Computer Networks Telecommunications
Computer Networks Telecommunications
RJ-45 Plug
Characteristics
-Formed by connecting multiple LANs.
-they are larger than LANs but smaller than WANs.
-Area range is 5 to 50 kilometers.
-Ownership and maintenance is handled by either a single
person or company (a local council, large company etc).
ILLUSTRATION OF METROPOLITAN AREA
NETWORK (MAN)
CAMPUS AREA NETWORK (CAN) &
CHARACTERISTICS
A network of multiple interconnected LANs in a limited
geographical area such as an educational or corporate campus
e.g. MUBs network
Characteristics
-Larger than a LAN but smaller than a MAN or WAN.
-Limited geographical area.
-The networking equipment (switches, routers) and transmission
media (optical fiber, copper plant, Cat5 cabling etc) are almost
entirely owned by the campus owner i.e. an enterprise,
university, government etc.
-range of a CAN is 1km to 5km
-high speed data link
ILLUSTRATION OF CAMPUS AREA NETWORK (CAN)
PERSONAL AREA NETWORK (PAN) & CHARACTERISTICS
Characteristics
-made up of a wireless modem, a computer or two, phones,
printers, tablets etc.
-Evolves around one person in one building
-found in small offices or residences and are managed by one
person or organization from a single device
ILLUSTRATION OF PERSONAL AREA
NETWORK (PAN)
OTHER TYPES OF NETWORKS
Public Access Network (PAN)
Type of network where anyone (general public) has access and
through it can connect to the internet or other networks i.e. A
network that is accessible to the public e.g. MYUG (provided by
NITA-U). Its main characteristic is that it has few or no restrictions.
Peer to Peer Network (P2P)
A group of computers, each of which acts as a node for sharing files
within the group. Instead of having a central server to act as a shared
drive, each computer acts as the server for the files stored upon it.
OTHER TYPES OF NETWORKS
Client Server Network(CSN)
A network in which a single central computer (server) directs multiple
other computers (Clients) connected to it.
Through accessing the server, clients are able to reach shared files
and information saved on the server.
Virtual Private Network (VPN)
Allows you to create a secure connection to another network over the
internet. Can be used to access region- restricted websites, shield
your browsing activity from snoopers on a public Wi-Fi etc. Helps to
bypass internet censorship or geographic restrictions on websites or
streaming audio & Video.
NETWORK TOPOLOGY & TYPES
General shape or layout of a network OR;
Network arrangement , connecting various nodes (sender & receiver)
through lines of connection.
TYPES
• BUS Topology
• RING Topology
• STAR Topology
• MESH Topology
• TREE Topology
• HYBRID Topology
BUS TOPOLOGY
Every computer and network device is connected to a single
cable.
The information intended for the last node on the network must
run through each connected computer.
Features
• It transmits data only in one direction.
• Every device is connected to a single cable.
• Terminators are required at both ends of the backbone cable.
• Only one computer can send data on the bus at any one time.
BUS TOPOLOGY
ADVANTAGES DISADVANTAGES
• It is cost effective since it requires • Entire network shuts down if there is a break
less cable length compared to in the main cable/back bone cable
other network topologies • Cable has a limited length hence limiting the
• Used in small networks number of computers and peripheral that can
be added to the network
• Easy to connect a computer or • As more workstations are connected, the
peripheral to a linear bus because performance of the network will become
it doesn’t have the same demands slower because of data collisions and heavy
for cable length that a star network traffic since only one cable is being
topology link would require used
• Easy to expand joining two cables • Security risk since every workstation on the
together using a repeater or network sees all the data on the
connector. network/each terminal has full access to
every other terminal
• Difficult to trouble shoot because a larger
number of connections would have to be
investigated
BUS TOPOLOGY
RING TOPOLOGY
It forms a ring as each computer is connected to another
computer via a single cable, with the last one connecting to
the first one.
Features
• A number of repeaters are used for ring topology with
large number of nodes.
• Every device is connected to a single cable forming a ring.
• Data flows in a single loop continuously (endless loop).
RING TOPOLOGY
ADVANTAGES DISADVANTAGES
• Cheap to install • Trouble shooting is difficult
because it can be hard to
• Network traffic is track down where in the ring
controlled because only the failure has occurred
nodes having tokens can • Failure of one computer
transmit data disturbs the whole network
• All data flows in one • Harder to modify or expand
direction, reducing the because to add or remove a
node you must shut down the
chance of data collision network temporarily
RING TOPOLOGY
STAR TOPOLOGY
Computers (clients) are connected to a single hub (server)
through a cable. The hub is the central node and all other
nodes are connected to it. The central node extends a cable
to each computer on the network.
Features
• Every node has its own dedicated connection to the hub
• Hub acts as a repeater for data flow
• Can be used with twisted pair, optical fiber or coaxial
cable
STAR TOPOLOGY
ADVANTAGES DISADVANTAGES
• Fast performance with few • Cost of installation is high
nodes and low network • Expensive to use
traffic
• If the hub fails, then the
• Hub can be upgraded easily whole network is stopped
• Easy to troubleshoot because all the nodes
• Easy to set up and modify depend on the hub
• Failure of one node does • Performance is based on
not stop the other nodes the hub i.e. depends on its
from working smoothly capacity
STAR TOPOLOGY
MESH TOPOLOGY
It is a point to point connection to other nodes or devices.
Features
• Fully connected/ all the network nodes are inter-
connected to each other.
• Robust
• Each computer not only sends its own signals but also
relays data from other computers.
• Every node has a point to point connection to the other
node.
MESH TOPOLOGY
ADVANTAGES DISADVANTAGES
• Each connection can carry its • Installation and
own data load
configuration is difficult
• It is robust (failure of one
node doesn’t not bring the • Cabling cost is more
entire network down)
• Fault is diagnosed easily • Bulk wiring is required
• Provides security and privacy
• If one cable fails, data has
alternative paths to get to its
destination
MESH TOPOLOGY
TREE TOPOLOGY
Has a root node and all other nodes are connected to it forming
a hierarchy.
All computers are connected to each other in a hierarchical fashion.
Top most in the topology is known as the root node and all other
nodes are the descendants of the root node.
Only one path exists between two nodes for the data transmission
hence it forms a parent-child hierarchy.
Features
• Ideal if work stations are located in groups
• Used in WAN
TREE TOPOLOGY
ADVANTAGES DISADVANTAGES
• Extension of bus and star • Heavily cabled
topologies • If more nodes are added
• Expansion of nodes is maintenance is difficult
possible and easy • Central hub fails, network
• Easily managed and fails
maintained
• Error detection is easily
done
TREE TOPOLOGY
STAR
HYBRID TOPOLOGY
It is mixture of two or more topologies e.g. if in an office in
one department ring topology is used and in another start
topology is used, connecting these two topologies will
result in hybrid topology e.g. ring topology and star
topology.
Features
• A combination of two or more topologies
• Inherits the advantages and disadvantages of the
topologies included
HYBRID TOPOLOGY
ADVANTAGES DISADVANTAGES
• Reliable as error detecting • Complex in design
and trouble shooting is • Costly
easy
• Effective
• Scalable as size can be
increased easily
• flexible
HYBRID TOPOLOGY
NETWORK DESIGN PARAMETERS
Availability: The amount of time a network is available to the users. A
highly available network is one that eliminates or reduces the potential
impact of failures. This enables the network to meet requirements for
access to applications, systems and data from anywhere, at any time.
Reliability: The network should continue to work correctly (performing the
correct function at the desired level of performance) even in the face o
adversity (hardware or software faults, and even human error).
Scalability: The ability to be able to scale or adapt the network for future
growth (It refers to how much growth and adaptability a network design
can support without having to be radically re-designed). The network
should be able to cope with the existing demands placed upon it but also it
should expandable to meet future demands in a planned way.
NETWORK DESIGN PARAMETERS
Security: Any activity designed to protect the usability and integrity
of your network and data. This includes where data is stored, either
in-house or offsite with cloud-based solutions, what types of
information should be accessible, who should be able to access it, and
which types of devices should be included. Firewalls and access
servers on a network need to be secure without slowing down
operations. A network should be highly secure in order to protect
proprietary information from attack which ultimately protects the
company’s reputation.
Response time: The amount of time required for a packet to travel
across a network path from a sender to a receiver host. A network
should have good response time so that employees have more time to
communicate and complete their assigned tasks on time.
NETWORK DESIGN PARAMETERS
Throughput: This refers to the rate of successful message delivery
over a communication channel. A network with high throughput
capabilities results in significantly faster transfer speeds resulting in
less frustration and greater customer satisfaction.
Cost: This includes the costs of building, maintenance and operation
of a network by a company. Network must not only meet a certain
technical specification, they must also be cost effective in their
design and implementation.
Robustness: Refers to the ability of the network to maintain its total
throughput under node or link removal. The networks should be able
to sustain an acceptable level of service in the event of faults,
changes or other challenges to normal network operation.
QUESTION
Discuss the fundamental parameters considered to
define how the network must perform to meet the
needs of its users.
NETWORK DEVICES
Electronic devices which are required for
communication and interaction between devices on
a computer network.
Specifically they mediate data transmission in a
computer network.
TYPES OF NETWORK DEVICES
• Router
• Hub
• Switch
• Gateway
• Bridge
• Repeater
• Network Interface Card
• Modem
NETWORK HUB
Used to connect multiple network hosts as well as
aiding data transfer.
The data is transferred in terms of packets on a
computer network. As such, when a host sends a
data packet to the network hub, the hub copies the
data packet to all of its ports connected to it. This
means that all the ports know about the data and the
port for whom the packet is intended, claims the
packet.
ILLUSTRATION OF A NETWORK HUB
NETWORK SWITCH
While the hub just does the work of data forwarding,
a Switch does “filter and forwarding” which is a
more intelligent way of dealing with the data
packets.
When a packet is received at one of the interfaces
of the switch, it filters the packet and sends only to
the interface of the intended receiver. For this
purpose, a switch also maintains a CAM (Content
Addressable Memory)table and has its own system
configuration and memory.
ILLUSTRATION OF A NETWORK SWITCH
MODEM
Stands for Modulator +Demodulator.
A hardware networking device that converts data to
a signal so it can be easily sent and received over a
phone line, cable or satellite connection.
In the case of transmission over an analog telephone
line, it modulates and demodulates the signal
between the digital data of a computer and the
analog signal of a telephone line.
Acts as a sort of converter or translator.
ILLUSTRATION OF A MODEM
NETWORK ROUTER
A router is a network device which is responsible
for routing traffic from one to another network.
A router regulates traffic between similar networks
and it is protocol dependant.
ILLUSTRATION OF A NETWORK ROUTER
BRIDGE
A computer network device that connects two segments
of a network together. The purpose of a bridge is to
divide a network into manageable sections.
• Message
• Sender
• Receiver
• Medium/communication
channel
• Encoder and decoder
• Protocol
DATA COMMUNICATIONS
Message: Data or information to be communicated. It may consist of text,
numbers, pictures, sound, video or a combination of any of the above.
Sender: Device that sends message. Also called a source or transmitter.
Receiver: Device that receives the message. Can be a computer, printer or
any other computer related device.
Medium/communication channel: physical path that connects sender and
receiver. It is used to transmit data. It can be copper wire, a fiber optic
cable, microwaves etc.
Encoder and decoder: Encoder is a device that converts digital signals in a
form that can pass through a transmission medium. The decoder is a device
that converts the encoded signals into digital form.
Protocol: set of rules that governs data communications. Represents an
agreement between the communicating devices. Without a protocol, two
devices may be connected but not communicating.
TRANSMISSION SIGNALS
A signal is an electromagnetic or light wave that
represents data. Signals are used to transfer data from
one device to another through a communication medium.
TYPES OF SIGNALS
• Analog signals
• Digital signals
ANALOG SIGNALS
A continuous electrical signal
in the form of wave e.g.
telephone line.
DIGITAL SIGNALS
A sequence of voltage
represented in binary form.
Signals are in discrete form.
• Digital signals are faster
and efficient.
• Provide low error rates
• Provide high transmission
speed
• Provide high quality voice
transmission
DATA TRANSMISSION
TYPES OF DATA TRANSMISSION
Radio waves are low frequency signals and can travel a long
distance. They are easily generated and can penetrate
through the buildings.
Microwaves are transmitted in a straight line hence
requiring the line of sight transmission. They have a higher
frequency than radio waves. They are used for telephone
communication, mobile phones, television distribution etc.
Infrared waves are used for short range communication.
Like the remote control for televisions, VCRs etc. Use
infrared waves. It cannot penetrate through obstacles.
QUESTION