You are on page 1of 43

INTRODUCTION TO

INFORMATION
TECHNOLOGY

Faiza Tariq
MOBILE ALERT
2

Kindly Switch Off your Mobile/Cell Phone

OR

Switch it to Silent Mode Please


Learning Outcome
3

 What is a Network
 Types and Benefits of Network
 Communication Media
 How Network are Categorized
 Media
 Topology etc
 Communication Protocols & Softwares
 OSI Model
WHAT IS A NETWORK?
 A network is simply two or more computers that are linked
together.
 The MOST common types of networks are:
 Local Area Networks (LANS) and
 Wide Area Networks (WANS).
 The primary difference between the two is that a LAN is
generally confined to a limited geographical area, whereas a
WAN covers a large geographical area. Most WANs are made
up of several connected LANs.
TYPES OF NETWORKS

 Local Area Network (LAN) – a network that spans (extends


over an area) a small area such as a building or an office.
 Software applications and other resources are stored on a file server.
 Print servers enable multiple users to share the same printer.
TYPES OF NETWORKS

 Wide Area Network (WAN) – a network that spans a wide geographical area.
A WAN connects different smaller networks, including local area networks (LANs) and metro
area networks (MANs). This ensures that computers and users in one location can communicate
with computers and users in other locations.
 There are several types of WANS
 Metropolitan area network (MAN)
 Virtual private network (VPN)
TYPES OF NETWORKS

 Metropolitan area network (MAN)


 A metropolitan area network (MAN) is a network that interconnects users
with computer resources in a geographic area or region larger than that covered
by even a large local area network (LAN) but smaller than the area covered by
a wide area network (WAN).

 Virtual private network (VPN)


 A virtual private network (VPN) is a network that is constructed using
public wires — usually the internet — to connect remote users or regional
offices to a company's private, internal network.
BENEFITS OF A NETWORK

 Information sharing: Authorized users can use other computers on the


network to access and share information and data. This could include special group projects,
databases, etc.

 Hardware sharing: One device connected to a network, such as a printer or


scanner, can be shared by many users.

 Software sharing: Instead of purchasing and installing a software program on


each computer, it can be installed on the server. All of the users can then access the program
from a single location.

 Collaborative environment: Users can work together on group projects


by combining the power and capabilities of diverse equipment.
RISKS OF NETWORK
COMPUTING

 The security of a computer network is challenged


everyday by:
 Equipment malfunctions (improper use by operator,
defective equipment)
 System failures
 Note: equipment malfunctions and system failures may be caused by natural
disasters such as floods, storms, or fires, and electrical disturbances
 Computer hackers
 Virus attacks
COMMUNICATIONS MEDIA

 Communications Channel
 To transfer data from one computer to another requires some type of link
through which the data can be transmitted. This link is known as the
communications channel.
 Transmission media is a communication channel that carries the information
from the sender to the receiver. Data is transmitted through the
electromagnetic signals. The main functionality of the transmission media is
to carry the information in the form of bits through LAN(Local Area Network).
 To send data through the channel requires some type of transmission media,
which may be either physical or wireless.
PHYSICAL MEDIA
 Twisted-pair cable – consists of two independently insulated wires twisted
around each other (least expensive type of cable—the kind that is used in
many telephone systems).

 Coaxial cable – consists of an insulated center wire grounded by a shield of


braided wire (the primary type of cabling used by the cable television
industry; it is more expensive than twisted pair)
PHYSICAL MEDIA
 Fiber-optic cable – contains hundreds of clear fiberglass or plastic fibers
(threads) (made from thin, flexible glass tubing; bandwidth is greater, so it
can carry more data; it is lighter than metal wires and is less susceptible to
interference; it is fragile and expensive)

 ISDN line – a special digital telephone line that transmits and receives
information at very high speeds
WIRELESS MEDIA

 Microwave system – transmits data via high-frequency radio signals


through the atmosphere
 Satellite system – receive transmitted signals, amplify (increase
significance) them, and then transmit the signals to the appropriate
locations
 Cellular technology – uses antennae resembling telephone towers to pick
up radio signals within a specific area (cell)
WIRELESS MEDIA

 Infrared technology – transmits data as infrared light waves


from one device to another, providing wireless links between
PCs and peripherals
Note: The type selected is determined by the type of
network, the size of the network, and the cost.
 Bluetooth technology uses radio waves to
transmit data between two devices.
HOW ARE NETWORKS CATEGORIZED?

 Networks are usually classified using


three properties:
Topology
Protocol
Architecture
NETWORK TOPOLOGIES

 Network Topology (or layout) – refers to the way computers and


peripherals are configured to form networks
 Bus topology – all computers are linked

by a single line of cable

 Star topology – multiple computers and


peripheral devices are linked to a central
computer, called a host
NETWORK TOPOLOGIES

 Network Topology (or layout) – refers to the way computers and


peripherals are configured to form networks
 Ring topology – each computer or workstation

is connected to exactly two computers one on either


side, with the entire network forming a circle

 Hybrid topology – combine network layout


types to meet their needs.
NETWORK/COMMUNICATION
PROTOCOLS
 A protocol is simply an agreed-on set of rules and procedures
for transmitting data between two or more devices.
 Features determined by the protocol are:
 How the sending device indicates. It has finished sending
the message.
 How the receiving device indicates. It has received the
message.
 The type of error checking to be used.
NETWORK/COMM. PROTOCOLS
 Most networks use Ethernet, but some network may use IBM’s Token Ring
protocol.

 Ethernet: a system for connecting a number of computer


systems to form a local area network, with protocols to
control the passing of information and to avoid simultaneous
transmission by two or more systems.
 On the Internet, the major protocol is TCP/IP (an acronym for
Transmission Control Protocol/Internet Protocol).
EXAMPLE OF AN ETHERNET BUS

 Ethernet LANs use a bus


topology.
 All stations are connected to
a single long cable. 
 Any station can send a signal
along the cable, which all
other stations will receive. 
Unlike ring topologies, the
cable doesn't close a loop.
TOKEN RING NETWORK
 A token passing ring LAN is a group of
computers connected in a loop.  The
group uses a token passing access
mechanism. 
 A computer wishing to send data
should first receive permission.  When
it gets control of the network it may
transmit (carry) a frame.  Each frame
transmitted on the ring is transmitted
from one computer to the next, until it
ultimately returns to the initiator of the
transmission.
NETWORKING HARDWARE AND
SOFTWARE

 Hub – electronic device (with a number of ports) used in a LAN to link


groups of computers
 Repeaters (also called amplifiers) – electronic devices that receive
signals and amplify and send them along the network
 Routers - electronic devices used to ensure messages are sent to their
intended destinations
 Gateway – consists of hardware and/or software that allows
communications between dissimilar networks
 Bridge – consists of hardware and/or software
that allows communication between two
similar networks
HUBS

Simply put, the hub's major function is to


replicate data it receives from one device
attached to it to all others.
REPEATERS

 A common problem in the networking world is that of weakening electrical


signals. 
 A repeater is connected to two cable segments. 
Any electrical signal reaching the repeater from
one segment, will be amplified and retransmitted to
the other segment.

An illustration of a repeater at work


The electrical signal entering the repeater at one end is weakened.
The repeater amplifies the electrical signals and resends the data.
ROUTERS

 Routers connect two or more networks


and forward data packets between them. 
GATEWAY
 The term gateway now refers to special-purpose devices, that perform protocol
conversions.  Gateways implement application layer conversions of information
received from various protocols.
 A gateway is a piece of networking hardware used in telecommunications for
telecommunications networks that allows data to flow from one discrete network to
another.
EXAMPLE OF FIREWALL
 A firewall is a system designed to prevent unauthorized access to or from a
private network. Firewalls prevent unauthorized internet users from accessing private
networks connected to the internet.
 Firewalls are systems that establish access control policies among networks. They can
block information from entering a network or from getting out of that network, they
can permit different users to perform different kinds of operations, according to the
user's authorizations.
NETWORK ARCHITECTURE

 Network architecture – refers to the way a network is


designed and built. The two major types are:
 Peer-to-peer architecture – Computers connect with each
other in a workgroup to share files, printers, and Internet
access. This is used to connect a small number of
computers.
 Client/server architecture – sends information from a
client computer to server, which then relays the
information back to client computer, or to other
computers on the network
NETWORK/COMM PROTOCOLS

 A protocol is an agreement about the packets (Information which or


a sequence of bytes ) exchanged by communicating programs and
what they mean.
 A protocol tells how packets are structured
 for example, where the destination information is located in the packet
and how big it is—as well as how the information is to be interpreted.
 The main network protocols are TCP/IP family which includes; the
Internet Protocol (IP), the Transmission Control Protocol (TCP), and
the User Datagram Protocol (UDP).
NETWORK/COMM PROTOCOLS

 TCP – is for connection orientated applications. It has built in error


checking capabilities and will re-transmit missing packets.
 Connection-oriented
 Similar to a phone connection
 A virtual path is set up between two hosts and the
communication parameters are negotiated
 Guarantees that the delivered packets are in the correct
order
TCP/IP Model ARCHITECTURE
NETWORK/COMM PROTOCOLS
 UDP – is for connection less applications. It has no built in error checking
capability and will not re-transmit missing packets.
 Connectionless
 This is like sending a letter
 There is no permanent connection between sender and recipient
 This saves
 Setup time
 Additional information in the packets to ensure they are received and in
order
 Connectionless protocols do not guarantee delivery or delivery in
the right order
COMMUNICATION PROTOCOLS

 File transfer protocol (FTP) – used to transmit files.


 Simple mail transfer protocol (SMTP) – used to transmit
e-mail messages.
 Post office protocol (POP) – allows the recipient to
retrieve messages.
 Wireless application protocol – enables wireless devices to
access and use the Internet using a client/server network.
 802.11 – protocol for wireless LAN technology
DATA TRANSMISSION
CHARACTERISTICS

 Bandwidth (rate of transmission)


 Analog or Digital (type of signal)
 Analog transmission – takes the form of continuous waves
transmitted over a medium at a certain frequency rage
 Digital transmission – sends data in the form of bits
 Serial or Parallel (order of bits)
 Serial transmission – all of the data bits are transmitted one
bit after another in a continuous line
 Parallel transmission – data bits are sent at the same time
along multiple paths
COMMUNICATIONS SOFTWARE

 E-Mail Software – used to send and receive


electronic messages using the Internet
 Web Browser – allows users to access and view
Web pages
 Groupware – allows groups of people on a network
to share information and to collaborate on various
projects
PACKET SWITCHING
 To improve the efficiency of transferring information over a shared
communication line, messages are divided into fixed-sized, numbered
packets
 Network devices called routers are used to direct packets between
networks
OPEN SYSTEMS INTERCONNECTION
MODEL

 The International
Organization for
Standardization (ISO)
established the Open
Systems Interconnection
(OSI) Reference Model
 Each layer deals with a
particular aspect of
network communication 15-37
OPEN SYSTEMS INTERCONNECTION MODEL

15-38
NETWORK ADDRESSES
 Hostname A unique identification that specifies a
particular computer on the Internet
For example
google.com.pk
condor.develocorp.com

15-39
NETWORK ADDRESSES
 Network software translates a hostname into its
corresponding IP address
For example
205.39.145.18
NETWORK ADDRESSES
 An IP address can be split into
 network address, which specifies a specific network
 host number, which specifies a particular machine in that network
DOMAIN NAME SYSTEM

 The domain name system (DNS) is mainly


used to translate hostnames into numeric IP
addresses

15-42
END OF LECTURE

43
Any Questions !!!

You might also like