Computer Networks. Today’s Goals: (Computer Networks) We will become able to appreciate the role of networks in computing We will look at several different.

Slides:



Advertisements
Similar presentations
Networks Unit 3 & 4 IP&M JEOPARDY Acknowledgements: VITTA for the jeopardy pro-forma Mark Kelly’s Network slideshow.
Advertisements

Physical Structures Before discussing networks, we need to define some network attributes. Type of Connection 1- Point-to-Point 2- point-to-Multi point.
Computer Networks and the Internet CMPT 109 Montclair State University.
Networks Adapting Computers to Telecommunications Media.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
مقدمة في تقنية المعلومات د. محمد البرواني. مقدمة عن الشبكات مقدمة عن الشبكات.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Chapter 9 Communications and Network Tyler Clutts.
A Guide to major network components
COMPUTER NETWORKS.
1 CS101 Introduction to Computing Lecture 27 Computer Networks.
Network Topologies.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Communications & Networks
Laudon & Laudon: Canadian Edition
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
Networks and Telecommunications
Information and Communication Technology Fundamentals Credits Hours: 2+1 Instructor: Ayesha Bint Saleem.
Chapter 9A Network Basics.
Data Communication & Computer Networks
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Common Devices Used In Computer Networks
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Local Area Network By Bhupendra Ratha, Lecturer
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Unit 1—Computer Basics Lesson 7 Networks.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Module 2: Information Technology Infrastructure
Basic Concepts of a Computer Network
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Vishesh Kumar.  Routers  Repeaters  Bridges  Hub  Switches  Gateways Vishesh Kumar.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Higher Computing Networking. Networking – Local Area Networks.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Network media, protocols and networking standards, networking hardware.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Network types Point-to-Point (Direct) Connection Dedicated circuit boards connected by cable; To transfer data from A to B: – A writes on its circuit board;
Chapter 4 Computer Networks – Part 2
Chapter 3 Computer Networking Hardware
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Computer Networks and Internet
Computer Networks and Internet
Computer Networks.
Chapter 4: Data Communication and Networks
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
EUT 122 Skills and Technology in Communication
Presentation transcript:

Computer Networks

Today’s Goals: (Computer Networks) We will become able to appreciate the role of networks in computing We will look at several different types of networks We will familiarize ourselves with networking topologies and protocols

? computer network

Computer Network Multiple computers that are connected together to share information and other resources

Examples of Computer Network Usage I can send an message to a remote computer using the SMTP protocol I can browse documents residing on a remote computer using the HTTP protocol I can download or upload files to a remote computer using the FTP protocol I can run a program on a remote computer using the TELNET protocol

Computer C Computer D Computer E Computer A Computer B Hub Example of a Computer Network

Components of Conventional Computer Networks 1.Computers 2.Network Interface Cards (NIC) –I/O device that plugs into the computer –Enables it to communicate over a network 3.Hub –The network traffic controller

Components of Conventional Computer Networks 4.Cables –Are either electrical or optical –Not required at all for wireless networks 5.Protocol –Rules governing communications over the network

How Does a Conventional Network Work? 1.Suppose computer A wants to send a message to D 2.Computer A sends the message to its NIC 3.The NIC translates the message into electrical pulses suitable for the computer network in use & transmits it to the hub through the cable

How Does a Conventional Network Work? 4.The hub receives them and forwards them to all computers connected to the it 5.The NICs of all computers connected to the hub receive the forwarded electrical pulses 6.The NIC of computer D decides that the message is for it, & translates the pulses back to a form suitable for the computer

Hub (1) A device that is used to connect several computers to form a network A hub has several ports. Each port is identified with a unique port number.

Hub (2) Each computer in a network is connected to one of those ports through a cable A computer wanting to send a message to one of the others in the network sends a message to the hub, which, in turn, broadcasts the message to all others connected to it

Packet (1) The smallest unit of data transmitted over a computer network A message to be transferred over the network is broken up into small packets by the sending computer Each packet contains the following info: –Sender's address –Destination address –Data –Error-recovery info

Packet (2) All packets travel independently When all packets are received by the destination computer, it reassembles them to form the original message

Types of Computer Networks according to the network access policy Private Public

Private Networks (1) Organizations having many computers usually connect them in the form of private networks Access to these network is restricted to authorized computers only

Private Networks (2) This allows computers from within the organization to exchange info, but keeps the info private and protected from outsiders All equipment on a private network is generally for the exclusive use of that organization

Public Networks All networks that are not private, are … public Example: Internet Communication equipment used in these networks is generally being used by users belonging to several (possibly thousands of) organizations as well as those belonging to no organization

VPN: Virtual Private Network (1) From the user’s point-of-view, a VPN looks like a secure, private network VPNs use public telecom infrastructure, maintaining privacy through security procedures

VPN: Virtual Private Network (2) VPNs provide secure network connections for distance computers without using dedicated, private channels to supply the connection Key benefit of VPNs over conventional PNs: Lower cost

Types of Computer Networks according to the distance between nodes LAN: Local Area Network WAN: Wide Area Network

LAN A network of computers located in the same building or a handful of nearby buildings Examples: –Computer network at IPC –Computer network of a Net Cafe

WAN A network in which computers are separated by great distances, typically across cities or even continents May consist of several interconnected LANs Example: –The network connecting the ATM of a bank located in various cities –A network connecting the local and oversea offices of a SW house –Internet

Connecting LANs to other Networks Special-purpose devices are used to link LANs to other networks They may belong to one of the following categories: –Routers –Bridges –Gateways –Modems

Router A special-purpose computer that directs data traffic when several paths are available A router examines the destination info in each arriving packet and then routes it through the most efficient path available The router either delivers the packet to the destination computer across a local network or forwards the packet to another router that is closer to the final destination

Bridge Used to form a connection between two separate, but similar networks In a way, it creates an extended LAN by passing information between two or more LANs

Gateway A special-purpose computer that connects and translates between networks that use different communications protocols LAN’s may use a gateway (or router) to connect to the Internet

Modem (1) I/O device used for connecting two computers over telephone lines modem = modulator + demodulator

Modem (2) Modulator converts computer messages to electrical pulses that are suitable for transmission over the telephone lines Demodulator converts electrical pulses received over telephone lines into messages that are comprehensible for computers

Network Topologies The pattern in which computers are connected to form a network Popular patterns: –Point-to-point –Star –Bus –Ring Networks are also formed by combining 2 or more of these 4 basic patterns

P2P Computer A Computer B

P2P Inexpensive Limited connectivity Quite often used for connecting two LANs to form a WAN

Star Computer A Computer D Computer C Computer B Server

Star (1) A computer sends the address of the intended receiver and the data to the server The server then sends the message to the intended receiver This topology allows multiple messages to be sent simultaneously

Star (2) Costly, because it uses an additional computer to direct the data Costly, because each node is individually wired to the hub If the server goes down, so does the network If any of the nodes goes down, the rest of the network is not affected

Bus Computer A Computer C Computer D Computer B Bus: A high speed cable

Bus (1) No server is required One computer sends data to another by broadcasting the address of the receiver and the data over the bus All the computers in the network look at the address simultaneously, and the intended recipient accepts the data

Bus (2) A bus network, unlike ring or star networks, allows data to be sent directly from one computer to another However, only one computer at a time can transmit data. The others must wait to until the bus gets idle If any of the nodes goes down, the rest of the network is not affected

Ring Computer A Computer D Computer C Computer B

Ring (1) No server is required A computer sends the message to its neighbor. The neighbor examines the message to determine if it is the intended recipient If the data are not intended for that particular neighbor, it passes the message to the next computer in the ring

Ring (2) This process is repeated until the data arrive at their intended recipient This topology allows multiple messages to be carried, simultaneously Data transmission is slow since each message is checked by each computer

Ring (3) New nodes are difficult to add Messages propagate in one direction only The network fails if a single node fails

Combination Computer B Computer A Computer C Hub Computer E Computer D Computer F Hub

Networking Protocols Networks use protocols, or rules, to exchange info through shared channels Protocols prevent collisions of packets caused by simultaneous transmission between two or more computers Several protocols are available for various types of networks. Here we discuss two that are popular for LANs: Ethernet; Token Ring

Ethernet Protocol A computer using this protocol checks if a shared connection is in use before transmitting a message If not, the computer transmits data Two computers may sense an idle connection and may send packets simultaneously. To account for such situations, transmitting computers continue to monitor the connection and re-transmit if a packet collision occurs

Token Ring Protocol This protocol passes a special message called a token through the network A computer that receives the token is given permission to send a packet of information If the computer has no packet to send, it passes the token to the next computer

Computer Networks = Computers + Communications

Types of Communication Channels 1. Wired 2. Wireless A key characteristic of these channels is Bandwidth and Data Rate

Bandwidth and Data Rate Capacity of a communication channel for carrying data Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s Optical fiber channels have the highest (1 Tb/s) Telephone lines the lowest (56 kb/s)

Types of Communication Channels Wire –Copper Twisted-pair Coaxial cable –Optical fiber Wireless –Line-of-sight Microwave Optical –Non-line-of-sight Satellite Radio Cellular

Wireless (Radio) LANs Are Becoming Popular Key benefits: –Set-up time –Set-up cost –Maintenance cost –Cost Key challenges: –Security & privacy –Quality of service –Cost

Network Security (1) Keeping an eye on the security of private networks (e.g. LANs) is relatively easy However, their connections to other networks (e.g. the Internet) pose a security risk because the one has no control over users on those networks

Network Security (2) Applications transferred from the Internet to the LAN may contain computer viruses External, unauthorized users may gain access to sensitive data A special type of gateway – a firewall – can keep external users from accessing resources on the LAN while letting LAN users access the external info

Firewall A system that that guards a private network, enforcing an access/deny policy to all traffic going to and coming from the Internet It keeps an eye on all the packets that go in and out of the private network and blocks them or allows them to continue to their destination according to the policy

Private Network Internet Firewall

Firewall Policy: Example One can configure a firewall to allow only to enter the private network, thus shielding it from any malicious attacks except for those via

In Today’s Lecture We looked at the role of networks in computing We looked at several different types of networks We familiarized ourselves with networking topologies and protocols

Required Reading Chapter 8 and 9 –Understanding Computers