Module 10-Computer Networks
Module 10-Computer Networks
Module 10
Computer Networks
1. Identify the wired and wireless connections.
2. Explain what a computer network is.
3. Identify network topology.
4. Identify the benefits of using network Models.
5. Discuss the different types of Networks.
6. Explain what is meant by Intranet vs Extranet.
Contents
• WLOC1: Identify the wired and wireless connections.
• WLOC2: Explain what a computer network is.
• WLOC3: Identify network topology.
• WLOC4: Identify the benefits of using network Models.
• WLOC5: Discuss the different types of Networks.
• WLOC6: Explain what is meant by Intranet vs Extranet.
Weekly Learning
Outcomes
Required Reading
1. Chapter 24 - (Introduction to Computers and Information
Technology: Preparing for IC3 Certification)
Recommended Reading
1. Chapter 12- Essential for Computing Studies, Profession And Entrance
Examinations
2. Link1:
https://lms.seu.edu.sa/bbcswebdav/pid-11200099-dt-content-rid-19925
8419_1/xid-199258419_1
3. Link2: https://lms.seu.edu.sa/bbcswebdav/pid-11200100-dt-content-
rid-199258420_1/xid-199258420_1
• Computer Networks
Computer Networks
8
Definition of a computer network
9
Basic concepts and terminology
• Node
A node is any device connected to a network such as a computer, printer, or
C
any other device capable of sending or receiving data.
S
0
0
1
10
Basic concepts and terminology
0
0
1
11
Basic concepts and terminology
• Data Packet
A packet is a formatted unit of data carried by a packet-switched network. In
networking, data is typically broken down into manageable packets before
transmission.
0
0 packets
Sender Receiver
1
12
Basic concepts and terminology
• Protocol
A protocol is a set of rules governing the format and transmission of data.
Examples include the Transmission Control Protocol (TCP) and the Internet
Protocol (IP).
0
0 Set of rules
1 Sender Receiver
13
Basic concepts and terminology
• IP Address
An Internet Protocol (IP) Address is a unique string of numbers separated by
periods or colons that identifies each computer using the IP to communicate
over a network.
S 123.25.91.7
0
0 4 parts
1 3 periods
Each part has number (0-255)
14
Basic concepts and terminology
• MAC Address
A MAC (Media Access Control) address is a unique identifier assigned to a
network interface controller (NIC) for use as a network address in
communications within a network segment.
Structure:
C
• Length: 48 bits.
S • Format: It's usually represented as six
15
Basic concepts and terminology
• Bandwidth
16
Basic concepts and terminology
• Router
A router connects multiple networks together and routes
data packets between them. Typically used in homes and
businesses to connect the local network to the internet
and to route traffic between different networks.
C
Router
S • Switch
A switch connects devices within a single network, using
Switch
0
0 MAC addresses to forward data to the appropriate device.
1 Commonly used in businesses, data centers, and large
networks to connect multiple devices within the same
local network.
17
Basic concepts and terminology
• Hub
18
Basic concepts and terminology
• Physical cabling
the transfer of data between different devices within the network. There are
several types of physical cables used in networking, each suitable for different
C
requirements and network environments.
S
Here is an overview of common network cable types:
0
0 • Twisted Pair Cable.
1
• Coaxial Cable.
19
Basic concepts and terminology
Physical cabling
20
Basic concepts and terminology
Physical cabling
• Coaxial Cable
Used for cable internet connections and cable television. It has
a single copper conductor at its center, a plastic layer providing
insulation between the conductor and a braided metal shield.
C
S
• Fiber Optic Cable
0 Transmits data as light, allowing for very high transmission
0
speeds and longer distances than wire cables. It's immune to
1
electromagnetic interference and is used for backbones, long-
distance communication.
21
Basic concepts and terminology
Physical cabling
Considerations for Network Cabling:
• Distance: Cable types have maximum distance ratings; fiber optics provide
the longest reach.
• Interference: Environments with heavy machinery or fluorescent lighting
C
might require shielded cabling.
S
• Cost: Fiber optics provide high bandwidth and immunity to interference but
0 can be more costly than copper cables.
0
• Installation: Some cables are more flexible and easier to install through
1
conduits ()قنواتand tight spaces, while others are more fragile and require
careful handling, such as fiber optic cables.
22
Benefits of networks
23
Types of Computer Networks
24
Types of Computer Networks
25
Types of Computer Networks
26
Network Topologies
various elements (nodes, links, etc.) of a computer network. It can also refer to
the physical or logical way in which the network is wired. Here's a common
network topologies:
C
• Bus.
S
• Star.
0
0 • Ring.
1
• Mesh.
27
Network Topologies
Bus Topology
• Structure: All devices are connected to a single central cable, known as the
bus or backbone.
• advantage: Easy to implement and extend; requires less cable than other
topologies.
C
• disadvantage: The failure of the central cable will bring down the entire
S network. Limited cable length and number of stations.
0
0
1
28
Network Topologies
Star Topology
• Structure: All devices are connected to a central hub. The hub can be a hub
or switch which acts as a conduit to transmit messages.
• advantage : Easy to install and manage. Failure of one node does not affect
the rest of the network.
C
• disadvantage: If the central hub fails, the whole network is inoperable.
S Requires more cable than bus topology.
0
0
1
29
Network Topologies
Ring Topology
• Structure: Each device is connected to
two other devices, forming a circular
data path. Messages travel around the
ring until they reach their destination.
C
• advantage : Data is quickly transferred
S without a central hub. Adding
additional nodes has little impact on
0
0 bandwidth.
1
• disadvantage: A break in the ring (such
as a failure in any single workstation or
cable) can result in network failure.
30
Network Topologies
Mesh Topology
• Structure: Every device is connected to every other device on the network,
providing multiple pathways for data to travel.
• advantage : Highly reliable, as there is no single point of failure. Provides
robust fault tolerance and ease of troubleshooting.
C
• disadvantage: Costly and complex due to the amount of cabling and the
S number of I/O ports required.
0
0
1
31
Sending Data Long-Distance
Packet-Switching Networks
32
Models of network
33
Models of network
Client-Server Network:
Features:
• Centralized server(s) that manage resources and security.
• Clients request services from the server.
• Can be expanded to serve many clients.
C
• Servers are often more powerful than clients and are dedicated to their
S tasks.
0
0
1
34
Models of network
Client-Server Network:
Advantages:
• Centralized control over the network, including security and updates.
• Easier to backup and manage data.
• Efficient resource sharing.
C
S Disadvantages:
• Server dependence means that if the server goes down, the services it
0
0 provides become unavailable.
1
• Can be expensive to set up and maintain due to the need for powerful
server hardware and software.
35
Models of network
Peer-to-Peer Network:
In a peer-to-peer network, each computer, known as
a peer, can act as both a client and a server. Peers
share resources among each other without the need
for a centralized server.
C
Features:
S • No central server; all computers are equal and
operate both as client and server.
0
0 • Direct sharing of files and resources
1
between peers.
• Simple to configure and less costly to set up.
36
Models of network
Peer-to-Peer Network:
Advantages:
• Reduced costs since there is no need for a server.
• Easy setup and maintenance.
• Each user has control over their own shared resources.
C
S Disadvantages:
• Not ideal for large networks; can become inefficient as the network grows.
0
0 • Each peer must manage its own security.
1
• Lack of centralized backups can lead to data redundancy issues.
37
Wireless Networking Technologies
38
Wireless Networking Technologies
Wireless communications have two tow common technologies:
• Wi-Fi:
Wi-Fi is short for wireless fidelity, often referred to by its standard number: IEEE
802.11. It’s the common name for the wireless networking technology that’s used for
almost all home or workplace or in a public location such as a cafe or library and
business networks today.
C • Bluetooth
S
Bluetooth is a wireless technology used to connect individual devices to one another in
0
close proximity. It is most used to connect a computer to an input or output device. For
0
1 example, Bluetooth headphone that you use with your smartphone.
When the devices are no longer in range of one another, the PAN stops. Bluetooth is
limited to about 20 feet in range, so it isn’t a practical technology to use for wireless
39
networking in general
Network Protocols and the OSI Model
Network protocols are sets of established rules that dictate how to format,
40
Network Protocols and the OSI Model
C
HTTP (Hypertext Transfer Protocol): HTTP is used for transferring
S web pages on the internet. When a user accesses a web page, HTTP
is the protocol that delivers the page from the server to the user’s
0
0 browser.
1
41
Network Protocols and the OSI Model
0
0 DHCP (Dynamic Host Configuration Protocol): DHCP
1
automatically assigns a dynamic IP address to each device on
a network so they can communicate with other IP networks.
42
Network Protocols and the OSI Model
Sender Receiver
43
Network Protocols and the OSI Model
0
0 2.Data Link Layer: Provides node-to-node data transfer—a link between two
1
directly connected nodes. It also handles error correction from the physical
layer.
44
Network Protocols and the OSI Model
C
4.Transport Layer: Provides transparent transfer of data between end systems,
S or hosts, and is responsible for end-to-end error recovery and flow control.
0
0 5.Session Layer: Controls the connections between computers. It establishes,
1
manages, and terminates the connections between the local and remote
application.
45
Network Protocols and the OSI Model
The OSI Model:
6.Presentation Layer: Translates data between the application layer and the
network format. It ensures that data is in a usable format and is where data
encryption occurs.
C
7.Application Layer: Is the closest layer to the end user, which means both the
S OSI application layer, and the user interact directly with the software
application. This layer interacts with software applications that implement a
0
0 communicating component.
1
46
Reference
s
• Weixel, S., (2018). Introduction to Computers and Information
Technology. Pearson.
Restricted
Restricted - مقيد
- مقيد