0% found this document useful (0 votes)
13 views20 pages

FComputer Networking COMPUTER SCIENCE

The document provides a comprehensive overview of computer networking, including definitions, types, and key concepts. It discusses various network types such as LAN, WAN, and VPN, as well as essential networking terms like IP addresses and routers. Additionally, it outlines the advantages and disadvantages of networks and describes different network topologies.

Uploaded by

EMMANUEL FADHILI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views20 pages

FComputer Networking COMPUTER SCIENCE

The document provides a comprehensive overview of computer networking, including definitions, types, and key concepts. It discusses various network types such as LAN, WAN, and VPN, as well as essential networking terms like IP addresses and routers. Additionally, it outlines the advantages and disadvantages of networks and describes different network topologies.

Uploaded by

EMMANUEL FADHILI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 20

TAITA TAVETA NAIONAL POLYTECHNIC

ICT DEPERTMENT
Fundamentals of Computer Networking

This tutorial will discover the definition of computer networking, its types, computer networks
work, networking concepts, commonly used terms, networking and internet, how it works, and
network topologies.

What is a Computer Network?

"A Computer Network is defined as a set of two or more computers that are linked together?
either via wired cables or wireless networks i.e., WiFi?with the purpose of communicating,
exchanging, sharing or distributing data, files and resources."

Computer Networks are built using a collection of hardware (such as routers, switches, hubs,
and so forth) and networking software (such as operating systems, firewalls, or corporate
applications).

Though one can also define the computer networks based on their geographic location, a LAN
(local area network) connects computers in a definite physical dimension, such as home or
within an office.

In contrast, a MAN (Metropolitan area network) connects computers ranging between multiple
buildings in a city.

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
The Internet is the most significant example of WAN (Wide Area Network), connecting
billions of networking devices across the world.

One can also describe the concept of computer networking by its communicating protocols, the
physical arrangement of its networking elements, how it manages network traffic, and it's
functioning.

Computer networks are globally used by businesses, the entertainment industry, education in the
research field for communication and transferring their data from source to destination node.

All the other technologies, including the internet, Google search, instant messaging apps,
online video streaming, social media, email, cloud kitchen, cloud data storage, etc., all exist
because of computer networks.

Computer Network Types

Below are the most common computer network types that are frequently used these days:

o LAN [Local Area Network}


o WLAN [Wireless local area network]
o CAN [Campus Area Network]
o MAN [Metropolitan Area Network]
o PAN [Personal Area Network]
o SAN [Storage Area Network]
o VPN [Virtual Private Network]
o WAN [ Wide Area Network]

1. LAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

LAN or Local Area Network is a group of devices connecting the computers and other devices
such as switches, servers, printers, etc., over a short distance such as office, home. The
commonly used LAN is Ethernet LAN. This network is used as it allows the user to transfer or
share data, files, and resources.

2. WLAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

WLAN or Wireless local area network is similar to LAN with the difference that it uses wireless
communication between devices instead of wired connections. WLAN typically involves a Wi-
Fi router or wireless access point for devices, unlike smartphones, laptops, desktops, etc.

3. CAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

CAN or Campus Area Network is a closed corporate communication network. A CAN is a


mobile network that may contain a private or public part. CANs are widely used colleges,
academies, and corporate sites.

4. MAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

MAN or Metropolitan Area Network is typically a more extensive network when compared to
LANs but is smaller than WANs. This network ranges between several buildings in the same
city. Man networks are connected via fiber optic cable (usually high-speed connection). Cities
and government bodies usually manage MANs.

5. PAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

PAN or Personal Area Network is a type of network used personally and usually serves one
person. This network usually connects devices unlike your smartphones, laptop, or desktop to
sync content and share small files, unlike songs, photos, videos, calendars, etc. These devices
connect via wireless networks such as Wi-Fi, Bluetooth, Infrared, etc.

6. SAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

SAN or Storage Area Network is a specialized high-speed network that stores and provides
access to block-level storage. It is a dedicated shared network that is used for cloud data storage
that appears and works like a storage drive.

SAN consists of various switches, servers, and disks array. One of the advantages of SAN is
that it is fault-tolerant, which means if any switch or server goes down, the data can still be
accessed.

7. VPN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

VPN or Virtual Private Network is a secure tool that encrypts point-to-point Internet connection
and hides the user's IP address and virtual location. It determines an encrypted network to boost
user's online privacy so as their identity and data are inaccessible to hackers.

8. WAN

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

WAN or Wide Area Network is the most significant network type connecting computers over a
wide geographical area, such as a country, continent. WAN includes several LANs, MANs, and
CANs. An example of WAN is the Internet, which connects billions of computers globally.

Networking terms and concepts

Some of the most commonly used terms in day-to-day networking life are as discussed below:

1. IP address

An IP address or Internet Protocol is a unique number that represents the address where you
live on the Internet. Every device that is connected to the network has a string of numbers or IP
addresses unlike house addresses.

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
You won't find two devices connected to a network with an identical IP address. When your
computer sends data to another different, the sent data contains a 'header' that further contains the
devices' IP address, i.e., the source computer and the destination device.

2. Nodes

A node refers to a networking connection point where a connection occurs inside a network
that further helps in receiving, transmitting, creating, or storing files or data.

Multiple devices could be connected to the Internet or network using wired or wireless nodes. To
form a network connection, one requires two or more nodes where each node carries its unique
identification to obtain access, such as an IP address. Some examples of nodes are computers,
printers, modems, switches, etc.

3. Routers

A router is a physical networking device, which forwards data packets between


networks. Routers do the data analysis, perform the traffic directing functions on the network,
and define the top route for the data packets to reach their destination node. A data packet may
have to surpass multiple routers present within the network until it reaches its destination.

4. Switches

In a computer network, a switch is a device that connects other devices and helps in node-to-
node communication by deciding the best way of transmitting data within a network
(usually if there are multiple routes in a more extensive network).

Though a router also transmits information, it forwards the information only between networks,
whereas a switches forwards data between nodes present in a single network.

Switching is further classified into three types, which are as follows:

o Circuit Switching
o Packet Switching

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
o Message Switching

o Circuit Switching: In this switching type, a secure communication path is established


between nodes (or the sender and receiver) in a network. It establishes a dedicated
connection path before transferring the data, and this path assures a good transmission
bandwidth and prevents any other traffic from traveling on that path. For example, the
Telephone network.
o Packet Switching: With this technique, a message is broken into independent
components known as packets. Because of their small size, each packet is sent
individually. The packets traveling through the network will have their source and
destination IP address.
o Message Switching: This switching technique uses the store and forward mechanism. It
sends the complete unit of the message from the source node, passing from multiple
switches until it reaches its intermediary node. It is not suitable for real-time applications.

5. Ports

A port allows the user to access multiple applications by identifying a connection between
network devices. Each port is allocated a set of string numbers. If you relate the IP address to a
hotel's address, you can refer to ports as the hotel room number. Network devices use port
numbers to decide which application, service, or method is used to forward the detailed
information or the data.

6. Network cable types

Network cables are used as a connection medium between different computers and other
network devices. Typical examples of network cable types are Ethernet cables, coaxial, and
fiber optic. Though the selection of cable type usually depends on the size of the network, the
organization of network components, and the distance between the network devices.

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
Advantages and disadvantages of networks

Advantages

 Sharing devices such as printers saves money.


 Site (software) licences are likely to be cheaper than buying several standalone licences.
 Files can easily be shared between users.
 Network users can communicate by email and instant messenger.
 Security is good - users cannot see other users' files unlike on stand-alone machines.
 Data is easy to backup as all the data is stored on the file server.

Disadvantages

 Purchasing the network cabling and file servers can be expensive.


 Managing a large network is complicated, requires training and a network manager usually needs
to be employed.
 If the file server breaks down the files on the file server become inaccessible. Email might still
work if it is on a separate server. The computers can still be used but are isolated.
 Viruses can spread to other computers throughout a computer network.
 There is a danger of hacking, particularly with wide area networks. Security procedures are
needed to prevent such abuse, eg a firewall.

Computer Network Topologies

Previous

Next

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspect of the network.
Both logical and physical topologies could be same or different in a same network.

The types of computer network topologies are as follows:

 Point-to-Point Topology
 Bus Topology
 Star Topology
 Ring Topology
 Mesh Topology
 Tree Topology
 Daisy Chain Topology
 Hybrid Topology

Point-to-Point Topology

Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate devices.
But the end hosts are unaware of underlying network and see each other as if they are connected
directly.

Bus Topology

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
In case of Bus topology, all devices share single communication line or cable.Bus topology may
have problem while multiple hosts sending data at the same time. Therefore, Bus topology either
uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of
the simple forms of networking where a failure of a device does not affect the other devices. But
failure of the shared communication line can make all other devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line.

Explore our latest online courses and learn new skills at your own pace. Enroll and become a
certified expert to boost your career.

Star Topology

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
All hosts in Star topology are connected to a central device, known as hub device, using a point-
to-point connection. That is, there exists a point to point connection between hosts and hub. The
hub device can be any of the following:

 Layer-1 device such as hub or repeater


 Layer-2 device such as switch or bridge
 Layer-3 device such as router or gateway

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all
other hosts fails. Every communication between hosts, takes place through only the hub.Star
topology is not expensive as to connect one more host, only one cable is required and
configuration is simple.

Ring Topology

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.

Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.

Mesh Topology

In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-
point connection to few hosts only.

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:

 Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus
for every new host n(n-1)/2 connections are required. It provides the most reliable network
structure among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect
to each other in some arbitrarily fashion. This topology exists where we need to provide
reliability to some hosts out of all.

Tree Topology

Also known as Hierarchical Topology, this is the most common form of network topology in use
presently.This topology imitates as extended Star topology and inherits properties of bus
topology.

This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer where
computers are attached. The middle layer is known as distribution layer, which works as
mediator between upper layer and lower layer. The highest layer is known as core layer, and is
central point of the network, i.e. root of the tree from which all nodes fork.

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT

All neighboring hosts have point-to-point connection between them.Similar to the Bus topology,
if the root goes down, then the entire network suffers even.though it is not the single point of
failure. Every connection serves as point of failure, failing of which divides the network into
unreachable segment.

Daisy Chain Topology

This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are
connected then it represents Ring topology.

Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments.Every intermediate host works as relay for its immediate hosts.

Hybrid Topology

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.
TAITA TAVETA NAIONAL POLYTECHNIC
ICT DEPERTMENT
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.

The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by
means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology

NOTES BY: FELISTER M.


ICT TRAINER/COUNSELLOR.

You might also like