Lecture 4 - Computer Networking Concepts
Lecture 4 - Computer Networking Concepts
Applications
Lecture 4: Overview of Computer Networks
Nyalala Innocent
• Evolution of Networking
• Networking Devices
• Networking Topologies
• The network size may vary from small to large depending on the number
of computers it connects. A computer network can include different hosts
(called nodes) like servers, desktops, laptops, and cellular phones.
• Once you begin working with a computer, you will likely become more
productive.
• However, what do you do with that increased productivity if you are not
connected to anyone?
• Let's look at some of the resources that are commonly shared over
computer networks:
❑ Peripherals - additional components that attach to a computer,
called peripherals, like printers, scanners, and speakers, are
purchased and are connected to that computer to expand its use.
• The geographical area covered by a LAN can range from a single room,
floor, or office with one or more buildings in the same premise, a
laboratory, a school, a college, or a university campus.
• The data transfer rate in MAN also ranges in Mbps, but it is considerably
less than LAN. Cable TV networks or cable-based broadband internet
services are examples of MAN.
• Wide Area Network connects computers and other LANs and MANs, which
are spread across different geographical locations of a country or in
different countries or continents. A WAN could be formed by connecting a
LAN to other LANs via wired/wireless media.
• It is a small plastic plug that fits into the RJ-45 jacks of the Ethernet
cards in various computing devices.
• Signals lose their strength beyond this limit and become weak. In such
conditions, original signals need to be regenerated.
• Data arriving on any of the lines are sent out on all the others.
• When data arrives, the switch extracts the destination address from
the data packet and looks it up in a table to see where to send the
packet.
• These days, home Wi-Fi routers perform the dual task of a router and a
modem/ switch.
• The gateway serves as the entry and exit point of a network, as all data
coming in or going out of a network must first pass through the
gateway to use routing paths
• Also, such networks are more reliable because even if a node gets
down, it does not cause any break in data transmission between other
nodes.
Lec 2 Introduction to Computer Applications 47
• This topology is also more secure than other topologies because each
cable between two nodes carries different data.
• Data sent from a node are passed on to the bus and hence are transmitted
to the length of the bus in both directions. That means that any nodes
connected to the bus can receive data.
• In this topology, a single backbone wire called a bus is shared among the
nodes, which makes it cheaper and easier to maintain. Both ring and bus
topologies are less secure and less reliable.
Lec 2 Introduction to Computer Applications 52
Lec 2 Introduction to Computer Applications 53
4. Star Topology
• Although disturbance in one device will not affect the rest of the
network, any failure in a central networking device may lead to
complete network failure.
• Such topologies are usually realized in WANs where multiple LANs are
connected.
• Internet users at any one computer can get information from any other
computer.
Lec 2 Introduction to Computer Applications 60
Lec 2 Introduction to Computer Applications 61
• The Internet is the global network of computing devices, including
desktops, laptops, servers, tablets, mobile phones, handheld devices,
printers, scanners, routers, switches, gateways, etc.
• The World Wide Web consists of documents called Web pages that
contain information on a particular topic. A Web page might also
contain one or more links that point to other Web pages
The three fundamental technologies that lead to the creation of the Web:
• Several Web sites provide search facilities, and the Internet Service
Provider will link to these sites.
• Each user must have an address that other users need to know to send
messages to them.
• It is also very accessible since you can read your e-mail on any suitable
computer anywhere in the world.