0% found this document useful (0 votes)
20 views

Computer Networking

The document discusses computer networking including definitions, types of networks based on ownership, advantages of networking, types of networks based on range, network architecture types, topology, types of topologies including point-to-point, bus, ring, star, tree and mesh, and network security and some security methods.

Uploaded by

jisoo.dior.1802
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Computer Networking

The document discusses computer networking including definitions, types of networks based on ownership, advantages of networking, types of networks based on range, network architecture types, topology, types of topologies including point-to-point, bus, ring, star, tree and mesh, and network security and some security methods.

Uploaded by

jisoo.dior.1802
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

COMPUTER

NETWORKING
DEFINITION
When two or more
computers link together for
the purpose of sharing data,
information, and resources,
then it forms a computer
network
TYPES OF NETWORK BASED ON OWNERSHIP

Internet Intranet

A network which is A network which is


accessible to all. It’s privately owned by an
open-source individual or an
organization
ADVANTAGES OF NETWORKING

Cost-effective Backup Communication Tool


Can share hardware If there is a technical It is a convenient
and software issue, then we can mode of
resources allocate the data to communication for
some other computer any organization
in the network which has different
branches
Reduces the need of Real-time delivery
hard copies One can easily share
A piece of information data and information
can be circulated across the globe
easily through a soft
copy
TYPES OF NETWORK BASED ON
RANGE
01 03
PAN MAN
Connects devices within Connects devices within a
33 ft/10 m few hundred kilometres
(metropolitan cities)

02 04
LAN WAN
Connects devices within Connects devices within
10-100 m (more with a country, continent, or
WLAN) the whole world
Types of Network Architecture

Peer-to-peer Client-Server
Peer-to-peer A client-server
architecture (P2P architecture has a
architecture) is a main node (server)
commonly used and side computers
computer networking (clients). The clients
architecture in which requests resources
each or node has the and services and the
same rights. It is a server fulfils their
decentralized form of requests. It is a
network centralized form of
network
TOPOLOGY
The schematic description of
all the nodes in the network
TYPES OF TOPOLOGIES

1. Point-to-point 2. Bus Topology 3. Ring Topology

4. Star Topology 5. Tree Topology 6. Mesh Topology


POINT-TO-
POINT
TOPOLOGY
● In this topology, two nodes
are directly linked to each
other.
● There is a dedicated link
formed between the two
nodes.
● Advantage- Simplest way
to connect two computers.
● Disadvantage- Only two
nodes can be linked.
BUS TOPOLOGY
• In this topology, all the nodes
are connected through a linear
cable called bus/trunk.
• The bus is the backbone of the
network.
• It uses ethernet for connections.
• It is the easiest way to link
multiple devices together.
• Advantage- If one node breaks
down, then it doesn’t affect the
network as a whole.
• Disadvantage- Any disruptions
in the cable can cause the
whole network to collapse.
RING TOPOLOGY
• In this topology, all nodes are
connected to one another in form
of a ring.
• Data travels in circular fashion
• Advantage- Offers high bandwidth
and range. We can connect a large
number of computers.
• Disadvantage- Unidirectional flow.
Addition and removal of systems
causes disruption in the network
STAR TOPOLOGY
• In this topology, there is a central device
called hub (or the alternative device
switch). There is a dedicated link formed
between each device and the central
device through separate cables. All the
data first goes to the central device and
then to the other nodes in the network.
• Advantage- It requires more cables. If
there is a cable failure then it would
affect the functioning of a single device.
No disruption is caused during addition
or removal of systems.
• Disadvantage- More possibility of single-
point failure. Requires more cables.
TREE TOPOLOLOGY
• A Tree topology is a group of Star Networks
connected through a bus. It is also called
Star-bus topology.
• If the main cable connecting the two star
network faces any issues then those two star
networks won’t be able to communicate with
each other but they can communicate
internally.
• Advantage- This topology provides a
hierarchical as well as centralized
arrangement of nodes which makes it highly
manageable. Side nodes can hold more
nodes which will continue the hierarchy of
star networks in the tree network
• Disadvantage- Because of large number of
nodes, it’s a bit slow. Because of it’s complex
structure, repairing it is hard. Requires more
cables.
MESH TOPOLOGY
• In this topology, each node has point-to-
point link with each other. It’s like a version of
point-to-point topology but for multiple
devices.
• It is a decentralized form of network. That
means not only the nodes make requests of
resources and information, it also fulfils other
nodes requests.
• Advantage- Failure in a single cable won’t
break the network. Fault identification Is easy.
Provides multiple paths for data to travel.
Provides high privacy and data security.
• Disadvantages- Installation is difficult. It is
expensive. The process is complex.
Maintenance is difficult.
‘Network Security’ is an
NETWORK umbrella term for a broad
range of technologies,
SECURITY processes, and devices.
Network Security is protection of
a network from unauthorized
access, data theft, misuse, or
any other threats. It creates a
secure infrastructure for
networking.
FEW NETWORK SECURITY METHODS

Firewall Data-loss Access Application


prevention control Security
It is a security Data-loss It is a security Always protect
system which prevention is a process that applications on
checks the method of enables your computer.
ingoing and detecting and organizations (or
outgoing network preventing data individuals) to
traffic. It is like a breaches, manage who
barrier between exfiltration, and has access to
a private network damage to their networks
from the Internet. sesitive data. We and to block
can use Data- unauthorized
loss prevention access.
technologies for
this

You might also like