Professional Documents
Culture Documents
Topics to be discussed
1. Network concept
2. Types of networks
3. Network topology
4. Network Architecture
5. Network configuration
6. Communication of data on networks
7. Data security on networks
OBJECTIVES
Introduction
Just about any computer youll use today is on a network. Today, many homes and offices have
them.
In this lesson, I start by identifying some basic network concepts and types of
networks.
I then introduce the various network topologies and architectures. I follow up
with a step by step configuration of a basic peer to peer network.
I conclude with data communication and data security on network
Network Concepts
A computer network is a collection of computers and other devices connected to share data,
hardware and software.
To explain network concepts, the following terminologies associated with networking must be
explained; topology, gateway router, client, server.
Topology
Network topology is the arrangement of the computers and other devices of a computer network.
So it is the physical orientations of computers and other devices in a network.
Gateway router
This is a computer found at each intersection on the internet backbone that examines incoming
datas IP address and forwards the data towards its destination.
Server
This is a computer and software that make data available to other computers.
Client
This is a computer and software that makes use of data made available by a server.
Types of networks
The 3 types of networks based on size are LAN, MAN, WAN (Local Area Network,
Metropolitan Area Network and Wide Area Network).
A WAN is created when two or more LAN in separate geographical locations are connected
together.
A MAN is a network that interconnects computers in a geographic area or region larger than that
covered by LAN but smaller than the area covered by a WAN.
The arrangement of computers and other devices in a network is called the networks topology.
The network topology defines the physical connections of devices in a computer network.
Star Topology
In a star topology network, a number of computers and other devices are connected to a central
connecting device.
- Some type of medium to tie the computers and devices all together can be cable or
wireless.
- The central connecting devices may be bubs switches or routers.
- All the computers and devices are connected to the central connecting device in a star
arrangement.
Advantages
Star networks are very reliable. If one computer other than the central connecting device
fails, it does not affect other users.
Good security; no computer or device can interact with another without going through the
central connecting device.
It is easy to install since each computer or device has its own cable to the central
connecting device.
It is easy to locate faults when they occur.
Extra computers can be added easily.
Disadvantages
Ring Topology
In a ring topology network, the computers and other devices are connected to each other in a
circle. There is no central connecting device communication flows in one direction around the
ring.
Advantages
Disadvantages
Bus Topology
In a bus topology network, all the computers and other devices are connected to a common
communication cable forming a bus pattern.
All the computers or devices can communicate with each other without having to go through
another device.
Advantages
If there is a problem with the common cable, the entire network goes down.
If there are a lot of computers or devices on the network, data travels slowly.
Data collisions can happen as the network becomes busy
Low data security, since every computer or device sees all of the data in the network.
Network Architecture
Network architecture is the strategy or way of coordinating the sharing of information and
resources on the network.
In a peer to peer architecture, the computers or devices act as both servers and clients.For
example, one computer can obtain files located on another computer and can also provide files to
other computers.
Advantages
Disadvantages
Each computer / device needs the correct application loaded
Each computer / device needs its own anti virus scanner
Each computer / device needs its own backup schedule
This architecture lacks powerful network management software to effectively monitor
larger networks activities.
Features or Characteristics
- The powerful computer that provides access to the centralized resources such as
databases, application software, and hardware is called Server.
- The other computers or devices that make use of the centralized resources are called
clients.
- Only one computer, the server hosts the resources that all the clients request and use.
Advantages
It has the ability to handle very large networks efficiently.
This architecture has powerful network management software that monitors and controls
the networks activities.
It is simple to set up
It takes less time to find fault when there is a problem on the network.
Disadvantages
It has high cost of installation and maintenance
If the server goes down, the entire network shuts down.
Network Configuration
In this section you will learn how to configure a peer to peer network.
In the peer to peer network, you simply use the same Workgroup for all the computers and a
unique name for each computer. In addition give a unique IP address and its related subnet mask
to each computer. For example use:
To do this
1. Right click on My Computer and then click Properties then go to the Network
Identification Section.
2. Access the Local Area Connection properties dialog box.
3. Click Internet Protocol Version 4, and then click the properties button.
4. Click then use the following IP address radio button.
Enter the IP address
Enter the Subnet mask
5. Configure the IP address and Subnet mask for the other computers.
6. Click OK. Then in the Local Area Connection Properties dialog box, Click OK.
The telephone system uses analogue signals whereas computer systems use digital signal forms
of data. In a network, there are three basic directions for transmitting data;
Simplex
Half duplex
Full duplex
In the simplex mode or direction, data can only travel through the channel in one direction.
In half duplex communication, data flows in both directions, but not at the same time. That is
data flows in only one direction at any one time.
In full duplex communication, data is transmitted back and forth at the same time.
The full duplex is the fastest and most efficient form of two-way communication.
Data security is the collection of techniques that provide protection for data.