SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Computer - Networking
TEACHER:MAHEEN AQEEL
What is a Computer Network?
A computer network is a system in which multiple computers are connected
to each other to share information and resources.
Characteristics of a computer network
 Share Resources from one computer to another
 Create files and store them in one computer, access those files from the other
computer(s) connected over the network
 Connect a printer, scanner, or a fax machine to one computer within the
network and let other computers of the network use the machines available
over network.
Following is the list of hardware's required to setup a computer network.
 Network Cables
 Distributors
 Routers
 Internal Network Cards
 External Network Cards
Computer - Networking
TEACHER:MAHEEN AQEEL
Network Cables
Network cables are used to connect computers. The most commonly used
cable is Category 5 cable RJ-45.
Distributors
A computer can be connected to another one via a serial port but if we need
to connect many computers to produce a network, this serial connection will
not work. The solution is to use a central body to which other computers,
printers, scanners etc. can be connected and then this body will manage or
distribute network traffic.
Computer - Networking
TEACHER:MAHEEN AQEEL
Router
A router is a type of device which acts as the central point among
computers and other devices that are part of a network. A router is
equipped with holes called ports and computers and other devices are
connected to a router using network cables. Now-a-days router comes in
wireless modes using which computers can be connected without any
physical cable.
Network Card
Network card is a necessary component of a computer without which a
computer cannot be connected over a network. It is also known as network
adapter or Network Interface Card (NIC). Most branded computers have
network card pre-installed. Network cards are of two types : Internal and
External Network Cards.
Computer - Networking
TEACHER:MAHEEN AQEEL
INTERNAL NETWORK CARDS
Motherboard has a slot for internal network card where it is to be inserted.
Internal network cards are of two types in which first type uses Peripheral
Component Interconnect (PCI) connection while the second type uses
Industry Standard Architecture (ISA). Network cables are required to
provide network access.
EXTERNAL NETWORK CARDS
External network cards come in two flavours : Wireless and USB based.
Wireless network card need to be inserted into the motherboard but no
network cable is required to connect to network
Computer - Networking
TEACHER:MAHEEN AQEEL
Universal Serial Bus (USB)
USB card are easy to use and connect via USB port. Computers
automatically detect USB card and can install the drivers required to
support the USB network card automatically.
Computer - Internet and Intranet
Internet
It is a worldwide system which has the following characteristics:
 Internet is a world-wide / global system of interconnected computer networks.
 Internet uses the standard Internet Protocol (TCP/IP)
 Every computer in internet is identified by a unique IP address.
 IP Address is a unique set of numbers (such as 110.22.33.114) which identifies
a computer’s location.
 A special computer DNS (Domain Name Server) is used to give name to the IP
Address so that user can locate a computer by a name.
Computer - Networking
TEACHER:MAHEEN AQEEL
 For example, a DNS server will resolve a name http://www.google.com to a
particular IP address to uniquely identify the computer on which this website is
hosted.
 Internet is accessible to every user all over the world.
Intranet
 Intranet is system in which multiple PCs are connected to each other.
 PCs in intranet are not available to the world outside the intranet.
 Usually each company or organization has their own Intranet network and
members/employees of that company can access the computers in their
intranet.
 Each computer in Intranet is also identified by an IP Address which is unique
among the computers in that Intranet.
Computer - Networking
TEACHER:MAHEEN AQEEL
Similarities in Internet and Intranet
 Intranet uses the internet protocols such as TCP/IP and FTP.
 Intranet sites are accessible via web browser in similar way as websites in
internet. But only members of Intranet network can access intranet hosted
sites.
 In Intranet, own instant messengers can be used as similar to yahoo
messenger/ gtalk over the internet.
Differences in Internet and Intranet
 Internet is general to PCs all over the world whereas Intranet is specific to few
PCs.
 Internet has wider access and provides a better access to websites to large
population whereas Intranet is restricted.
 Internet is not as safe as Intranet as Intranet can be safely privatized as per the
need.
Computer - Networking
TEACHER:MAHEEN AQEEL
Data Communication & Computer Network
Data communications refers to the transmission of this digital data between
two or more computers and a computer network or data network is a
telecommunications network that allows computers to exchange data. The
physical connection between networked computing devices is established
using either cable media or wireless media. The best-known computer
network is the Internet.
DCN - Computer Network Types
Generally, networks are distinguished based on their geographical span. A
network can be as small as distance between your mobile phone and its
Bluetooth headphone and as large as the internet itself, covering the whole
geographical world,
Personal Area Network
A Personal Area Network (PAN) is smallest network which is very personal
to a user. This may include Bluetooth enabled devices or infra-red enabled
devices. PAN has connectivity range up to 10 meters. PAN may include
wireless computer keyboard and mouse, Bluetooth enabled headphones,
wireless printers and TV remotes.
Computer - Networking
TEACHER:MAHEEN AQEEL
For example, Piconet is Bluetooth-enabled Personal Area Network which
may contain up to 8 devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single
administrative system is generally termed as Local Area Network (LAN).
Usually,LAN covers an organization’ offices, schools, colleges or universities.
Number of systems connected in LAN may vary from as least as two to as
much as 16 million.
LAN provides a useful way of sharing the resources between end users.The
resources such as printers, file servers, scanners, and internet are easily
sharable among computers.
Computer - Networking
TEACHER:MAHEEN AQEEL
LANs are composed of inexpensive networking and routing equipment. It
may contains local servers serving file storage and other locally shared
applications. It mostly operates on private IP addresses and does not
involve heavy routing. LAN works under its own local domain and controlled
centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely
employed LAN technology and uses Star topology, while Token-ring is rarely
seen.
LAN can be wired,wireless, or in both forms at once.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city
such as cable TV network. It can be in the form of Ethernet,Token-ring,
ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables
its users to expand their Local Area Networks. For example, MAN can help
an organization to connect all of its offices in a city.
Computer - Networking
TEACHER:MAHEEN AQEEL
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works
in between Local Area Network and Wide Area Network. MAN provides
uplink for LANs to WANs or internet.
Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area
which may span across provinces and even a whole country. Generally,
telecommunication networks are Wide Area Network. These networks
provide connectivity to MANs and LANs. Since they are equipped with very
high speed backbone, WANs use very expensive network equipment.
Computer - Networking
TEACHER:MAHEEN AQEEL
WAN may use advanced technologies such as Asynchronous Transfer Mode
(ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may
be managed by multiple administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is
the largest network in existence on this planet.The internet hugely connects
all WANs and it can have connection to LANs and Home networks. Internet
uses TCP/IP protocol suite and uses IP as its addressing protocol. Present
day, Internet is widely implemented using IPv4. Because of shortage of
address spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of
information worldwide. It uses WWW, FTP, email services, audio and video
streaming etc. At huge level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect
various continents, fibers are laid under sea known to us as submarine
communication cable.
Internet is widely deployed on World Wide Web services using HTML linked
pages and is accessible by client software known as Web Browsers. When a
user requests a page using some web browser located on some Web Server
Computer - Networking
TEACHER:MAHEEN AQEEL
anywhere in the world, the Web Server responds with the proper HTML
page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life.
Some of them are:
 Web sites
 E-mail
 Instant Messaging
 Blogging
 Social Media
 Marketing
 Networking
 Resource Sharing
 Audio and Video Streaming
DCN - Computer Network Toplogies
A Network Topology is the arrangement with which computer systems or
network devices are connected to each other. Topologies may define both
physical and logical aspect of the network. Both logical and physical
topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer,
switches or routers, servers connected back to back using a single piece of
cable. Often, the receiving end of one host is connected to sending end of
the other and vice-versa.
Computer - Networking
TEACHER:MAHEEN AQEEL
If the hosts are connected point-to-point logically, then may have multiple
intermediate devices. But the end hosts are unaware of underlying network
and see each other as if they are connected directly.
Bus Topology
In case of Bus topology, all devices share single communication line or
cable.Bus topology may have problem while multiple hosts sending data at
the same time. Therefore, Bus topology either uses CSMA/CD technology or
recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other
devices. But failure of the shared communication line can make all other
devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in
only one direction and as soon as it reaches the extreme end, the
terminator removes the data from the line.
Computer - Networking
TEACHER:MAHEEN AQEEL
Star Topology
All hosts in Star topology are connected to a central device, known as hub
device, using a point-to-point connection. That is, there exists a point to
point connection between hosts and hub. The hub device can be any of the
following:
 Layer-1 device such as hub or repeater
 Layer-2 device such as switch or bridge
 Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails,
connectivity of all hosts to all other hosts fails. Every communication
between hosts, takes place through only the hub.Star topology is not
expensive as to connect one more host, only one cable is required and
configuration is simple.
Computer - Networking
TEACHER:MAHEEN AQEEL
Ring Topology
In ring topology, each host machine connects to exactly two other
machines, creating a circular network structure. When one host tries to
communicate or send message to a host which is not adjacent to it, the
data travels through all intermediate hosts. To connect one more host in
the existing structure, the administrator may need only one more extra
cable.
Failure of any host results in failure of the whole ring.Thus, every
connection in the ring is a point of failure. There are methods which employ
one more backup ring.
Computer - Networking
TEACHER:MAHEEN AQEEL
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This
topology has hosts in point-to-point connection with every other host or
may also have hosts which are in point-to-point connection to few hosts
only.
Hosts in Mesh topology also work as relay for other hosts which do not have
direct point-to-point links. Mesh technology comes into two types:
 Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides
the most reliable network structure among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
Computer - Networking
TEACHER:MAHEEN AQEEL
Tree Topology
Also known as Hierarchical Topology, this is the most common form of
network topology in use presently.This topology imitates as extended Star
topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network.
Mainly in LANs, a network is bifurcated into three types of network devices.
The lowermost is access-layer where computers are attached. The middle
layer is known as distribution layer, which works as mediator between
upper layer and lower layer. The highest layer is known as core layer, and
is central point of the network, i.e. root of the tree from which all nodes
fork.
All neighboring hosts have point-to-point connection between them.Similar
to the Bus topology, if the root goes down, then the entire network suffers
even.though it is not the single point of failure. Every connection serves as
point of failure, failing of which divides the network into unreachable
segment.
Computer - Networking
TEACHER:MAHEEN AQEEL
Hybrid Topology
A network structure whose design contains more than one topology is said
to be hybrid topology. Hybrid topology inherits merits and demerits of all
the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining
topologies may contain attributes of Star, Ring, Bus, and Daisy-chain
topologies. Most WANs are connected by means of Dual-Ring topology and
networks connected to them are mostly Star topology networks. Internet is
the best example of largest Hybrid topology
Computer - Networking
TEACHER:MAHEEN AQEEL
DCN – Overview
A system of interconnected computers and computerized peripherals such
as printers is called computer network. This interconnection among
computers facilitates information sharing among them. Computers may
connect to each other by either wired or wireless media.
Classification of Computer Networks
Computer networks are classified based on various factors.They includes:
 Geographical span
 Inter-connectivity
 Administration
 Architecture
Geographical Span
Geographically a network can be seen in one of the following categories:
 It may be spanned across your table, among Bluetooth enabled devices,.
Ranging not more than few meters.
 It may be spanned across a whole building, including intermediate devices to
connect all floors.
 It may be spanned across a whole city.
 It may be spanned across multiple cities or provinces.
 It may be one network covering whole world.
Inter-Connectivity
Components of a network can be connected to each other differently in
some fashion. By connectedness we mean either logically , physically , or
both ways.
 Every single device can be connected to every other device on network, making
the network mesh.
Computer - Networking
TEACHER:MAHEEN AQEEL
 All devices can be connected to a single medium but geographically
disconnected, created bus like structure.
 Each device is connected to its left and right peers only, creating linear structure.
 All devices connected together with a single device, creating star like structure.
 All devices connected arbitrarily using all previous ways to connect each other,
resulting in a hybrid structure.
Administration
From an administrator’s point of view, a network can be private network
which belongs a single autonomous system and cannot be accessed outside
its physical or logical domain.A network can be public which is accessed by
all.
Network Architecture
Computer networks can be discriminated into various types such as Client-
Server,peer-to-peer or hybrid, depending upon its architecture.
 There can be one or more systems acting as Server. Other being Client, requests
the Server to serve requests.Server takes and processes request on behalf of
Clients.
 Two systems can be connected Point-to-Point, or in back-to-back fashion. They
both reside at the same level and called peers.
 There can be hybrid network which involves network architecture of both the
above types.
Network Applications
Computer systems and peripherals are connected to form a network.They
provide numerou advantages:
 Resource sharing such as printers and storage devices
 Exchange of information by means of e-Mails and FTP
 Information sharing by using Web or Internet
 Interaction with other users using dynamic web pages
 IP phones
Computer - Networking
TEACHER:MAHEEN AQEEL
 Video conferences
 Parallel computing
 Instant messaging

Weitere ähnliche Inhalte

Was ist angesagt? (20)

The Trojan Horse (Computing)
The Trojan Horse (Computing)The Trojan Horse (Computing)
The Trojan Horse (Computing)
 
Internet working
Internet workingInternet working
Internet working
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Internet
InternetInternet
Internet
 
Computer Network & Types
Computer Network & TypesComputer Network & Types
Computer Network & Types
 
WWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINEWWW, WEB BROWSER AND SEARCH ENGINE
WWW, WEB BROWSER AND SEARCH ENGINE
 
Internet
InternetInternet
Internet
 
Computer network
Computer networkComputer network
Computer network
 
internet ppt
internet pptinternet ppt
internet ppt
 
INTERNET TECHNOLOGY
INTERNET  TECHNOLOGYINTERNET  TECHNOLOGY
INTERNET TECHNOLOGY
 
Computer network
Computer networkComputer network
Computer network
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
The History Of The Internet Presentation
The  History Of The  Internet  PresentationThe  History Of The  Internet  Presentation
The History Of The Internet Presentation
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
web browser ppt
web browser pptweb browser ppt
web browser ppt
 
Internet and its uses
Internet and its usesInternet and its uses
Internet and its uses
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Networking presentation
Networking presentationNetworking presentation
Networking presentation
 

Ähnlich wie Data Communication & Computer Network

Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfJafarHussain48
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Data Communications and Computer Networks
Data Communications and Computer NetworksData Communications and Computer Networks
Data Communications and Computer NetworksMarwinJohnBCorpuz
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxcockekeshia
 
Introduction to Network
Introduction to NetworkIntroduction to Network
Introduction to NetworkFatin Afifah
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 

Ähnlich wie Data Communication & Computer Network (20)

Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Computer network
Computer networkComputer network
Computer network
 
BASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdfBASIC_COMPUTER_NETWORKING (1).pdf
BASIC_COMPUTER_NETWORKING (1).pdf
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
Data Communications and Computer Networks
Data Communications and Computer NetworksData Communications and Computer Networks
Data Communications and Computer Networks
 
Networking
NetworkingNetworking
Networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docxWeek 3 Learning ResourcesThis page contains the Learning Resou.docx
Week 3 Learning ResourcesThis page contains the Learning Resou.docx
 
Introduction to Network
Introduction to NetworkIntroduction to Network
Introduction to Network
 
Lecture 01 networking
Lecture 01 networkingLecture 01 networking
Lecture 01 networking
 
Computer network
Computer networkComputer network
Computer network
 
Fg c
Fg cFg c
Fg c
 
Bab3
Bab3Bab3
Bab3
 

Mehr von Faraz Ahmed

Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpyFaraz Ahmed
 
Number System Conversion
Number System ConversionNumber System Conversion
Number System ConversionFaraz Ahmed
 
Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Faraz Ahmed
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyFaraz Ahmed
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking BasicFaraz Ahmed
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional EthicsFaraz Ahmed
 
Computer random access memory
Computer   random access memoryComputer   random access memory
Computer random access memoryFaraz Ahmed
 
Computer Output Devices
Computer   Output DevicesComputer   Output Devices
Computer Output DevicesFaraz Ahmed
 
Computer Motherboard
Computer   MotherboardComputer   Motherboard
Computer MotherboardFaraz Ahmed
 
Computer input devices
Computer   input devicesComputer   input devices
Computer input devicesFaraz Ahmed
 
computer components
computer componentscomputer components
computer componentsFaraz Ahmed
 
Artificial Intelligence
Artificial Intelligence  Artificial Intelligence
Artificial Intelligence Faraz Ahmed
 

Mehr von Faraz Ahmed (14)

Intoduction to numpy
Intoduction to numpyIntoduction to numpy
Intoduction to numpy
 
Number System Conversion
Number System ConversionNumber System Conversion
Number System Conversion
 
Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)Basic CPU (Central Processing Unit)
Basic CPU (Central Processing Unit)
 
History and Introduction to Information and Communication Technology
History and Introduction to Information and Communication TechnologyHistory and Introduction to Information and Communication Technology
History and Introduction to Information and Communication Technology
 
Computer Networking Basic
Computer Networking BasicComputer Networking Basic
Computer Networking Basic
 
Professional Ethics
Professional EthicsProfessional Ethics
Professional Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer random access memory
Computer   random access memoryComputer   random access memory
Computer random access memory
 
Computer Output Devices
Computer   Output DevicesComputer   Output Devices
Computer Output Devices
 
Computer Motherboard
Computer   MotherboardComputer   Motherboard
Computer Motherboard
 
Computer Memory
Computer MemoryComputer Memory
Computer Memory
 
Computer input devices
Computer   input devicesComputer   input devices
Computer input devices
 
computer components
computer componentscomputer components
computer components
 
Artificial Intelligence
Artificial Intelligence  Artificial Intelligence
Artificial Intelligence
 

Kürzlich hochgeladen

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 

Kürzlich hochgeladen (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 

Data Communication & Computer Network

  • 1. Computer - Networking TEACHER:MAHEEN AQEEL What is a Computer Network? A computer network is a system in which multiple computers are connected to each other to share information and resources. Characteristics of a computer network  Share Resources from one computer to another  Create files and store them in one computer, access those files from the other computer(s) connected over the network  Connect a printer, scanner, or a fax machine to one computer within the network and let other computers of the network use the machines available over network. Following is the list of hardware's required to setup a computer network.  Network Cables  Distributors  Routers  Internal Network Cards  External Network Cards
  • 2. Computer - Networking TEACHER:MAHEEN AQEEL Network Cables Network cables are used to connect computers. The most commonly used cable is Category 5 cable RJ-45. Distributors A computer can be connected to another one via a serial port but if we need to connect many computers to produce a network, this serial connection will not work. The solution is to use a central body to which other computers, printers, scanners etc. can be connected and then this body will manage or distribute network traffic.
  • 3. Computer - Networking TEACHER:MAHEEN AQEEL Router A router is a type of device which acts as the central point among computers and other devices that are part of a network. A router is equipped with holes called ports and computers and other devices are connected to a router using network cables. Now-a-days router comes in wireless modes using which computers can be connected without any physical cable. Network Card Network card is a necessary component of a computer without which a computer cannot be connected over a network. It is also known as network adapter or Network Interface Card (NIC). Most branded computers have network card pre-installed. Network cards are of two types : Internal and External Network Cards.
  • 4. Computer - Networking TEACHER:MAHEEN AQEEL INTERNAL NETWORK CARDS Motherboard has a slot for internal network card where it is to be inserted. Internal network cards are of two types in which first type uses Peripheral Component Interconnect (PCI) connection while the second type uses Industry Standard Architecture (ISA). Network cables are required to provide network access. EXTERNAL NETWORK CARDS External network cards come in two flavours : Wireless and USB based. Wireless network card need to be inserted into the motherboard but no network cable is required to connect to network
  • 5. Computer - Networking TEACHER:MAHEEN AQEEL Universal Serial Bus (USB) USB card are easy to use and connect via USB port. Computers automatically detect USB card and can install the drivers required to support the USB network card automatically. Computer - Internet and Intranet Internet It is a worldwide system which has the following characteristics:  Internet is a world-wide / global system of interconnected computer networks.  Internet uses the standard Internet Protocol (TCP/IP)  Every computer in internet is identified by a unique IP address.  IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a computer’s location.  A special computer DNS (Domain Name Server) is used to give name to the IP Address so that user can locate a computer by a name.
  • 6. Computer - Networking TEACHER:MAHEEN AQEEL  For example, a DNS server will resolve a name http://www.google.com to a particular IP address to uniquely identify the computer on which this website is hosted.  Internet is accessible to every user all over the world. Intranet  Intranet is system in which multiple PCs are connected to each other.  PCs in intranet are not available to the world outside the intranet.  Usually each company or organization has their own Intranet network and members/employees of that company can access the computers in their intranet.  Each computer in Intranet is also identified by an IP Address which is unique among the computers in that Intranet.
  • 7. Computer - Networking TEACHER:MAHEEN AQEEL Similarities in Internet and Intranet  Intranet uses the internet protocols such as TCP/IP and FTP.  Intranet sites are accessible via web browser in similar way as websites in internet. But only members of Intranet network can access intranet hosted sites.  In Intranet, own instant messengers can be used as similar to yahoo messenger/ gtalk over the internet. Differences in Internet and Intranet  Internet is general to PCs all over the world whereas Intranet is specific to few PCs.  Internet has wider access and provides a better access to websites to large population whereas Intranet is restricted.  Internet is not as safe as Intranet as Intranet can be safely privatized as per the need.
  • 8. Computer - Networking TEACHER:MAHEEN AQEEL Data Communication & Computer Network Data communications refers to the transmission of this digital data between two or more computers and a computer network or data network is a telecommunications network that allows computers to exchange data. The physical connection between networked computing devices is established using either cable media or wireless media. The best-known computer network is the Internet. DCN - Computer Network Types Generally, networks are distinguished based on their geographical span. A network can be as small as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole geographical world, Personal Area Network A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes.
  • 9. Computer - Networking TEACHER:MAHEEN AQEEL For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices connected together in a master-slave fashion. Local Area Network A computer network spanned inside a building and operated under single administrative system is generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools, colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as 16 million. LAN provides a useful way of sharing the resources between end users.The resources such as printers, file servers, scanners, and internet are easily sharable among computers.
  • 10. Computer - Networking TEACHER:MAHEEN AQEEL LANs are composed of inexpensive networking and routing equipment. It may contains local servers serving file storage and other locally shared applications. It mostly operates on private IP addresses and does not involve heavy routing. LAN works under its own local domain and controlled centrally. LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. LAN can be wired,wireless, or in both forms at once. Metropolitan Area Network The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city.
  • 11. Computer - Networking TEACHER:MAHEEN AQEEL Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet. Wide Area Network As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across provinces and even a whole country. Generally, telecommunication networks are Wide Area Network. These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed backbone, WANs use very expensive network equipment.
  • 12. Computer - Networking TEACHER:MAHEEN AQEEL WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple administration. Internetwork A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server model. Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by client software known as Web Browsers. When a user requests a page using some web browser located on some Web Server
  • 13. Computer - Networking TEACHER:MAHEEN AQEEL anywhere in the world, the Web Server responds with the proper HTML page. The communication delay is very low. Internet is serving many proposes and is involved in many aspects of life. Some of them are:  Web sites  E-mail  Instant Messaging  Blogging  Social Media  Marketing  Networking  Resource Sharing  Audio and Video Streaming DCN - Computer Network Toplogies A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network. Point-to-Point Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa.
  • 14. Computer - Networking TEACHER:MAHEEN AQEEL If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly. Bus Topology In case of Bus topology, all devices share single communication line or cable.Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning. Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line.
  • 15. Computer - Networking TEACHER:MAHEEN AQEEL Star Topology All hosts in Star topology are connected to a central device, known as hub device, using a point-to-point connection. That is, there exists a point to point connection between hosts and hub. The hub device can be any of the following:  Layer-1 device such as hub or repeater  Layer-2 device such as switch or bridge  Layer-3 device such as router or gateway As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place through only the hub.Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple.
  • 16. Computer - Networking TEACHER:MAHEEN AQEEL Ring Topology In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring.
  • 17. Computer - Networking TEACHER:MAHEEN AQEEL Mesh Topology In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to-point connection to few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links. Mesh technology comes into two types:  Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies.  Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.
  • 18. Computer - Networking TEACHER:MAHEEN AQEEL Tree Topology Also known as Hierarchical Topology, this is the most common form of network topology in use presently.This topology imitates as extended Star topology and inherits properties of bus topology. This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. The lowermost is access-layer where computers are attached. The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. All neighboring hosts have point-to-point connection between them.Similar to the Bus topology, if the root goes down, then the entire network suffers even.though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment.
  • 19. Computer - Networking TEACHER:MAHEEN AQEEL Hybrid Topology A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. The above picture represents an arbitrarily hybrid topology. The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology
  • 20. Computer - Networking TEACHER:MAHEEN AQEEL DCN – Overview A system of interconnected computers and computerized peripherals such as printers is called computer network. This interconnection among computers facilitates information sharing among them. Computers may connect to each other by either wired or wireless media. Classification of Computer Networks Computer networks are classified based on various factors.They includes:  Geographical span  Inter-connectivity  Administration  Architecture Geographical Span Geographically a network can be seen in one of the following categories:  It may be spanned across your table, among Bluetooth enabled devices,. Ranging not more than few meters.  It may be spanned across a whole building, including intermediate devices to connect all floors.  It may be spanned across a whole city.  It may be spanned across multiple cities or provinces.  It may be one network covering whole world. Inter-Connectivity Components of a network can be connected to each other differently in some fashion. By connectedness we mean either logically , physically , or both ways.  Every single device can be connected to every other device on network, making the network mesh.
  • 21. Computer - Networking TEACHER:MAHEEN AQEEL  All devices can be connected to a single medium but geographically disconnected, created bus like structure.  Each device is connected to its left and right peers only, creating linear structure.  All devices connected together with a single device, creating star like structure.  All devices connected arbitrarily using all previous ways to connect each other, resulting in a hybrid structure. Administration From an administrator’s point of view, a network can be private network which belongs a single autonomous system and cannot be accessed outside its physical or logical domain.A network can be public which is accessed by all. Network Architecture Computer networks can be discriminated into various types such as Client- Server,peer-to-peer or hybrid, depending upon its architecture.  There can be one or more systems acting as Server. Other being Client, requests the Server to serve requests.Server takes and processes request on behalf of Clients.  Two systems can be connected Point-to-Point, or in back-to-back fashion. They both reside at the same level and called peers.  There can be hybrid network which involves network architecture of both the above types. Network Applications Computer systems and peripherals are connected to form a network.They provide numerou advantages:  Resource sharing such as printers and storage devices  Exchange of information by means of e-Mails and FTP  Information sharing by using Web or Internet  Interaction with other users using dynamic web pages  IP phones
  • 22. Computer - Networking TEACHER:MAHEEN AQEEL  Video conferences  Parallel computing  Instant messaging