0% found this document useful (0 votes)
21 views27 pages

1 Computer Network

A computer network consists of two or more connected computers that can communicate and share resources. There are various types of networks including LAN, MAN, and WAN, as well as different relationship types such as peer-to-peer and client-server. Additionally, network topologies like bus, star, and ring, along with basic components like cables, network adapters, signal distributors, and firewalls, are essential for establishing and maintaining networks.

Uploaded by

ryan.israel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views27 pages

1 Computer Network

A computer network consists of two or more connected computers that can communicate and share resources. There are various types of networks including LAN, MAN, and WAN, as well as different relationship types such as peer-to-peer and client-server. Additionally, network topologies like bus, star, and ring, along with basic components like cables, network adapters, signal distributors, and firewalls, are essential for establishing and maintaining networks.

Uploaded by

ryan.israel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

COMPUTER

NETWORK
COMPUTER NETWORK
Is two or more computers connected to each electronically,
so they can communicate with each other and share
resources such as peripheral devices, software, information
and processing power.
TYPES OF COMPUTER
NETWORK
Local Area Network (LAN) – is a network that connects computers and devices in
a limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.
Metropolitan Area Network (MAN) – is a network spanning a physical area larger
than a LAN but smaller than a WAN, such as a city. A MAN is typically owned and
operated by a single entity such as a government body or large corporation.
Wide Area Network (WAN) – is a computer network that covers a large
geographic area such as a city, country, or spans even intercontinental distances,
using a communications channel that combines many types of media such as
telephone lines, cables, and air waves. The largest and best example of a WAN is
the Internet, which is a network composed of many smaller networks.
Knowing Network
Relationship Types
1. Peer-to-peer network relationship –
defines one in which computers on the
network communicate with each other as
equals. Normally each computer serves as
Client/Server and there is no one assigned to
be an administrator responsible for the entire
network. Each computer is responsible for
accessing the network resources it needs
from other peer-to-peer computers and for
knowing where those resources are and what
security is required to access them.
Knowing Network
Relationship Types
2. Client-Server network relationship – is one
in which a distinction exists between the
computers that makes available network
resources (the Server) and the computers
that uses the resources (the Clients or
Workstation). A pure client-server network is
one in which all available network resources –
like files, directories, application, and shared
devices – are certainly managed and hosted,
and then are accessed by the clients
computers.
COMPUTER
NETWORK
TOPOLOGIES
Bus Topology – all devices are connected to a
central cable, called the bus or backbone. Bus
networks are relatively inexpensive and easy
to install for small networks. Ethernet
systems use a bus topology.
Star Topology – LAN topology on which each
node on a network is connected directly to a
central network hub or concentrator or
switch or router with a point-to-point
connection.
Ring Topology – A network topology that is
set up in a circular fashion in which data
travels around the ring in one direction. Each
device incorporates a receiver for the
incoming signal and a transmitter to send the
data on to the next device in the ring.
Partially Connected Mesh Topology – there
are at least two nodes with two or more
paths between them to provide redundant
paths to be used in case the link providing
one of the paths fails.
Full Mesh Topology – (Fully connected
network) a network topology in which there
is a direct link between all pairs of nodes.
Networks designed with this topology are
usually very expensive to set up, but provide
a high degree of reliability due to the multiple
paths for data that are provided by the large
number of redundant links between nodes.
This topology is mostly seen in military
applications.
Tree Topology – (a.k.a. hierarchical
topology) can be viewed as a collection of
star networks arranged in a hierarchy. This
tree has individual peripheral nodes (e.g.
leaves) which are required to transmit to
and receive from one other node only and
are not required to act as repeaters or
regenerators.
Basic Network
Components
I. Cables
- a conductor for transmitting electrical or optical signals
or electric power. Also used to connect computer.

A. Twisted Pair
B. Coaxial Cable
C. Fiber-Optic Cable
A. Twisted Pair
- is the most widely used medium for telecommunication.
Twisted-pair cabling consist of copper wires that are twisted into
pairs. The transmission speed ranges from 2 million bits per
second to 10 billion bits per second. This cable uses a connector
like RJ-45
A. Shielded Twisted Pair (STP) – use’s metallic shield wrapping
to protect the wire from interference.
B. Unshielded Twisted Pair (UTP) – a cable that is made of one
or more twisted pairs of wires and is not surrounded by a metal
shield.
A. Twisted Pair

UTP with RJ-45


B. Coaxial Cable
cable consisting of a single copper conductor in the center
surrounded by a plastic layer for insulation and a braided
metal outer shield. Widely used for cable television systems,
office buildings, and other work-sites for local area
networks. Transmission speed range from 200 million to
more than 500 million bits per second.
B. Fiber-Optic Cable
cable consisting of a center glass core surrounded by layers
of plastic that carries data by means of pulses of light.
Transmission speed may reach trillions of bits per second.
II. Network Adapters
(a.k.a. Network Interface Cards, LAN Cards) – is a piece of
computer hardware designed to allow computers to
physically access a networking medium.
A. Peripheral Component
Interconnect (PCI) connection
– this is usually inserted to the PCI slot of a desktop
computer.

Wireless PCI LAN Card


B. PCMCIA (Personal Computer Memory
Card International Association) Card
– this LAN card usually inserted in Laptops computer.
C. USB (Universal Serial Bus) LAN Card
– this LAN card usually inserted in Laptops computer.

Wireless USB LAN Card


III. Signal Distributor
- connects computer with each other, controls data flow
and can negotiate data transfer.
A. Hub
– – is typically the least expensive, least intelligent, and least
complicated among signal distributors. Its job is very, very
simple: anything that comes in one port is sent out the
others.
B. Switch
is distinct from a hub in that it only forwards the frames to
the ports involved in the communication rather than all
ports connected. A switch normally has numerous ports,
facilitating a star topology for devices, and cascading
additional switches.
C. Router
is the smartest and most complicated one. A simple way to
think of a router is as a computer that can be programmed to
understand, possibly manipulate, and route the data it’s
being asked to handle. This device forwarded data packets.
IV. Firewall
– an important aspect of a network with respect to
security. It typically rejects access requests from unsafe
sources while allowing actions from recognized ones.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy