SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
Chapter 4
SC161: Principles of Information Technology
Communication and Network
Part 2: Computer Network
Thiti Theerathean
Center for Teaching Excellence
University of the Thai Chamber of Commerce
E-mail : thiti_the@utcc.ac.th
2
• Introduction to Computer Network.
- Types of Computer Network.
- The basic Configurationsof Computer Network.
- The Benefits of Computer Network.
• Network Architecture Model.
- OSI Model.
- InternetModel.
• Local Area Network.
- The Components of LAN.
- Topologies of LAN.
• Wide Area Network.
- TransmissionFacility.
- Modulation.
- Multiplexing.
SC161: Principlesof Information Technology
3SC161: Principlesof Information Technology
A Computer network is an interconnection of computers and computing equipment using
either wire and wireless over small or large geographic areas.
Twisted pair, Radio wave
Coaxial, Fiber Optic
Fiber Optic, Microwave
4SC161: Principlesof Information Technology
Personal Area Network : PAN
A personal area network is a computer network organized around an individual person.
PANs typically involve a mobile computer, a cell phone or a handheld computing device such
as a PDA.
Bluetooth PANs are also called piconet.
5SC161: Principlesof Information Technology
The Big Picture of Computer Network.
6SC161: Principlesof Information Technology
The Basic Configurations of Computer Network.
PCs to LAN
LAN to LANs
7SC161: Principlesof Information Technology
The Basic Configurations of Computer Network.
PC to WAN
LAN to WAN
8SC161: Principlesof Information Technology
The Benefits of Computer Network
People and Organizations use networks for the following reason, the most important of
which is the sharing of resource.
• Resource sharing
• Data and information sharing
• Better Communications
• Reduced Cost
• On-line services
• Electronic data interchange
9SC161: Principlesof Information Technology
10SC161: Principlesof Information Technology
How do you sends a message to your friends ?
Message.
Department.
Company.
POST Code.
Country.
Thiti Theerathean.
Faculty of Science.
University of the Thai Chamber of Commerce.
Vibhavadee-Rangsit Rd. Dindang
Department of Information & Communication Technology.
Bangkok 10400
Thailand
Application Set
Transport Set
11SC161: Principlesof Information Technology
The Open Systems Interconnection Reference Model
The architectural model adopted by the International Standards Organization (OSI) .
Bits
Frame
Packet
Segment
Data
Application Set
Transport Set
12SC161: Principlesof Information Technology
The Open Systems Interconnection Reference Model
Application Interface.
Web browser, File Transfer, e-Mail
Application Layer
Presentation Layer Encryption Data.
ASCII, EBCDIC, UNICODE
Session Layer Transmission Control.
Simplex, Half-duplex, Full-duplexApplication Set
Transport Set
Transport Layer Flow Control.
Connection-Oriented, Connectionless
Network Layer Routes data.
IP Address
Data Link Layer Node to Node Transmission.
MAC Address
Physical Layer Send and Receive Bits.
Signal and Media.
13SC161: Principlesof Information Technology
The Internet Model
The Internet model is a most widely used that it is accepted as a network architecture. The
Internet’s Protocol suite is called Transmission Control Protocol/Internet Protocol (TCP/IP).
OSI Model Internet Model Protocols
HTTP FTP POP3 DNS
TCP UDP
IPv4 IPv6 ICMP
Not Specified
User Data
Datagram
Packet
Segment
Encapsulation
14SC161: Principlesof Information Technology
The Internet Model in Action.
Router
Router
Link Layer
Internet Layer
Transport Layer
Application Layer
Application Layer
Transport Layer
Internet Layer
Internet Layer
Internet Layer
Link Layer
Link Layer Link Layer
Link Layer
Link Layer
15SC161: Principlesof Information Technology
16SC161: Principlesof Information Technology
A Local Area Network (LAN) is a communication network that interconnects a variety of
data communicating devices within a small geographic area and broadcasts data at high data
transfer rates with very low error rates.
17SC161: Principlesof Information Technology
Client/Server
Microcomputer users, or clients, share
services of a centralized computer called a
server.
Peer-to-Peer
Computers share equally with one
another without having to rely on a central
server.
18SC161: Principlesof Information Technology
A Topology is the physical layout of nodes in a network, which often dictates the type of
communications protocol used by the network.
Topologies of LANs.
Three Network Topologies.
19SC161: Principlesof Information Technology
T-Connector
BUS
Desktop Computer
Terminator
• All nodes are connected to a single wire or cable, called a Backbone.
• Node is connected to a backbone with T-connector.
• Terminators are required at both ends of the backbone cable.
• A message (signal) that is sent by a node travels along the bus through all other nodes.
20SC161: Principlesof Information Technology
Server
Desktop Computer
RING
• All the nodes are connected in a closed circle of cable.
• Electronic messages are passed around the ring.
• The Token determines which user on the network can send information. It is called
“Token passing”
21SC161: Principlesof Information Technology
• All devices connected with a central Hub.
• The Hub monitors the flow of traffic.
• The Hub also acts as a repeater for the data flow and then retransmits the signals to
all other nodes.
Server
HUB
Desktop Computer
22SC161: Principlesof Information Technology
23SC161: Principlesof Information Technology
A Wide Area Network (WAN) is a data communications network that covers a
relativelybroad geographicarea and that often uses transmissionfacilitiesprovided by common
carriers such as telephone companies.
A WAN is contrasted to smaller Local Area Networks (LANs) and Metropolitan Area
Networks (MANs).
Home Network
Company Network
Internet Service Provider
(ISP)
InternetSatellite
24SC161: Principlesof Information Technology
Transmission Facility.
What is the most efficient way to send message over a WAN network ?
25SC161: Principlesof Information Technology
Transmission Facility.
Circuit switching : Best for voice.
Message
26SC161: Principlesof Information Technology
Transmission Facility.
Packet switching : Best for data.
1
2
3
27SC161: Principlesof Information Technology
Modulation.
The telephone system transmit analog signals, the transfer of a computer’s digital data over a
telephone line requires conversion of the data to an analog signal.
• The technique of converting digital data to an analog signal is called “modulation”.
• The technique of converting analog signal back to digital data is called “demodulation”
Analog signal
Digital signal
Modem
Modulates Signal
Modem
Demodulates Signal
28SC161: Principlesof Information Technology
Multiplexing.
The multiplexing is a technique of transmitting multiple signals over a single medium. It is
performed at the physical layer of the OSI model. For multiple signals to share one medium. The
medium must be divided.
Frequency Division Multiplexing Time Division Multiplexing
29SC161: Principlesof Information Technology

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologiesBatzaya Dashdondog
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsprojectteach
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and networkNirajan Silwal
 
Chapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the InternetChapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the Internetadpeer
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4Alaa2
 
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationCND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationPranoti Doke
 
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networkingshrinivasgnaik
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationKamal Acharya
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETtelecomsutra
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Quaid-i-Azam University
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingSayed Chhattan Shah
 

Was ist angesagt? (20)

Data communication lecture 02
Data communication lecture 02Data communication lecture 02
Data communication lecture 02
 
Lecture 2 review of network technologies
Lecture 2 review of network technologiesLecture 2 review of network technologies
Lecture 2 review of network technologies
 
Lan wan
Lan wanLan wan
Lan wan
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Telecommunication and network
Telecommunication and networkTelecommunication and network
Telecommunication and network
 
Chapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the InternetChapter 1 - Data Communications, Data Networks, and the Internet
Chapter 1 - Data Communications, Data Networks, and the Internet
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Wmcn ch.4
Wmcn ch.4Wmcn ch.4
Wmcn ch.4
 
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data CommunicationCND_22634_UNIT1_MSBTE_Computer network and Data Communication
CND_22634_UNIT1_MSBTE_Computer network and Data Communication
 
15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking15EC44T unit 1 data communication and networking
15EC44T unit 1 data communication and networking
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
Tg04
Tg04Tg04
Tg04
 
Basic Concepts in Wireless LAN
Basic Concepts in Wireless LANBasic Concepts in Wireless LAN
Basic Concepts in Wireless LAN
 
Data communication
Data communicationData communication
Data communication
 
Mobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNETMobile Ad Hoc Network or MANNET
Mobile Ad Hoc Network or MANNET
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1Data Communication and Computer Networking Part # 1
Data Communication and Computer Networking Part # 1
 
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud ComputingKeynote Talk on Recent Advances in Mobile Grid and Cloud Computing
Keynote Talk on Recent Advances in Mobile Grid and Cloud Computing
 
Local area network
Local area networkLocal area network
Local area network
 

Ähnlich wie SC161-Lecture4Part2

Ähnlich wie SC161-Lecture4Part2 (20)

SC161-Lecture4-1
SC161-Lecture4-1SC161-Lecture4-1
SC161-Lecture4-1
 
ITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptxITP-22 -COMPUTER NETWORK.pptx
ITP-22 -COMPUTER NETWORK.pptx
 
Super final-report
Super final-reportSuper final-report
Super final-report
 
homenet-ews.ppt
homenet-ews.ppthomenet-ews.ppt
homenet-ews.ppt
 
Lan pan class 12 ppt
Lan pan class 12 pptLan pan class 12 ppt
Lan pan class 12 ppt
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptxUnit1_COMPUTER_COMMUNICATIONSSlides.pptx
Unit1_COMPUTER_COMMUNICATIONSSlides.pptx
 
Unit - 1.pptx
Unit - 1.pptxUnit - 1.pptx
Unit - 1.pptx
 
Tg04
Tg04Tg04
Tg04
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Computer networks
Computer networksComputer networks
Computer networks
 
NET.pptx
NET.pptxNET.pptx
NET.pptx
 
niceData com.
niceData com.niceData com.
niceData com.
 
niceData com.
niceData com.niceData com.
niceData com.
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
computer network basics
computer network basicscomputer network basics
computer network basics
 
Computer networks--networks
Computer networks--networksComputer networks--networks
Computer networks--networks
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 

Mehr von Thiti Theerathean

Mehr von Thiti Theerathean (8)

Intro to iHybrid - 2015
Intro to iHybrid - 2015Intro to iHybrid - 2015
Intro to iHybrid - 2015
 
ห้องเรียนในศตวรรษที่ 21
ห้องเรียนในศตวรรษที่ 21ห้องเรียนในศตวรรษที่ 21
ห้องเรียนในศตวรรษที่ 21
 
First class teaching techniques
First class teaching techniquesFirst class teaching techniques
First class teaching techniques
 
SC161 Lecture 6
SC161 Lecture 6SC161 Lecture 6
SC161 Lecture 6
 
SC161 Lecture 5
SC161 Lecture 5SC161 Lecture 5
SC161 Lecture 5
 
SC161-Lecture3
SC161-Lecture3SC161-Lecture3
SC161-Lecture3
 
SC161-Lecture2
SC161-Lecture2SC161-Lecture2
SC161-Lecture2
 
SC161-Lecture1
SC161-Lecture1SC161-Lecture1
SC161-Lecture1
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 

SC161-Lecture4Part2

  • 1. Chapter 4 SC161: Principles of Information Technology Communication and Network Part 2: Computer Network Thiti Theerathean Center for Teaching Excellence University of the Thai Chamber of Commerce E-mail : thiti_the@utcc.ac.th
  • 2. 2 • Introduction to Computer Network. - Types of Computer Network. - The basic Configurationsof Computer Network. - The Benefits of Computer Network. • Network Architecture Model. - OSI Model. - InternetModel. • Local Area Network. - The Components of LAN. - Topologies of LAN. • Wide Area Network. - TransmissionFacility. - Modulation. - Multiplexing. SC161: Principlesof Information Technology
  • 3. 3SC161: Principlesof Information Technology A Computer network is an interconnection of computers and computing equipment using either wire and wireless over small or large geographic areas. Twisted pair, Radio wave Coaxial, Fiber Optic Fiber Optic, Microwave
  • 4. 4SC161: Principlesof Information Technology Personal Area Network : PAN A personal area network is a computer network organized around an individual person. PANs typically involve a mobile computer, a cell phone or a handheld computing device such as a PDA. Bluetooth PANs are also called piconet.
  • 5. 5SC161: Principlesof Information Technology The Big Picture of Computer Network.
  • 6. 6SC161: Principlesof Information Technology The Basic Configurations of Computer Network. PCs to LAN LAN to LANs
  • 7. 7SC161: Principlesof Information Technology The Basic Configurations of Computer Network. PC to WAN LAN to WAN
  • 8. 8SC161: Principlesof Information Technology The Benefits of Computer Network People and Organizations use networks for the following reason, the most important of which is the sharing of resource. • Resource sharing • Data and information sharing • Better Communications • Reduced Cost • On-line services • Electronic data interchange
  • 10. 10SC161: Principlesof Information Technology How do you sends a message to your friends ? Message. Department. Company. POST Code. Country. Thiti Theerathean. Faculty of Science. University of the Thai Chamber of Commerce. Vibhavadee-Rangsit Rd. Dindang Department of Information & Communication Technology. Bangkok 10400 Thailand Application Set Transport Set
  • 11. 11SC161: Principlesof Information Technology The Open Systems Interconnection Reference Model The architectural model adopted by the International Standards Organization (OSI) . Bits Frame Packet Segment Data Application Set Transport Set
  • 12. 12SC161: Principlesof Information Technology The Open Systems Interconnection Reference Model Application Interface. Web browser, File Transfer, e-Mail Application Layer Presentation Layer Encryption Data. ASCII, EBCDIC, UNICODE Session Layer Transmission Control. Simplex, Half-duplex, Full-duplexApplication Set Transport Set Transport Layer Flow Control. Connection-Oriented, Connectionless Network Layer Routes data. IP Address Data Link Layer Node to Node Transmission. MAC Address Physical Layer Send and Receive Bits. Signal and Media.
  • 13. 13SC161: Principlesof Information Technology The Internet Model The Internet model is a most widely used that it is accepted as a network architecture. The Internet’s Protocol suite is called Transmission Control Protocol/Internet Protocol (TCP/IP). OSI Model Internet Model Protocols HTTP FTP POP3 DNS TCP UDP IPv4 IPv6 ICMP Not Specified User Data Datagram Packet Segment Encapsulation
  • 14. 14SC161: Principlesof Information Technology The Internet Model in Action. Router Router Link Layer Internet Layer Transport Layer Application Layer Application Layer Transport Layer Internet Layer Internet Layer Internet Layer Link Layer Link Layer Link Layer Link Layer Link Layer
  • 16. 16SC161: Principlesof Information Technology A Local Area Network (LAN) is a communication network that interconnects a variety of data communicating devices within a small geographic area and broadcasts data at high data transfer rates with very low error rates.
  • 17. 17SC161: Principlesof Information Technology Client/Server Microcomputer users, or clients, share services of a centralized computer called a server. Peer-to-Peer Computers share equally with one another without having to rely on a central server.
  • 18. 18SC161: Principlesof Information Technology A Topology is the physical layout of nodes in a network, which often dictates the type of communications protocol used by the network. Topologies of LANs. Three Network Topologies.
  • 19. 19SC161: Principlesof Information Technology T-Connector BUS Desktop Computer Terminator • All nodes are connected to a single wire or cable, called a Backbone. • Node is connected to a backbone with T-connector. • Terminators are required at both ends of the backbone cable. • A message (signal) that is sent by a node travels along the bus through all other nodes.
  • 20. 20SC161: Principlesof Information Technology Server Desktop Computer RING • All the nodes are connected in a closed circle of cable. • Electronic messages are passed around the ring. • The Token determines which user on the network can send information. It is called “Token passing”
  • 21. 21SC161: Principlesof Information Technology • All devices connected with a central Hub. • The Hub monitors the flow of traffic. • The Hub also acts as a repeater for the data flow and then retransmits the signals to all other nodes. Server HUB Desktop Computer
  • 23. 23SC161: Principlesof Information Technology A Wide Area Network (WAN) is a data communications network that covers a relativelybroad geographicarea and that often uses transmissionfacilitiesprovided by common carriers such as telephone companies. A WAN is contrasted to smaller Local Area Networks (LANs) and Metropolitan Area Networks (MANs). Home Network Company Network Internet Service Provider (ISP) InternetSatellite
  • 24. 24SC161: Principlesof Information Technology Transmission Facility. What is the most efficient way to send message over a WAN network ?
  • 25. 25SC161: Principlesof Information Technology Transmission Facility. Circuit switching : Best for voice. Message
  • 26. 26SC161: Principlesof Information Technology Transmission Facility. Packet switching : Best for data. 1 2 3
  • 27. 27SC161: Principlesof Information Technology Modulation. The telephone system transmit analog signals, the transfer of a computer’s digital data over a telephone line requires conversion of the data to an analog signal. • The technique of converting digital data to an analog signal is called “modulation”. • The technique of converting analog signal back to digital data is called “demodulation” Analog signal Digital signal Modem Modulates Signal Modem Demodulates Signal
  • 28. 28SC161: Principlesof Information Technology Multiplexing. The multiplexing is a technique of transmitting multiple signals over a single medium. It is performed at the physical layer of the OSI model. For multiple signals to share one medium. The medium must be divided. Frequency Division Multiplexing Time Division Multiplexing