Professional Documents
Culture Documents
computer Networks
Network Definition
Network Applications
Network Types
Geographical Area
LAN MAN WAN
Network Architecture
Peer-to-Peer and Client/server
Network Components Hardware and Software Components
Network Topology
Physical
Logical
Network Models
OSI Reference Model
TCP/IP Protocol Suite
Computer network
– is a group of computers and associated peripheral devices
which connected by communication channel in order to
sharing resources.
ways:-
• Sharing Information/Data
• Sharing Hardware/Software
– for instance:-
1. Email Programs
4. Groupware
others
Chatting
– Once a chat has been initiated, either user can enter text by typing
on the keyboard and the entered text will appear on the other
user’s monitor.
Examples:- Internet
– defines the structure of the network of how all the components are
1. Physical, and
2. logical topology
• Logical topology
– is the method used to pass the information between the computers.
Bus,
Star,
Terminator:
– To stop the signal from bouncing, a component called a terminator is placed
at each end of the cable to absorb free signals.
– The signals flows / travel around the loop in one direction and
pass through each computer.
• Token passing:
• Token:
• Limited failure:
• Cost effective:
• Cable:
– Efficiency:
11/17/2021
Star-bus network
Ambo University 44
NETWORK TOPOLOGY…
• Advantages of Hybrid Topology
– Reliable:
– Scalable:
existing network.
– Effective:
– Complex design:
– Costly Hub:
– Costly infrastructure:
– Easily manageable:
– Error detection:
• Error detection and error correction are very easy in a
tree topology.
– Limited failure:
• The breakdown in one station does not affect the entire
network.
– Point-to-point wiring:
• It has point-to-point wiring for individual segments.
11/17/2021 Ambo University 51
NETWORK TOPOLOGY…
• Disadvantages of Tree topology
– Difficult troubleshooting:
• If any fault occurs in the node, then it becomes difficult to
troubleshoot the problem.
– High cost:
• Devices required for broadband transmission are very costly.
– Failure:
• A tree topology mainly relies on main bus cable and failure in
main bus cable will damage the overall network.
– Reconfiguration difficult:
• If new devices are added, then it becomes difficult to
reconfigure.
11/17/2021 Ambo University 52
7- Other Types of Practically Used Hybrid
Topologies
• Clustered Star Topology
– Wireless NIC:
• contain the antenna to obtain the connection over the wireless network.
– Wired NIC:
• Cables and connectors are used with wired NIC to transfer the data.
11/17/2021 • is present inside the motherboard.
Ambo University 56
Network components…..
The role of the NIC is :-
It determines the best path from the available paths for the
transmission of the packet.
– Security:
– Reliability:
Cable
• Coaxial cable
• Fibre-optic cable
– is a device that makes possible the communication for computers over a telephone
line. i.e. allows the computer to connect to the internet over the existing telephone
line.
– Is not integrated with the motherboard rather than it is installed on the PCI slot
be shared.
service.
2003, Linux
11/17/2021 Ambo University 70
Network Models
• Network model is responsible for establishing a connection among the
respectively.
Network Models
– are further categorized into Upper Layers, Network Independent Layer and Lower
Layers.
– Physical Layer, Data link Layer and Network Layer are categorized as Lower
Layers.
– is the most bottom layer w/c responsible for the transmission and reception of
unstructured raw data between a device and a physical transmission medium.
– Provide the interface for the data transmission to Data Link Layer .
physical layer. i.e. it ensure data transfer from one node to another
– translates the data received in the form of bits from physical layer
– It also assembles the data message into data frames. These data
Control) Address.
– Even before sending the data packets to receiver, adding sender’s &
receiver’s address to the frame for reliable data delivery
– Routers
– Gateways
– Data received from Upper layers application are combined into data
streams and are transmitted to the receivers end in exact format as it
was in original.
– Connection establishment.
– Connection termination.
– Synchronization.
presentation techniques.
decryption.
– is the OSI layer closest to the end user w/c providing interface
among users and the software application, which means both the
OSI application layer and the user interact directly with the
software application.
– File transfer, emails, remote access etc. are some of the examples of
applications where users interacts.