0% found this document useful (0 votes)
34 views27 pages

Data Comm Lecture 2

This document provides an overview of a lecture on computer networks given by Dr. Sylvester Akpah at the University of Mines and Technology. The lecture covers the concepts of data communication, computer networks, applications of computer networks, and classifications of computer networks including geographical span, network interconnectivity, network administration, and network architecture. Key topics discussed include local and wide area networks, communication protocols, resource and file sharing, electronic commerce, and peer-to-peer versus client-server network architectures.

Uploaded by

Bruno Blay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views27 pages

Data Comm Lecture 2

This document provides an overview of a lecture on computer networks given by Dr. Sylvester Akpah at the University of Mines and Technology. The lecture covers the concepts of data communication, computer networks, applications of computer networks, and classifications of computer networks including geographical span, network interconnectivity, network administration, and network architecture. Key topics discussed include local and wide area networks, communication protocols, resource and file sharing, electronic commerce, and peer-to-peer versus client-server network architectures.

Uploaded by

Bruno Blay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 27

UNIVERSITY OF MINES AND TECHNOLOGY

FACULTY OF ENGINEERING
COMPUTER SCIENCE AND ENGINEERING DEPARTMENT

COURSE NAME – DATA COMMUNICATION & COMPUTER


NETWORKS
COURSE CODE – CE 374

LECTURER NAME – DR SYLVESTER AKPAH


M OB I L E - +2 3 3 2 0 7 5 4 1 6 8 4 / 2 4 4 2 2 0 3 6 1
E M A I L – s a k p a h @u ma t .e d u . g h
LECTURE TWO

INTRODUCTION TO COMPUTER NETWORKS


St ud en t L ea r n i n g o u t co m es
 
Aft e r g o i n g t h r o u g h t h i s c h ap t e r, s t u d e n t s w i l l :
 
 Un d e rs t a n d t h e c o n ce p t o f c o m p u t er n e t wo r k s ;
 Un d e rs t a n d w h a t n e t w o r k t o p o l o g i es a r e ;
 Id e n t i f y t h e k e y c o m p o n e n t s o f an y c o m p u t e r n e t w o r k s ; a n d
 De sc r i b e t h e c h a r a c t e r i s t i cs o f n e t w o r k ar ch i t ec t u r e s : r el i a b i l i t y, p e r f o r m a n ce a n d
se c ur i t y.
DATA COMMUNICATION
D a ta c om m un i c a tio n r ef e r s t o th e e x c h a n ge o f d a ta o r i n f o r m a ti o n b e tw e e n t w o o r m o r e
d e vi c e s ov e r a c o m m u n i ca t io n c ha nn e l . T h e c om m un i c a tio n c h a nn e l c a n be w ir e d o r
w ir el e s s , a nd c a n r a n g e f r o m a s im p l e ca b le co n n e c ti ng t w o d e vi c e s to a co m p le x
n e tw o r k c o n n ec tin g m u ltip l e d e v ic e s .
D a ta c o m m u n ic a t io n c an o c c u r in v a r io u s f o r m s , s u c h a s te x t, vo i c e , v id e o , o r a n y
o th e r t yp e o f d ig it al d a ta . Th e c o m m un i c a tio n p r o c e s s i n v o lv e s th e e n c o d in g o f d a ta b y
th e s e n d e r, t h e tr an s m is s i on of th e d a ta t h r o u g h th e c o m m u n i ca t io n c h a n n el , a n d t he
d e co d i n g o f th e d at a b y th e r e c e i ve r.
D a ta c o m m u n ic a ti on i s e s s e n t ia l f o r m o d e r n c o m m u n ic a ti o n s y s te m s , in c lu d in g th e
in te r n e t , te l e c om m u ni c a tio n n e tw o r k s , a n d c o m p u te r n e tw o r k s . I t a ll o w s f o r e ff ic ie n t
a n d r e l ia b le e x c ha n g e o f in f o r m a tio n , f a c i lit at in g c o m m u n i ca tio n a n d c ol la b o r a ti o n
a m o n g in d i vi d u a ls, o rg a n iz a tio n s , a n d m a ch in e s .
COMPUTER NETWORKS
In the area of computing, a network refers to a collection of devices, such as computers, servers,
routers, switches, and other hardware and software components, that are connected to enable
communication and information sharing among them. Networks can be classified based on their
size, geographical scope, and their purpose.
For example, a local area network (LAN) is a network that connects devices within a small
g e o g r a p h i c a l a r e a , s u c h a s a s i n g l e b u i l d i n g o r a c a m p u s , w h i l e a w i d e a r e a n e t w o r k ( WA N )
c o n n e c t s d e v i c e s a c r o s s a l a rg e r g e o g r a p h i c a l a r e a , s u c h a s m u l t i p l e c i t i e s o r c o u n t r i e s . T h i s
interconnection among computers facilitates information and resource sharing among them.
Computers may connect by either wired or wireless media.
Networks use a variety of communication protocols, such as transmission control protocol/internet
protocol (TCP/IP), hypertext transfer protocol (http), file transfer protocol (ftp) and others, to
e n a b l e d e v i c e s t o c o m m u n i c a t e a n d e x c h a n g e d a t a w i t h e a c h o t h e r. A d d i t i o n a l l y, n e t w o r k s c a n b e
secured using various authentication and encryption techniques to protect sensitive data and
prevent unauthorized access.
In the modern world, computer networks have become almost indispensable. All major businesses
and governmental and educational institutions make use of computer networks to such an extent
t h a t i t i s n o w d i ff i c u l t t o i m a g i n e a w o r l d w i t h o u t t h e m .
APPLICATIONS OF COMPUTER NETWORKS
C o m p u t e r n e t w o r ks h a v e t r a n s f o r m e d t h e wa y w e c o m m u n i c a t e , s ha r e i n f o r m a t i o n, a n d
c o n d u c t b u s i n e s s. S o m e o f t h e se a r e l i s t e d a s f o l l o w s:
 E n h a n c e d c o m m u n i c a t i o n : c om p u t e r ne t w or k s a l l o w p e o p l e t o c om m u n i c a t e w i t h e a c h
o t h e r r e g a r d l e ss of t h e i r g e o g r a p h i c a l l o c a t i o n . T h i s c a n be c a r r i e d o u t t h r o u g h e m a i l ,
i n s t a n t m e ssa g i n g , v o i c e a n d v i d e o c on f e r e n c i n g , a n d s o c i a l m e d i a ;
 R e so u rc e sh ar i n g : c o m p u t e r n e t w o r k s a l l o w f or e a sy r e so u r c e s h a r i n g su c h a s p r i n t e r s,
s c a n n e r s, a nd d a t a st o r a g e d e v i c e s. T h i s h a s be e n s h o wn t o r e d u c e t h e c o st of h a r d w a r e
a n d i nc r e a se d t h e e ff i c i e n c y o f t h e o rg a n i z a t i o n ;
 F i l e sh a r i n g : c o m p u t e r n e t w o r k s a l l o w u se r s t o sh a r e f i l e s, m a k i n g i t e a sy t o c o l l a b o r a t e
o n p r o j e c t s a n d sh a r e i n f or m a t i o n ;
 E l e c t ro n i c c o m m e rc e : c o m p u t e r n e t w o r k s h a v e e n a b l e d t h e g r o w t h o f e - c o m m e r c e ,
a l l ow i n g b u si n e s se s t o s e l l p r o d u c t s a n d s e r v i c e s o n l i n e . T h i s h a s o p e ne d u p n e w m a r k e t s
a n d c r e a t e d n e w o p p o r t u n i t i e s f o r b u si n e s se s; a nd
 E d u c a t i o n : c om p u t e r n e t w o r k s a r e us e d e x t e n si v e l y i n e d u c a t i o n , a l l o w i n g st u d e n t s t o
a c c e ss e d u c a t i o na l r e s o u r c e s a n d c o l l a b o r a t e . T h i s h a s m a d e e d u c a t i o n m o r e a c c e s si b l e
a n d h a s i m p r ov e d t h e qu a l i t y o f e d u c a t i o n ; a n d .
CLASSIFICATION OF A COMPUTER NETWORK
A network can be classified as follows:

 Geographical span;
Network inter-connectivity;
Network administration; and
Network architecture.

Geographical span - geographically a network can be seen in one of the following


categories:

It may be spanned across your table, among Bluet ooth-enabled devices, ranging not
more than a few meters;
It may be spanned across a whole building, including intermediat e devices to connect
al l floors;
It may be spanned across a whole city;
It may be spanned across multiple ci ties or provinces; and
It may be one network covering the whole world.
CLASSIFICATION OF A COMPUTER NETWORK CONT’D
N e t w o r k I n t e r- c o n n e c t i v i t y - c o m p o n e n t s o f a n e t w o r k c a n b e c o n n e c t e d d i ff e r e n t l y i n s o m e
f a s h i o n . B y c o n n e c t e d n e s s , w e m e a n e i t h e r l o g i c a l l y, p h y s i c a l l y, o r b o t h w a y s . E v e r y s i n g l e d e v i c e
can be connected to every other device on the network, making the network a mesh.

 All devices can be connected to a single medium but geographically disconnected, creating a
bus-like structure.
 E a c h d e v i c e i s c o n n e c t e d t o i t s l e f t a n d r i g h t p e e r s o n l y, c r e a t i n g a l i n e a r s t r u c t u r e .
 A l l d e v i c e s a r e c o n n e c t e d w i t h a s i n g l e d e v i c e , c r e a t i n g a s t a r- l i k e s t r u c t u r e .
 A l l d e v i c e s c o n n e c t e d a r b i t r a r i l y u s i n g a l l p r e v i o u s w a y s t o c o n n e c t e a c h o t h e r, r e s u l t i n g i n a
hybrid structure.
N e t w o r k A d m i n i s t r a t i o n - F r o m a n a d m i n i s t r a t o r ’s p o i n t o f v i e w, a n e t w o r k c a n b e a p r i v a t e
network which belongs to a single autonomous system and cannot be accessed outside its physical
or logical domain. A network can be public and is accessed by all.
CLASSIFICATION OF A COMPUTER NETWORK CONT’D
N e t wo rk A rc h i t ec t u re - N et w o r k a r c h i t e ct u r e r e f e r s t o t h e d e s i g n an d o rg a n i z a t i o n o f
c o mp u t e r n e t w o r k s, i n c l u d i n g t h e l ay o u t o f h a r d wa r e c o m p o n e n t s , s o f t w a r e , a n d
c o mm u n i c at i o n p r o t o c o l s . A w e l l - d es i g n e d n e t w o r k ar ch i t ec t u r e i s c r i t i c al f o r e n s u r i n g
e ff i c i e nt a n d r e l i a b l e c o m mu n i c at i o n b et w e en d e v i c e s o n a n et w o r k . C o m p u t e r n et w o r k
a r c hi t e c t u r e c an b e d i v i d e d i n t o t w o m ai n t y p e s n a me l y : cl i e n t - s e r v e r a n d p ee r- t o - p e e r
a r c hi t e c t u r e .

P ee r- to- pe e r A rch i t e c t u re - p e er- t o - p e er ( P 2 P ) ar ch i t e c t u r e i s d e s c r i b e d as a t y p e o f


n e t wo rk a r c h i t ec t u r e t h a t a l l o ws n o d e s o n a n e t w o r k t o a ct b o t h a s c l i en t s a n d s e r v e r s . I n
P 2 P n e t wo r k s , t h e r e i s n o ce n t r a l i s ed s er v e r t h a t c o n t r o l s c o m m u n i ca t i o n b e t w e e n n o d e s .
I n s t e a d, e a ch n o d e ca n c o mm u n i c at e d i r ec t l y w i t h an y o t h e r n o d e o n t h e n e t w o r k .

P 2 P a rc h i t ec t u r e p r es e n t s s o m e d i s ad v a n t ag e s t o o , s u c h a s t h e d i ff i cu l t y o f m a n a g i n g a n d
se c uri ng a l a rg e n u m b e r o f n o d e s, an d t h e p o t e n t i al f o r s l o w er p e r f o r m an c e d u e t o t h e l ac k
o f ce n t ra l i se d c o n t r o l . N e v e r t h e l e s s , P 2 P a r ch i t e ct u r e r e ma i n s an i mp o r t an t an d u s e f u l t y p e
o f n e t wo rk a r c h i t e c t u r e f o r c er t ai n a p p l i ca t i o n s .
CLASSIFICATION OF A COMPUTER NETWORK CONT’D
Client/server architecture - client/server architecture is described as a type
of network architecture in which client devices request services or resources
from server devices. In this architecture, servers provide resources such as
files, applications, and data storage, while clients request and use these
resources.

Client/server architecture presents several advantages over other


architectures, including centralised control, enhanced security, and
scalability. Nevertheless, it can also be more complex and expensive to
implement and maintain than other architectures. Overall, client/server
architecture is widely used in enterprise environments, where centralized
control and security are important considerations.
DATA TRANSMISSION SIGNALS
Data transmission signals are electrical or electromagnetic signals that carry digital or analogue
i n f o r m a t i o n f r o m o n e d e v i c e t o a n o t h e r. T h e s e s i g n a l s c a n b e i n t h e f o r m o f v o l t a g e , c u r r e n t , l i g h t ,
or radio waves. Data transmission signals are transmitted using various transmission media, such
as copper wire, fibre optic cables, and wireless transmission.
The choice of transmission medium depends on the distance of the transmission, the speed of the
transmission, and the level of interference present in the environment. When data is sent over a
physical medium, it needs to be first converted into electromagnetic signals. There are two main
types of data transmission signals: analogue and digital.
 
 Digital signals - digital signals are discrete and represented by binary digits (bits) that can take
on only two values: 0 or 1. Digital signals are less susceptible to noise and interference than
analogue signals and can be transmitted over longer distances without degradation. Examples of
digital signals include ethernet, USB, and HDMI.

 Analog signals - analog signals are continuous and vary in amplitude and frequency over time.
Examples of analogue signals include sound waves and radio waves. Analogue signals are
susceptible to noise and interference, which can cause distortion and signal degradation.
DATA TRANSMISSION SIGNALS CONT’D
 No i s e - r a n d o m d i s t u r b a n c e o r f l u c t u a t i o n i n a n a n a l o g u e o r d i g i t a l s i g n a l i s s a i d t o b e n o i s e
i n t h e s i g n a l , w h i c h m a y d i s t o r t t h e a c t u a l i n fo r m a t i o n b e i n g c a r r i e d . N o i s e c a n b e
c h a ra c t e r i z e d i n o n e o f t h e f o l l o wi n g c l a s s e s :

 T he r m a l no i s e - h e a t a g i t a t e s t h e e l e c t ro n i c c o n d u c t o r s o f a m e d i u m wh i c h m a y i n t r o d u c e
n o i s e i n t h e m e d i a . U p t o a c e rt a i n l e v e l , t h e rm a l n o i s e i s u n a v o i d a b l e .

 I n te r m o d u l a t i o n - wh e n m u l t i p l e fr e q u e n c i e s s h a r e a m e d i u m , t h e i r i n t e r f e r e n c e c a n c a u s e
n o i s e i n t h e m e d i u m . I n t e rm o d u l a t i o n n o i s e o c c u r s i f t wo d i ff e r e n t f r e q u e n c i e s a r e s h a r i n g a
m e d i u m a n d o n e o f t h e m h a s e x c e s s i v e s t re n g t h o r t h e c o m p o n e n t i t s e l f i s n o t f u n c t i o n i n g
p r o p e r l y, t h e n t h e r e s u l t a n t fr e q u e n c y ma y n o t b e d e l i v e r e d a s e x p e c t e d .

 Cro s s ta l k - t h i s s o r t o f n o i s e h a p p e n s w h e n a fo r e i g n s i g n a l e n t e r s t h e m e d i a . T h i s i s
b e c a u s e t h e s i g n a l i n o n e me d i u m a ffe c t s t h e s i g n a l o f t h e s e c o n d m e d i u m .

 I m p ul s e - t h i s n o i s e i s i n t r o d u c e d b e c a u s e o f i r re g u l a r d i s t u r b a n c e s s u c h a s l i g h t e n i n g ,
e l e c t r i c i t y, s h o r t c i r c u i t s , o r fa u l t y c o mp o n e n t s . D i g i t a l d a t a i s m o s t l y a ff e c t e d b y t h i s s o r t
of noise.
DATA FLOW IN A NETWORK
Data flow in a network refers to the movement of data from one device to another device over a
network. The data flow can be categorised into simplex, half-duplex or full-duplex (duplex)

S i m p l e x - s i m p l e x d a t a f l o w r e f e r s t o t h e t r a n s m i s s i o n o f d a t a i n o n e d i r e c t i o n o n l y. O n e p a r t y i s
t h e t r a n s m i t t e r a n d t h e o t h e r i s t h e r e c e i v e r. F i g . 2 . 1 s h o w s a n i m a g e o f a s i m p l e x d a t a f l o w
structure.

H a l f - d u p l e x - h a l f - d u p l e x t r a n s m i s s i oFig.
n 2.1
i s Simplex
a t y pData
e oFlow
f dStructure
ata flow where data can flow in both
directions, but only in one direction at a time. In other words, data can be transmitted or received,
b u t n o t b o t h s i m u l t a n e o u s l y. F i g . 2 . 2 s h o w s a n i m a g e o f h a l f - d u p l e x d a t a f l o w.

Fig. 2.2 Half-Duplex Data Flow Structure


DATA FLOW IN A NETWORK CONT’D
F u l l - d u p l e x - f u l l d u p l e x r e f e r s t o t h e t r a n s m i s s i o n o f d a t a i n t w o d i r e c t i o n s s i m u l t a n e o u s l y.
D u p l e x m o d e i s l i k e a t w o - w a y s t r e e t w i t h t r a ff i c f l o w i n g i n b o t h d i r e c t i o n s . M o s t m o d e m s
have a switch that lets you choose between full-duplex and half-duplex modes. Fig. 2.3
shows an image of a full-duplex data flow structure.

Fig. 2.3 Full-Duplex Data Flow Structure


NETWORK CRITERIA
Network criteria refers to the specific characteristics that are used to evaluate and determine the
e ff e c t i v e n e s s a n d e f f i c i e n c y o f a c o m p u t e r n e t w o r k . A n e t w o r k s h o u l d b e a b l e t o m e e t t h e f o l l o w i n g
criteria:

 Performance - performance can be measured in several ways including transmit time and response
t i m e . Tr a n s m i t t i m e i s t h e a m o u n t o f t i m e r e q u i r e d f o r a m e s s a g e t o t r a v e l f r o m o n e d e v i c e t o
a n o t h e r. R e s p o n s e t i m e i s e l a p s e d t i m e b e t w e e n i n q u i r y a n d r e s p o n s e .

 Reliability - reliability is measured by the frequency of failure. The time it takes a link to recover
f r o m f a i l u r e a n d t h e n e t w o r k ’s r o b u s t n e s s i n c a t a s t r o p h e .

 Security - network security consists of the provisions and policies adopted by the network
administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the
computer network and network-accessible resources.

Network criteria are important considerations when designing, implementing, and maintaining a
c o m p u t e r n e t w o r k . T h e y h e l p e n s u r e t h a t t h e n e t w o r k i s e ff i c i e n t , r e l i a b l e , a n d s e c u r e , a n d m e e t s t h e
n e e d s o f t h e u s e r s a n d t h e o rg a n i z a t i o n .
TYPES OF NETWORK CONNECTIONS
A network is two or more devices connected through links. There are two types of network
connections, namely: point-to-point and point-to-multipoint.

 Point- to-point connection - a point-to-point connection is a type of communication link


between two devices in a computer network where data is transmitted between the devices
d i r e c t l y, w i t h o u t a n y i n t e r m e d i a r y d e v i c e s s u c h a s s w i t c h e s o r r o u t e r s . I n s u c h a
connection, a dedicated communication channel is established between the two devices,
a l l o w i n g f o r f a s t a n d e ff i c i e n t c o m m u n i c a t i o n . O n e c o m m o n e x a m p l e o f a p o i n t - t o - p o i n t
connection is a serial cable connecting two computers or two devices such as a printer
a n d a c o m p u t e r. F i g . 2 . 4 s h o w s a n i m a g e o f a p o i n t - t o - p o i n t c o n n e c t i o n .

Fig. 2.4 A Point-to-Point Connection


TYPES OF NETWORK CONNECTIONS CONT’D
Multipoint Connection - A multipoint connection is a type of communication link between multiple devices in a
computer network, where data is transmitted between all devices using a shared communication channel. In a multipoint
connection, there is no dedicated communication channel between each pair of devices, and all devices share the same
transmission medium.

One common example of a multipoint connection is a wireless network, where multiple devices connect to the same wireless
access point and share the same radio frequency channel. Another example is a bus topology network, where multiple
devices connect to a shared communication cable. Multipoint connections are often used in situations where multiple devices
need to communicate with each other, but a dedicated communication channel between each pair of devices is not practical
or necessary. Fig. 2.5 shows an image of a multipoint connection.

Fig. 2.5 A Multipoint Network Connection


NETWORK STANDARDS
Network standards are a set of guidelines and specifications that define how devices communicate with each other in a
network environment. These standards ensure that different devices from different manufacturers can communicate and
work together in a network, regardless of the hardware or software used. These standards are essential in creating and
maintaining an open and competitive market. Network standards facilitate the interoperability of network technologies
and are extremely important.
 
Several organizations develop and maintain network standards, including the International Organization for
Standardization (ISO), the Institute of Electrical and Electronics Engineers (IEEE), the Internet Engineering Task Force
(IETF), the American National Standards Institute (ANSI) and Consultative Committee for International Telegraphy and
Telephony (CCITT)
 
In data communication, network standards are categorized as follows:
 De facto- standards that have not been approved by organized bodies but have been adopted as standards through
widespread use. A widespread consensus on a particular product or protocol which has not been ratified by any
official standards body, but which has a large market share. Example TCP/IP, Microsoft Windows
 De jure- standards that have been legislated by officially recognized bodies. De jure or formal standards that are
developed by accredited standards organizations using rigid procedures that may periodically be audited.
CATEGORIES OF COMPUTER NETWORKS

Computer networks are distinguished based on their geographical span. A network can be as small as the distance
between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole
geographical world. Computer networks are categorized as follows:

Personal Area Network (PAN) - A Personal Area Network (PAN) is the smallest network which is very personal
to a user. This may include Bluetooth-enabled devices or infrared-enabled devices. PAN has a connectivity range
of up to 10 meters. PAN may include a wireless computer keyboard and mouse, Bluetooth-enabled headphones,
wireless printers, and TV remotes. Fig. 2.6 shows the architecture of a Personal Area Network (PAN).

Fig. 2.6 Personal Area Network (PAN)


CATEGORIES OF COMPUTER NETWORKS CONT’D
Local Area Network (LAN) - A computer network spanned inside a building and operated
under a single administrative system is known as a Local Area Network (LAN). Usually, LAN
covers an organization's offices, schools, colleges or universities. The number of systems
connected in LAN may vary from as least two to as much as 16 million. LAN provides a useful
way of sharing resources between end users. Resources such as printers, file servers, scanners,
and the internet are easily sharable among computers. Fig. 2.7 shows the architecture of a
Local Area Network (LAN).

Fig. 2.7 Local Area Network (LAN)


CATEGORIES OF COMPUTER NETWORKS CONT’D
Metropolitan Area Network (MAN) - The Metropolitan Area Network (MAN) generally expands throughout a
city such as a cable TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data
Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand
their Local Area Networks.

For example, MAN can help an organization connect all of its offices in a city. The backbone of MAN is high-
capacity and high-speed fibre optics. MAN works in between Local Area Network and Wide Area Network.
MAN provides uplink for LANs to WANs or the internet. Fig. 2.8 shows the architecture of a MAN.

Fig. 2.8 Metropolitan Area Network (MAN)


CATEGORIES OF COMPUTER NETWORKS CONT’D
Wide Area Network (WAN) - As the name suggests, the Wide Area Network (WAN) covers a wide area which
may span across provinces and even a whole country. Generally, telecommunication networks are Wide Area
Networks. These networks provide connectivity to MANs and LANs.

Since they are equipped with a very high-speed backbone, WANs use very expensive network equipment.
Computers connected to a wide-area network are often connected through public networks, such as the telephone
system. They can also be connected through leased lines or satellites. The largest WAN in existence is the
Internet. Fig. 2.9 shows the architecture of a WAN.

Fig. 2.9 Wide Area Network (WAN)


COMPUTER NETWORK TOPOLOGY
A Network Topology is the physical or logical arrangement of computers and other hardware peripherals such as computers,
servers, switches, routers, and the connections between them connected to form a network.
 Physical Topology means the physical design of a network including the devices, location and cable installation.
 Logical Topology refers to the fact of how data transfers in a network as opposed to its design.

Bus Topology - Bus topology is a type of computer network topology in which all devices are connected to a single cable
or backbone. The cable runs through all the devices, and each device taps into the cable to send or receive data. In a bus
topology, data is broadcast to all devices on the network, and each device checks the data to see if it is intended for it. If the
data is not intended for the device, it ignores it. Fig. 2.10 shows the architecture of a Bus Topology.

Fig. 2.10 Architecture of a Bus Topology


COMPUTER NETWORK TOPOLOGY CONT’D

Star Topology - Star topology is a type of computer network topology in which all devices are connected to a
central hub or switch. The hub acts as a traffic cop, forwarding data between devices on the network. Each
device has a dedicated connection to the hub, which allows for greater control over traffic flow and reduces the
chance of collisions. In a star topology, if one device fails, it does not affect the rest of the network, as each
device is connected to the hub independently. This makes it a more reliable and resilient topology than a bus
topology. Fig. 2.11 shows the architecture of a star topology.

Fig. 2.11 Architecture of a Star Topology


COMPUTER NETWORK TOPOLOGY CONT’D
Ring Topology - Ring topology is a type of computer network topology in which devices are connected in a
closed loop, with each device receiving and forwarding signals to the next device in the loop. Data travels around
the ring in one direction, with each device acting as a repeater to boost the signal. In a ring topology, only one
device can transmit data at a time, which helps to avoid collisions and ensures that the network is more reliable.

Additionally, there is no need for a central hub or switch, which can reduce costs and simplify network
management. However, ring topology also has some drawbacks. If one device fails or the cable is cut, the entire
network can be disrupted. Fig. 2.12 shows the architecture of a ring topology.

Figure 2.12 Architecture of a Ring Topology


COMPUTER NETWORK TOPOLOGY CONT’D
Mesh Topology - Mesh topology is a type of computer network topology in which each device is connected to
every other device on the network, creating redundant paths for data to travel in case one connection fails. In a
mesh topology, every device has a dedicated point-to-point connection to every other device, which provides more
redundancy and resilience compared to other topologies.

If one device or connection fails, data can still reach its destination by taking an alternate path. This type of
topology is used in high-availability networks where downtime is not an option. However, mesh topology also has
some drawbacks. It can be expensive to implement since it requires a lot of cabling and network equipment. Fig.
2.13 shows the architecture of a mesh topology.

Fig. 2.13 Architecture of a Mesh Topology


CHAPTER QUESTIONS
1) Which one is a wired transmission medium
2) What is a computer network
3) Briefly differentiate between the types of network topologies
4) Define computer network standards
5) Differentiate between de facto and de jure standards
6) All computer networks must meet three basic criteria, name them
7) Name the two basic network connections
8) What is meant by data flow in signal transmission
9) Outline the different types of data flow signals
10)What is network transmission impairment and list some impairment techniques that
affect network transmission?
THANK YOU

You might also like