies are reliable and stable, and
the complex degree of interconnectivity
between nodes makes the network resistant to
failure. Advantages of Mesh Topology: Mesh
topologies are reliable and stable, and the
complex degree of interconnectivity between
nodes makes the network resistant to failure.
Disadvantages of Mesh Topology:
• Mesh topologies are incredibly labor intensive.
Each interconnection between nodes requires a
cable and configuration once deployed, so it
can also be time consuming to set up.
Network Architectures
• Network architecture refers to the design and
structure of a computer network. It specifies how
different components, such as devices, protocols,
services, and applications, are organized and
interrelated to enable communication and data
exchange within the network. Network architects
consider various factors, such as network size,
scalability, performance, security, and cost, while
designing the network architecture.
Unit Summary
• A computer network is a collection of devices that are
connected together to enable communication and the
sharing of resources. The devices in a network can
include computers, printers, servers, routers, and
switches.
• Computer networks can be classified based on their
size, scope, and purpose. Key concepts in computer
networking include: Network topologies: The way in
which devices are interconnected within a network.
Common topologies include bus, star, ring, and mesh.
Network protocols
• Network protocols: Rules and conventions that
govern communication between devices in a
network. Protocols such as TCP/IP, HTTP, and
FTP enable devices to communicate and share
data.
• Network security: Measures taken to protect a
network from unauthorized access, data breaches,
and other malicious activities. Security measures
may include firewalls, encryption, and access
control.
Computer networks
• IT can be connected through wired or wireless connections,
with the most common forms of network technology
including Ethernet, Wi-Fi, and cellular networks. Networks
can also be interconnected to create larger networks, such as
the internet, which is a global network of interconnected
networks. Overall, computer networks are essential for
enabling communication, collaboration, and resource
sharing in today's digital world. Understanding the basics of
computer networking is important for anyone working in
the field of information technology or using computer
networks in their daily activities.
UNIT 2
COMPUTER NETWORK COMPONENTS

Network Toolkits
2.1.1 Wire Crimper A crimping tool is a device that
is used to make cold weld joints between wires and
a connector through deforming one or both of
them to hold the other. A special connector is used
to join metals together. For example, a crimping
tool is used to create phone cable sand network
cables to combine RJ-11 and RJ-45 connectors to
both ends of the phone or Cat 5 cable.
The below picture is an example of RJ-11
(6-pin) and RJ-45 (8-pin) crimping tools.
Objective of the crimping tool
• Crimping is the process of attaching a connector to a
network cable or phone end. Common connectors
include RJ-11 and RJ-45. Crimping tools combine two
metal pieces by deforming one, preventing wires from
falling out and transmitting data.
Uses of Crimping Tool
 In metalworking, the crimping tool is most widely used.
It plays an important role in many applications such as
correcting bullets, for rapid but lasting electrical
connections, securing lids on metal food cans, and
multiple other applications.
1.1.2 Wire Map Testers
• Both privately and within a company, the
networking of computers and peripherals is an
important component. Ideally, communication
must be possible at all times.
2.1.3 Multifunction
Tester
• A multifunctional network tester is a device
used to test and diagnose various aspects of
computer networks
.
Some of the common features and capabilities
of a multifunctional network tester include:
1. Cable testing: It can verify the integrity and quality of network
cables by checking for faults like open circuits, short circuits,
and mismatched wiring.
2. Ethernet testing: It can test Ethernet connectivity and diagnose
any issues related to link speed, duplex mode, and network
packets.
3. Wi-Fi testing: It can scan and analyze Wi-Fi networks to
assess signal strength, channel interference, and overall
network performance.
4. Network performance testing: It can measure network
bandwidth, latency, and packet loss to determine the overall
performance of the network.
CONT…

5. VoIP testing: It can assess the quality of Voice over Internet


Protocol (VoIP) calls by measuring factors like jitter, latency, and
packet loss.
6. Network monitoring: It can monitor network traffic in real-time
to identify any abnormal behavior, such as network congestion or
security threats.
7. Security testing: It can perform security audits and
vulnerability assessments to identify potential weaknesses in the
network infrastructure.
8. Protocol analysis: It can capture and analyze network packets
to troubleshoot and debug network issues, such as faulty devices
or misconfigured settings.
How do Network Testers work?

• There are two most common ways of testing


the connection:
➢ Tester sends a current down the wire and
measures its level. This is called a continuity
testing.
➢ Tester sends a current and a voltage down the
connection. Resistance testing is measuring a
voltage and current, it calculates a resistance.
2.2. Network Devices
2.2.1 Hub
The basic networking component used in traditional 10-Mbps.
Ethernet networks to connect network stations to form a local
area network (LAN). Hubs can be used for:
➢ Connecting about a dozen computers to form a workgroup
or departmental LAN
➢ Connecting other hubs in a cascaded star topology to form
a larger LAN of up to roughly a hundred computers. Generaly,
Hubs are the foundation of traditional 10BaseT Ethernet
networks. The hub receives signals from each station and
repeats the signals to all other stations connected to the hub.
2.2.2 Switch
• Switch is essentially a multi-port bridge.
Switches allow the segmentation of the LAN
into separate collision domains.
Hub VS Switch:
2.2.3 Router
• A Router is a computer, just like any other
computer including a PC. Routers have many of
the same hardware and software components
that are found in other computers including:
➢ CPU
➢ RAM
➢ ROM
➢ Operating System
Router
• A router is the backbone of the Internet, connecting
multiple networks and forwarding packets. It has
multiple interfaces from different IP networks. When
receiving an IP packet, it determines which interface to
use to forward it to its destination, either the final
destination network or a network connected to another
router.
• The primary responsibility of a router is to direct packets
destined for local and remote networks by:
➢ Determining the best path to send packets
➢ Forwarding packets toward their destination.
2.2.4 Access Point
• An access point (AP) is a network device that
connects wired and wireless networks, serving
as both internet routers and firewalls.
2.3. Network Cables
• Twisted-pair (TP), coaxial, and fiber-optic
(FO) are major types of data networking
cables.
• Backbone cables connect network equipment
and telecommunications rooms, while
horizontal cables connect
telecommunications rooms to wall outlets.
Unit 3
Computer Network Client Requirements

• A Local Area Network (LAN) is a type of


network that covers a small geographic area,
like a home, office, or building. A LAN can be
as small as two computers or as large as
several hundred computers. They are usually
connected together using Ethernet cables,
hubs, or switches. Network architecture is a
blueprint that defines the structure, behavior,
and protocols of a computer network.
The Importance of LAN
Architecture
• A local area network (LAN) requires an appropriate architecture
to function properly. LAN architecture determines its design,
structure, performance, security, reliability, efficiency, and cost
of ownership. It helps prevent network congestion, reduces
maintenance costs, and supports various applications and
services. The LAN architecture is based on a logical topology,
including star, mesh, and ring topologies. Once established,
network components can be connected using cables, hubs, or
switches. Each component is assigned an IP address, allowing
them to communicate and recognize each other. A well-designed
LAN architecture ensures the network functions efficiently and
supports desired applications and services.
Advantages of LAN
architecture:
➢ The advantages of LAN architecture include
scalability, cost savings, and improved performance.
➢ LANs are relatively inexpensive to set up and
maintain, and they can be easily expanded to
accommodate more users, devices, and applications.
This scalability makes them ideal for growing
businesses.
➢ Additionally, LANs offer improved performance
due to their higher bandwidth and lower latency,
compared to their wide-area counterparts.
Disadvantages of LAN
architecture:
➢ The disadvantages of LAN architecture include
congestion, security concerns, and a lack of mobility.
➢ Congestion can occur in heavily used LANs, which
can lead to decreased performance and latency.
➢ Additionally, LANs can be vulnerable to security
threats, such as viruses, malware, and hackers.
➢ Finally, LANs are limited to the geographic area
that they cover, so users cannot access their resources
from outside the network.
3.2.1 Wired Network Standards

A. Ethernet (IEEE 802.3) Ethernet is a wired


network standard that defines physical and
data link layers for transmitting data over a
local area network (LAN).
3.2.2 Wireless Network Standards
A. Wi-Fi (IEEE 802.11): Wi-Fi, also known as IEEE
802.11, is a wireless network standard that
allows devices to connect and communicate
over a local area network or the internet.
Unit 4
Computer Network
Installation
4.1. Successful Computer Network Installation
• A reliable and efficient computer network is crucial for business
operations. To set up a network follow these steps:
1. Define your network requirements: Determine the devices, data
type, and bandwidth needed.
2. Choose the right hardware and software: Choose reliable, scalable,
and compatible hardware.
3. Plan your network topology: Consider factors like distance, data
flow, and security.
4. Install your hardware: Follow manufacturer's instructions and
double-check connections for security. E. Configure your network
software: Set up security, IP addresses, and other settings to prevent
unauthorized access.
4.2.1 Crimping Cables Crimping
Cables is a crucial technique in networking
and telecommunications, ensuring secure and
efficient connections for data and signal
transmission. It requires specific tools and
materials, including a crimping tool,
connectors, a cable stripper, and a cutter,
enabling professionals to achieve reliable
terminations.
To crimp cables, you will need the
following tools and materials:
• Crimping tool: This is an essential tool for crimping cables.
Make sure to choose a tool that is compatible with the type of
connectors you are using.
• Connectors: Select the appropriate connectors for your cables.
The most commonly used connectors are RJ-45 connectors for
Ethernet cables and RJ-11 connectors for telephone cables.
• Cable stripper: This tool is used to remove the outer insulation
from the cable. It allows you to expose the individual wires
within the cable for proper termination.
• Cable cutter: Use a cable cutter to trim the cable to the desired
length before crimping. This ensures that the cable is properly
fitted into the connector.
Crimping process:
➢ Strip the cable: Use the cable stripper to remove about 1-2
inches of outer insulation from the cable.
➢ Arrange the wires: Follow the appropriate color-coded scheme
for the connector type and arrange the individual wires accordingly.
➢ Trim uneven wires: Use the cable cutter to trim any uneven
wires for a clean and proper connection.
➢ Insert the wires into the connector: Carefully insert each wire
into the corresponding slot in the connector, ensuring they go all the
way to the end.
➢ Crimp the connector: Place the connector in the appropriate slot
of the crimping tool and squeeze it firmly, ensuring all the blades
make contact with the wires.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy