0% found this document useful (0 votes)
5 views

Module 10-Computer Networks

This document outlines the key concepts and components of computer networks, including definitions, types, benefits, and basic terminology. It covers wired and wireless connections, network topologies, and models such as client-server and peer-to-peer. The content is structured to facilitate learning about networking fundamentals for students in the College of Computing and Informatics.

Uploaded by

wazirkqasem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Module 10-Computer Networks

This document outlines the key concepts and components of computer networks, including definitions, types, benefits, and basic terminology. It covers wired and wireless connections, network topologies, and models such as client-server and peer-to-peer. The content is structured to facilitate learning about networking fundamentals for students in the College of Computing and Informatics.

Uploaded by

wazirkqasem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 47

College of Computing and Informatics

CS001: Computer Essentials


Computer Essentials

Module 10

Computer Networks
1. Identify the wired and wireless connections.
2. Explain what a computer network is.
3. Identify network topology.
4. Identify the benefits of using network Models.
5. Discuss the different types of Networks.
6. Explain what is meant by Intranet vs Extranet.

Contents
• WLOC1: Identify the wired and wireless connections.
• WLOC2: Explain what a computer network is.
• WLOC3: Identify network topology.
• WLOC4: Identify the benefits of using network Models.
• WLOC5: Discuss the different types of Networks.
• WLOC6: Explain what is meant by Intranet vs Extranet.

Weekly Learning
Outcomes
Required Reading
1. Chapter 24 - (Introduction to Computers and Information
Technology: Preparing for IC3 Certification)

Recommended Reading
1. Chapter 12- Essential for Computing Studies, Profession And Entrance
Examinations
2. Link1:
https://lms.seu.edu.sa/bbcswebdav/pid-11200099-dt-content-rid-19925
8419_1/xid-199258419_1
3. Link2: https://lms.seu.edu.sa/bbcswebdav/pid-11200100-dt-content-
rid-199258420_1/xid-199258420_1
• Computer Networks
Computer Networks

A computer network facilitates interaction


among end-users through various modes
C such as phone, email, instant messaging, or
video calls. It also allows for the sharing of
S
resources, including printers, storage, and
0
software, in addition to providing enhanced
0
1 storage capabilities.

8
Definition of a computer network

A computer network is a set of interconnected

computers that can share data, resources,

services. This and allows

interconnection and collaboration between different


communication
C
devices, often over significant distances, for
by
S
following a set of rules and protocols to send and
0
0
receive information. These networks can range from
1
small local area networks in a home or office to vast

global networks such as the internet.

9
Basic concepts and terminology

In the computer networking, several fundamental concepts and terminologies


are foundational to understanding how networks operate. Here is a brief
overview of some of these basic terms:

• Node
A node is any device connected to a network such as a computer, printer, or
C
any other device capable of sending or receiving data.
S

0
0
1

10
Basic concepts and terminology

• Network Interface Cards (NICs)


are hardware components that allow computers to connect to a network.
They act as the interface between the computer's internal circuitry and the
network cables or wireless signals, facilitating data transmission between the
two.
C
S

0
0
1

Wireless NIC Wired NIC

11
Basic concepts and terminology
• Data Packet
A packet is a formatted unit of data carried by a packet-switched network. In
networking, data is typically broken down into manageable packets before
transmission.

0
0 packets
Sender Receiver
1

12
Basic concepts and terminology
• Protocol
A protocol is a set of rules governing the format and transmission of data.
Examples include the Transmission Control Protocol (TCP) and the Internet
Protocol (IP).

0
0 Set of rules
1 Sender Receiver

13
Basic concepts and terminology
• IP Address
An Internet Protocol (IP) Address is a unique string of numbers separated by
periods or colons that identifies each computer using the IP to communicate
over a network.

S 123.25.91.7
0
0 4 parts
1 3 periods
Each part has number (0-255)

14
Basic concepts and terminology
• MAC Address
A MAC (Media Access Control) address is a unique identifier assigned to a
network interface controller (NIC) for use as a network address in
communications within a network segment.

Structure:

C
• Length: 48 bits.
S • Format: It's usually represented as six

0 groups of two hexadecimal digits, separated


0 by colons (e.g., 00:1A:2B:3C:4D:5E) or
1
hyphens (e.g., 00-1A-2B-3C-4D-5E).

15
Basic concepts and terminology

• Bandwidth

refers to the maximum rate of data transfer

across a network or internet connection. It data

determines how much data can be sent Sender Receiver


C
over a specific connection in a
S given
D
0 amount of time. Bandwidth is
0 typically
measured in bits per second (bps) or its A
1 Sender T Receiver
higher multiples such as Mbps (megabits a

per second) or Gbps (gigabits per second).

16
Basic concepts and terminology
• Router
A router connects multiple networks together and routes
data packets between them. Typically used in homes and
businesses to connect the local network to the internet
and to route traffic between different networks.

C
Router
S • Switch
A switch connects devices within a single network, using
Switch
0
0 MAC addresses to forward data to the appropriate device.
1 Commonly used in businesses, data centers, and large
networks to connect multiple devices within the same
local network.

17
Basic concepts and terminology

• Hub

Is a basic networking device that connects multiple

devices in a local area network (LAN). It


Hub
broadcasts
data to all connected devices. Can cause network
C
congestion due to broadcasting to all devices.
S
Key Difference between hub and switch :
0
0
A switch is more efficient than a hub as it sends data
1
only to the intended recipient, whereas a

hub broadcasts data to all devices.

18
Basic concepts and terminology

• Physical cabling

Physical cabling serves as the backbone of a network's infrastructure, enabling

the transfer of data between different devices within the network. There are

several types of physical cables used in networking, each suitable for different
C
requirements and network environments.
S
Here is an overview of common network cable types:
0
0 • Twisted Pair Cable.
1
• Coaxial Cable.

• Fiber Optic Cable.

19
Basic concepts and terminology

Physical cabling

• Twisted Pair Cable

1.Unshielded Twisted Pair (UTP): The most common type


of networking cable. It's composed of pairs of wires
C twisted together to reduce electromagnetic interference.
UTP comes in different categories, such as CAT5e, CAT6
S
and CAT7, each supporting different speeds and
0
bandwidths.
0
1 2.Shielded Twisted Pair (STP): Like UTP, but each pair of
wires is additionally shielded by foil to provide better
protection against electromagnetic interference.

20
Basic concepts and terminology

Physical cabling
• Coaxial Cable
Used for cable internet connections and cable television. It has
a single copper conductor at its center, a plastic layer providing
insulation between the conductor and a braided metal shield.
C

S
• Fiber Optic Cable
0 Transmits data as light, allowing for very high transmission
0
speeds and longer distances than wire cables. It's immune to
1
electromagnetic interference and is used for backbones, long-
distance communication.

21
Basic concepts and terminology

Physical cabling
Considerations for Network Cabling:
• Distance: Cable types have maximum distance ratings; fiber optics provide
the longest reach.
• Interference: Environments with heavy machinery or fluorescent lighting
C
might require shielded cabling.
S
• Cost: Fiber optics provide high bandwidth and immunity to interference but
0 can be more costly than copper cables.
0
• Installation: Some cables are more flexible and easier to install through
1
conduits (‫)قنوات‬and tight spaces, while others are more fragile and require
careful handling, such as fiber optic cables.

22
Benefits of networks

Benefits of Computer Networks:


1. Communication: Networks enable real-time communication, be it through
emails, instant messaging, or video calls.
2. Resource Sharing: Enabling multiple devices to use the same hardware
resources (like printers and scanners) or software applications.
C
3.Storage: Providing centralized data storage, which can be more secure and
S economical than maintaining data across numerous individual devices.
4.Cost-Effectiveness: Reduces the cost of operations by centralizing resources
0
0 and infrastructure, thereby cutting down on hardware and software expenses.
1
5.Collaboration: Promotes collaborative efforts across different geographic
locations, allowing multiple people to work on the same documents or
projects.

23
Types of Computer Networks

Computer networks can be categorized based on their size, range,


and
structure. Here are the primary types of networks you will encounter:
1.Local Area Network (LAN)
• Description: LANs are networks confined to a
small geographic area, like a single building or a
C
campus. They are typically owned, controlled,
S and managed by a single person or organization.
• Features: High transfer speeds, low latency, and LAN
0
0 relatively easy to manage. Uses technologies such
1
as Ethernet and Wi-Fi.
• Usage: Office buildings, homes, schools,
and laboratories.

24
Types of Computer Networks

2.Wide Area Network (WAN)


• Description: WANs encompass broad
geographic areas, crossing city, regional, or
LAN
national boundaries. The internet is the
largest WAN, spanning the entire globe.
C
• Features: Lower speed compared to LANs WAN
S and higher latency. They commonly use
LAN
routers and are not restricted to a single
0 LAN
0 organization.
1
• Usage: Used for multinational businesses,
government agencies, and when
connecting disparate (‫)مختلفة‬LANs.

25
Types of Computer Networks

3. Metropolitan Area Network (MAN)


• Description: A MAN spans a
larger city
area than a LAN but is
confined to a single metropolitan area, LAN
typically
city, or town.
C
• Features: It is larger than a LAN and
Man
S often combines multiple LANs into a
LAN
single larger network, which enables
0
LAN
0 efficient sharing of regional resources.
1
• Usage: City-wide government
networks, large universities.

26
Network Topologies

Network topology refers to the layout pattern of interconnections among the

various elements (nodes, links, etc.) of a computer network. It can also refer to

the physical or logical way in which the network is wired. Here's a common

network topologies:
C
• Bus.
S
• Star.
0
0 • Ring.
1
• Mesh.

27
Network Topologies

Bus Topology
• Structure: All devices are connected to a single central cable, known as the
bus or backbone.
• advantage: Easy to implement and extend; requires less cable than other
topologies.
C
• disadvantage: The failure of the central cable will bring down the entire
S network. Limited cable length and number of stations.

0
0
1

28
Network Topologies

Star Topology
• Structure: All devices are connected to a central hub. The hub can be a hub
or switch which acts as a conduit to transmit messages.
• advantage : Easy to install and manage. Failure of one node does not affect
the rest of the network.
C
• disadvantage: If the central hub fails, the whole network is inoperable.
S Requires more cable than bus topology.

0
0
1

29
Network Topologies

Ring Topology
• Structure: Each device is connected to
two other devices, forming a circular
data path. Messages travel around the
ring until they reach their destination.
C
• advantage : Data is quickly transferred
S without a central hub. Adding
additional nodes has little impact on
0
0 bandwidth.
1
• disadvantage: A break in the ring (such
as a failure in any single workstation or
cable) can result in network failure.

30
Network Topologies

Mesh Topology
• Structure: Every device is connected to every other device on the network,
providing multiple pathways for data to travel.
• advantage : Highly reliable, as there is no single point of failure. Provides
robust fault tolerance and ease of troubleshooting.
C
• disadvantage: Costly and complex due to the amount of cabling and the
S number of I/O ports required.

0
0
1

31
Sending Data Long-Distance
Packet-Switching Networks

• Most networks use packet-switching technology. The sending computer


divides information into tiny segments called packets. Each packet is marked
with a delivery address, so packet transfers are quick and accurate. When
you transfer a file, send an email, or even browse a website, you’re sending
and receiving packets.
C
Circuit-Switching Networks
S
• Some WANs use circuit-switching technology to transmit messages. Circuit-switching
happens on a real, end-to-end connection between the sending computer and the
0
receiving computer, which make up the circuit. There’s no delay on circuit-switching
0
networks, so they are ideal for sending voice messages and for teleconferencing. A
1
telephone network uses circuit-switching

32
Models of network

In networking, the two primary models of


network architecture are client-server and
peer-to-peer (P2P). Each has distinct features,
advantages, and disadvantages, making them
suitable for different situations.
C
Client-Server Network:
S In a client-server network, one or more
central servers provide services to the client
0
0 computers. These services can include access
1
to web pages, data storage, email, or other
resources.

33
Models of network

Client-Server Network:
Features:
• Centralized server(s) that manage resources and security.
• Clients request services from the server.
• Can be expanded to serve many clients.
C
• Servers are often more powerful than clients and are dedicated to their
S tasks.

0
0
1

34
Models of network

Client-Server Network:
Advantages:
• Centralized control over the network, including security and updates.
• Easier to backup and manage data.
• Efficient resource sharing.
C

S Disadvantages:
• Server dependence means that if the server goes down, the services it
0
0 provides become unavailable.
1
• Can be expensive to set up and maintain due to the need for powerful
server hardware and software.

35
Models of network

Peer-to-Peer Network:
In a peer-to-peer network, each computer, known as
a peer, can act as both a client and a server. Peers
share resources among each other without the need
for a centralized server.
C
Features:
S • No central server; all computers are equal and
operate both as client and server.
0
0 • Direct sharing of files and resources
1
between peers.
• Simple to configure and less costly to set up.

36
Models of network

Peer-to-Peer Network:
Advantages:
• Reduced costs since there is no need for a server.
• Easy setup and maintenance.
• Each user has control over their own shared resources.
C

S Disadvantages:
• Not ideal for large networks; can become inefficient as the network grows.
0
0 • Each peer must manage its own security.
1
• Lack of centralized backups can lead to data redundancy issues.

37
Wireless Networking Technologies

Wireless communications have two main uses:


The first use:
• At the endpoints of network connectivity. where a device such as a smartphone or
laptop computer connects wirelessly to a router or other device that provides
network and/or Internet accessEasy setup and maintenance.
The Second use:
C
• as a source of transferring data between locations when using cables is not
practical,
S
such as with satellite and microwave systems.
0
0
1

38
Wireless Networking Technologies
Wireless communications have two tow common technologies:

• Wi-Fi:
 Wi-Fi is short for wireless fidelity, often referred to by its standard number: IEEE
802.11. It’s the common name for the wireless networking technology that’s used for
almost all home or workplace or in a public location such as a cafe or library and
business networks today.
C • Bluetooth
S
 Bluetooth is a wireless technology used to connect individual devices to one another in
0
close proximity. It is most used to connect a computer to an input or output device. For
0
1 example, Bluetooth headphone that you use with your smartphone.

 When the devices are no longer in range of one another, the PAN stops. Bluetooth is
limited to about 20 feet in range, so it isn’t a practical technology to use for wireless
39
networking in general
Network Protocols and the OSI Model

Network protocols are sets of established rules that dictate how to format,

transmit, and receive data so computer network devices can communicate

regardless of the differences in their underlying infrastructures, designs, or

standards. The most important protocols in networking can vary depending on


C
context and use, but generally, the Internet Protocol (IP) and the Transmission
S
Control Protocol (TCP) are among the most crucial for the functioning of the
0
0
internet and most networks.
1

40
Network Protocols and the OSI Model

TCP/IP (Transmission Control Protocol/Internet Protocol): This is the


foundational communication protocol suite of the internet and most
local networks, defining how data should be packetized, addressed,
transmitted, routed, and received.

C
HTTP (Hypertext Transfer Protocol): HTTP is used for transferring
S web pages on the internet. When a user accesses a web page, HTTP
is the protocol that delivers the page from the server to the user’s
0
0 browser.
1

HTTPS (HTTP Secure): An extension of HTTP, it is used for secure


communication over a computer network within a web browser.

41
Network Protocols and the OSI Model

FTP (File Transfer Protocol): As its name suggests, FTP is


used for the transfer of files between a client and a server
on a network.

DNS (Domain Name System): DNS translates human-


C
readable domain names (like www.example.com)
S 123.25.91.7
into machine-readable IP addresses. Ex:

0
0 DHCP (Dynamic Host Configuration Protocol): DHCP
1
automatically assigns a dynamic IP address to each device on
a network so they can communicate with other IP networks.

42
Network Protocols and the OSI Model

Sender Receiver

Application Layer 7 Application

Presentation Layer 6 Presentation


C
Session Layer 5 Session
S
Transport Layer 4 Transpor
0 t
Network Layer 3 Network
0
1 Data Link Layer 2 Data Link

Physical Layer 1 Physical

43
Network Protocols and the OSI Model

The OSI Model:


The Open Systems Interconnection (OSI) model is a conceptual framework
used to understand and implement standard protocols to facilitate
interoperability in networking. It divides the networking process into seven
layers:
C
1.Physical Layer: Concerned with the transmission and reception of the
S unstructured raw bit stream over a physical medium.

0
0 2.Data Link Layer: Provides node-to-node data transfer—a link between two
1
directly connected nodes. It also handles error correction from the physical
layer.

44
Network Protocols and the OSI Model

The OSI Model:


3.Network Layer: Handles the routing of the data (sending it in the right
direction to the correct destination on outgoing transmissions and receiving
incoming transmissions at the packet level).

C
4.Transport Layer: Provides transparent transfer of data between end systems,
S or hosts, and is responsible for end-to-end error recovery and flow control.

0
0 5.Session Layer: Controls the connections between computers. It establishes,
1
manages, and terminates the connections between the local and remote
application.

45
Network Protocols and the OSI Model
The OSI Model:

6.Presentation Layer: Translates data between the application layer and the
network format. It ensures that data is in a usable format and is where data
encryption occurs.

C
7.Application Layer: Is the closest layer to the end user, which means both the
S OSI application layer, and the user interact directly with the software
application. This layer interacts with software applications that implement a
0
0 communicating component.
1

46
Reference
s
• Weixel, S., (2018). Introduction to Computers and Information
Technology. Pearson.

Restricted
Restricted - ‫مقيد‬
- ‫مقيد‬

You might also like