0% found this document useful (0 votes)
11 views40 pages

Networking presentation

The document outlines a course on Networking & Communication, detailing the class schedule, instructor, and course objectives. It covers various topics including computer networking, internetworking, subnetting, network planning, and different network topologies. Key components of computer networks and their functionalities are also discussed, along with advantages and disadvantages of various network topologies.

Uploaded by

emelyn aborot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views40 pages

Networking presentation

The document outlines a course on Networking & Communication, detailing the class schedule, instructor, and course objectives. It covers various topics including computer networking, internetworking, subnetting, network planning, and different network topologies. Key components of computer networks and their functionalities are also discussed, along with advantages and disadvantages of various network topologies.

Uploaded by

emelyn aborot
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 40

Networking & Communication

Class Schedule: Saturday, 1:00 pm to 6:00 pm


Instructor: Emelyn T. Aborot
Course Outline:
Chapter I: Computer Networking
Overview

I.a. Networking Overview


I.b. Network Topologies
I.c. Network Technologies
I.d. Network Protocols

Chapter II: Internetworking

I.a. Ethernet Networking


I.b. Ethernet Collision
Detection
I.c. Ethernet Cabling
Course Outline: Chapter III: Subnetting

III.a. Introduction to
subnetting
III.b. Subnetting using CIDR
III.c. Subnetting using VLSM
III.d. Understanding Switching
different
Chapter IV: How toClasses of IP
Build Your
addresses
Network- Site Survey-
Planning a Network

IV.a. Types of Network


IV.b. Types of Server
IV.c. Introduction to Routers
IV.d. Intro to networking using
Linux system
Objectives:

1. To understand the Networking


and Communication.
2. To identify different computer
networks, their importance
and use.
3. To explain theories in
computer communication
network.
4. To identity and understand the
use of different network
technologies
5. Set-computer networks
6. Describe and explain the
internet protocols.
What is

Computer
Network
Networking
Communication

Computer
Networking
Computer

Invented by Charles Mechanical and A programmable


Babbage between electronic device device that
1833 and 1871. A that process a raw Manipulates
device, the data into useful information, has an
analytical engine. information. ability to store,
retrieve and process
data.
Network

a group of Multiple devices Connection of two or


connected things linked together to more computers or
by a cable or share resources devices that allow
wireless internal
communication and
collaboration
between the users
and devices itself
Networking

In other terms this is Is the art of It is more than just


an exchanging of connecting devices, connecting devices,
information and systems, and people it allows us to
ideas among collaborate across
different people with the globe and
common goal. innovative
Communication

According to Merriam- It is also an act of It is a process of


Webster it is a process giving, receiving and creating and sharing
by which information is sharing information. ideas, information,
exchange between views, facts and
individuals though a feelings from one place,
common systems of person or group to
symbols, signs and another.
behavior.
Computer Network and
Networking

A computer network is a Computer Networking is refers


collection of connected to interconnected computing
computer resources devices that exchange data and
share resources with each
other.
What Do Computer
Networks Do?

Provide better
connectivity
What Do Computer
Networks Do?

integrate on a large
scale
What Do Computer
Networks Do?

Helps operate virtually


What Do Computer
Networks Do?

respond very quickly


in case of conditions
change
What Do Computer
Networks Do?

Provide data security


Main Parts of
Computer Networks

Nodes Links

Devices connections
Key Components of Computer
Networks
Network Devices

Links

Communication
Protocols

Network Defense
NETWORK TOPOLOGY

The shape of LAN is usually referred to as its TOPOLOGY.


Topology dictates the way in which the devices of the network
connect together.
Network topology refers to the manner in which the links and
nodes of a network are arranged to relate to each other.
Topology Category

PHYSICAL NETWORK TOPOLOGY, which is the


physical signal transmission medium.

LOGICAL NETWORK TOPOLOGY, which refers to the


manner in which data travels through the network
between devices, independent of physical connection
of the devices.
Physical Network
Topology

STAR MESH TREE


TOPOLOGY TOPOLOGY TOPOLOGY
Physical Network
Topology

RING POINT to POINT


TOPOLOGY TOPOLOGY HYBRID
TOPOLOGY
This is more expensive, far more
STAR Topology efficient than the ring topology,
because all messages their destination
in just two or fewer hops.
It is also more robust than the ring
topology, because the failure of any
the nodes disconnect the network.
Central hub/switch has limited
connections, therefor the number of
resources that make up the network
will limited.

The most common network topology, star topology connects each


device in the network to a central hub. Devices can only
communicate with each other indirectly through the central hub.
MESH Topology
MESH or nearest-neighbor topology
is a dedicated point-to-point link
connects each device on the
network to another device on the
network, only carrying data between
two devices. .

This is directly connected and can


have larger dimensionality.
routing the data

flooding the data

What is a mesh network in real life example?


two types of mesh
topology:

full mesh topology


partial mesh topology
two types of mesh
topology:

full mesh topology


partial mesh topology
Advantages and disadvantages of using a
mesh topology
 messages can be received more quickly if the
route to the intended recipient is short
 messages should always get through as they
have many possible routes on which to travel
 multiple connections mean (in theory) that no
node should be isolated
 multiple connections mean each node can
transmit to and receive from more than one
node at the same time
 new nodes can be added without interruption
or interfering with other nodes
MESH Layouts
1D

2D

3D

Hierarchical
or tree mesh

Fully
Connected
Tree Topology
This topology consists of a parent-child
hierarchy in which star networks are
interconnected via bus networks. Nodes
branch out linearly from one root node,
and two connected nodes only share one
mutual connection.

This topology is the combination of bus


and star topology.

The other nodes in a network are not


affected, if one of their nodes get
damaged or not working.
Tree Topology
This network is very difficult to
configure as compared to the other
network topologies.

Length of a segment is limited & the


limit of the segment depends on the
type of cabling used.

Due to the presence of large number


of nodes, the network performance of
tree topology becomes a bit slowly.
RING Topology
Two dedicated point-to-point links
connect a device to the two devices
located on either side of it, creating a
ring of devices through which data is
forwarded via repeaters until it
reaches the target device.

This topology suffers in two ways.


First, if any single node fails, it can
isolate a portion of the network and
keep some resources from
communicating with others. Second,
it can be unidirectional or
bidirectional.
Point to Point Topology

The simplest topology that connects two nodes directly


together with a common link. The entire bandwidth of the
common link is reserved for transmission between those
two nodes. The point-to-point connections use an actual
length of wire or cable to connect the two ends, but other
options, such as satellite links, or microwaves are also
possible.

Highest Bandwidth because there is only two nodes having


entire bandwidth of a link, very simple connectivity, it
provides low Latency, and Easy to handle and maintain.
Point to Point Topology

This topology is only used for small areas where


nodes are closely located. The entire network
depends on the common channel in case of link
broken entire network will become dead. There is
another major drawback of this topology there are
only two nodes if any of the node stops working,
data cannot be transfer across the network.
Hybrid Topology
This is a combination of any
two or more types of
topology.

It is extremely flexible and very reliable. It is


easily scalable as Hybrid networks are built in
a fashion which enables for easy integration of
new hardware components. Detecting error
and troubleshooting is easy and it handles
large volume of traffic. It is used for create
large network.

It is a type of network expensive.


Design of a hybrid network is very complex.
LOGICAL Network Topology

BUS
TOPOLOGY

TOKEN RING
TOPOLOGY
BUS/LINEAR Topology
Also known as backbone network
topology, this configuration connects all
devices to a main cable via drop lines.
The advantages of bus network
topology lie in its simplicity, as there is
less cable required than in alternative
topologies, which makes for easy
installation.
This suffer from a significant problem, because all resources share the
single line, only one message can be transmitted over its length at
any time.
TOKEN RING Topology
A token ring is a data link for a local
area network (LAN) in which all devices
are connected in a ring or star topology
and pass one or more tokens from host
to host. A token is a frame of data
transmitted between network points.
Only a host that holds a token can send
data, and tokens are released when
receipt of the data is confirmed.
Thank You

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy