0% found this document useful (0 votes)
13 views21 pages

Networking - 1

The document outlines a course on Computer Networks, detailing learning outcomes such as understanding network design, TCP/IP protocols, and enterprise network development. It includes information about the lecturer, James Moses Ngbede, and a comprehensive lecture schedule covering various network concepts, components, types, topologies, and protocols. The document emphasizes the importance of computer networks in facilitating communication, resource sharing, and efficient data transfer.

Uploaded by

keanaalihaidar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views21 pages

Networking - 1

The document outlines a course on Computer Networks, detailing learning outcomes such as understanding network design, TCP/IP protocols, and enterprise network development. It includes information about the lecturer, James Moses Ngbede, and a comprehensive lecture schedule covering various network concepts, components, types, topologies, and protocols. The document emphasizes the importance of computer networks in facilitating communication, resource sharing, and efficient data transfer.

Uploaded by

keanaalihaidar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

DATE: 16 – 05 – 2023

COMPUTER NETWORKS
Learning Outcomes
At the end of this course, students will be able to:

❑ Describe fundamental concepts in the design and

implementation of computer communication networks

design, architecture

❑ Demonstrate TCP/IP protocols, including flow control, congestion

control and routing.

❑ Develop an enterprise network employing the common LAN

technologies with subsequent advantages and disadvantages

❑ Build a PC to work as a host in TCP/IP network using the IP

based commands for ethical trouble shooting process.


Lecturer Details
Name: James Moses Ngbede

Nationality: Nigerian

Institution Attended with Qualification Obtained

Huawei Technologies (HCIA Routing &

Switches) Huawei Technologies (HCIA Data

Warehousing)

Federal Unversity, Dutsin-Ma, Nigeria (BSc.


in Computer Science & IT)

Email: [email protected]

HP: +2347036988333
Lecture Schedule
Introduction to Computer Network
Network Models
Network Devices
Network Addressing
Network Protocols and Services
Network Security
Wireless Networking
Network Troubleshooting
Network Management
Timetable

Day Tuesday

Time 02:00pm – 05:00pm (Nigerian Time)

Venue Lecture Room 2


Assessment
Introduction to Computer Network
❑ A computer network is a collection of interconnected devices, such as computers,
servers, routers, switches, and other communication devices, that are linked together
to enable data exchange and resource sharing.
❑ Purpose of Computer Networks include;
Resource Sharing
Communication
Data Transfer and
Storage Internet
Access Centralized
Management Cost
Efficiency
Scalability
Collaboration and
Productivity
❑ Computer networks play a crucial role in enabling communication, resource sharing,
and efficient data transfer, fostering connectivity and collaboration in various domains,
Network Component
❑ Nodes: Nodes are the devices connected to the network. They can be computers, servers, routers,
switches, printers, mobile devices, or any device capable of sending, receiving, or processing data.
❑ Network Interface Card (NIC): A Network Interface Card, also known as a network adapter or network
card, is a hardware component that enables a device to connect to a network.
❑ Switches: Switches are networking devices that connect multiple devices within a network. They
receive data packets and forward them to the intended destination based on the MAC (Media
Access Control) addresses of the devices.
❑ Routers: Routers are devices that connect multiple networks together, such as connecting a local
network to the Internet. They use routing tables and protocols to determine the optimal path for
forwarding data packets between networks.
❑ Hubs: Hubs are simple networking devices that connect multiple devices within a network. Unlike
switches, hubs broadcast incoming data packets to all connected devices, and each device
determines whether the data is intended for it.
Network Component
❑ Modems: Modems (Modulator-Demodulator): are devices that enable the transmission of digital
data over analog communication channels, such as telephone lines or cable lines.

❑ Cables and Connectors: Various types of cables and connectors are used to establish physical
connections between network devices.

❑ Wireless Access Points (WAPs): Wireless Access Points, also known as WAPs or access points,
enable wireless connectivity within a network. They transmit and receive wireless signals,
allowing devices with Wi-Fi capabilities to connect to the network without the need for physical
cables.

❑ Network Protocols: Network protocols are sets of rules and standards that govern the
communication between devices in a network. Examples include TCP/IP (Transmission Control
Protocol/Internet Protocol), Ethernet, Wi-Fi (802.11), HTTP (Hypertext Transfer Protocol), and
DNS (Domain Name System).
Types of Network
❑ Personal Area Network (PAN): PAN is made up of a wireless modem, a computer
or two,

phones, printers, tablets, etc., and revolves around one person in one building.

❑ Local Area Network (LAN): It connect groups of computers and low-voltage devices

together across short distances (within a building or between a group of two or three

buildings in close proximity to each other) to share information and resources.

❑ Campus Area Network (CAN): They can be spread across several buildings that are

fairly close to each other so users can share resources

❑ Metropolitan Area Network: These types of networks are larger than LANs but

smaller than WAN - and incorporate elements from both types of networks. They

move storage resources away from the network and place them into their own high-

performance network.

❑ Wide Area Network (WAN): WAN connects computers together across longer physical
Types of Network
❑ Storage Area Network (SAN): Is a dedicated high-speed network that connects shared
pools of

storage devices to several servers.

❑ Wireless Local Area Network (WLAN): It makes use of wireless network technology, such as

WiFi. these types of networks don’t require that devices rely on physical cables to connect

to the network.

❑ Passive Optical Local Area Network (POLAN): POLAN technology can be integrated into

structured cabling to overcome concerns about supporting traditional Ethernet protocols

and network applications such as PoE (Power over Ethernet)

❑ Enterprise Private Network (EPN): These types of networks are built and owned by businesses

that want to securely connect its various locations to share computer resources.

❑ Virtual Private Network (VPN): By extending a private network across the Internet, a VPN lets
Network Topologies
❑ Bus Topology:

❑ In a bus topology, all devices are connected to a common

communication medium, often referred to as a "bus" or a backbone.

❑ Devices are connected to the bus using drop lines or taps.

❑ Data transmission is unidirectional, and all devices receive the


transmitted data.

❑ Only the intended recipient processes and acts upon it.

❑ The main advantage of the bus topology is its simplicity and cost-
effectiveness.

❑ The failure of the main bus can lead to the entire network being
disrupted.
Network Topologies
❑ Star Topology:

❑ In a star topology, each device is directly connected to a central

network node, often referred to as a "hub" or "switch."

❑ All data traffic passes through the central node.

❑ Devices communicate by sending data to the central node, which then

broadcasts the data to the intended recipient.

❑ If one device fails, it does not affect the functioning of other devices.

❑ Star topology provides better performance and fault isolation compared

to the bus topology.

❑ The central node becomes a single point of failure, and the cost of

cabling is relatively higher.


Network Topologies
❑ Tree/Hierarchical Topology:

❑ Tree topology is a combination of multiple star topologies connected in a

hierarchical structure.

❑ It has a root node that connects to multiple levels of child nodes, forming

a tree-like structure.

❑ Each child node in the tree can have its own set of child nodes.

❑ Data flows from higher levels to lower levels, and communication primarily

occurs through the root node.

❑ Tree topology allows for the expansion of the network and provides

ease of management.

❑ If the root node fails, the entire network beyond that point may become
inaccessible.
Network Topologies
❑ Mesh Topology:

❑ In a mesh topology, each device is connected to every other device in


the network.

This creates multiple redundant paths for data transmission.

❑ Mesh topology can be categorized into two types: Full Mesh and Partial

Mesh. In a full mesh, every device is directly connected to all other

devices.

❑ In a partial mesh, only selected devices have multiple connections.

❑ Mesh topology provides high fault tolerance and redundancy.

❑ It ensures multiple paths for data transmission, resulting in increased


reliability.

❑ It requires a significant amount of cabling and can be expensive to


implement.
Network Topologies
❑ Ring Topology:

❑ In a ring topology, devices are connected in a closed loop, forming a ring.

❑ Each device is connected to the adjacent devices, and the data

circulates around the ring in one direction.

❑ To transmit data, a device waits for a token, which circulates around the
ring.

❑ The device that possesses the token can send data, and the data

reaches the intended recipient.

❑ Ring topology provides equal access to all devices and is less susceptible

to collisions.

❑ A single device or cable failure can disrupt the entire network.


Network Topologies
❑ Hybrid Topology:

❑ Hybrid topology is a combination of two or more different network


topologies.

❑ For example, a network may have a combination of bus, star, and ring
topologies.

❑ Hybrid topologies are used to leverage the strengths of different

topologies and tailor the network to specific requirements.

❑ They offer flexibility, scalability, and can accommodate complex network


layouts.
Network Protocols and Standards
❑ Network protocols are the set of rules and guidelines that govern how data is transmitted, received, and processed
across computer networks.
❑ Standards, on the other hand, define the specifications and formats that ensure interoperability and compatibility
between different network devices and systems.
❑ TCP/IP (Transmission Control Protocol/Internet Protocol):
TCP/IP is the foundational protocol suite for the Internet and most modern computer networks.
It provides end-to-end communication by breaking data into packets, routing them across networks, and reassembling
them at the destination.
TCP is a connection-oriented protocol that guarantees reliable delivery of data.
It manages the establishment, maintenance, and termination of connections between devices.

❑ IP is a connectionless protocol responsible for addressing and routing packets across networks.
❑ It assigns unique IP addresses to devices and determines the best path for data transmission.
Network Protocols and Standards
❑ Ethernet: Ethernet is a widely used standard for local area networks (LANs). It defines the physical and data link layers of
the OSI model. Ethernet uses various media types, such as twisted-pair copper cables or fiber optic cables, to transmit
data in the form of frames.
It employs Carrier Sense Multiple Access with Collision Detection (CSMA/CD) to control access to the network medium
and avoid data collisions.
❑ Wi-Fi (IEEE 802.11): Wi-Fi is a wireless networking standard based on the IEEE 802.11 family of protocols. It enables
devices to connect and communicate wirelessly within a local area network.
Wi-Fi operates in different frequency bands, such as 2.4 GHz and 5 GHz, and uses various modulation schemes for
data transmission. It supports multiple security protocols like WEP, WPA, and WPA2 to ensure secure wireless
communication.
❑ HTTP (Hypertext Transfer Protocol): HTTP is the protocol used for communication between web browsers and web servers.
It facilitates the retrieval and display of web pages, images, videos, and other web resources.
❑ HTTP is a client-server protocol, where the client (web browser) sends requests to the server, and the server responds
with the requested data.
❑ HTTPS (HTTP Secure) is an extension of HTTP that adds encryption and authentication mechanisms to secure data
transmission over the network.
Network Protocols and Standards
❑ SMTP (Simple Mail Transfer Protocol) and POP3/IMAP:
SMTP is the standard protocol for sending email messages across networks. It establishes a connection between email
servers and transfers messages from the sender's server to the recipient's server.
POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are protocols used by email clients to retrieve
email messages from servers.
POP3 is a simple protocol that downloads emails to the client device and usually deletes them from the server, while
IMAP allows for synchronization between the client and server, allowing users to access and manage their emails from
multiple devices.
❑ DNS (Domain Name System):
DNS is a protocol that translates human-readable domain names (e.g., www.example.com) into IP addresses (e.g.,
192.168.0.1) that computers can understand.
DNS maintains a distributed database of domain names and their corresponding IP addresses, allowing users to access
websites using memorable names instead of IP addresses.
DNS operates through a hierarchical structure of DNS servers, including recursive resolvers, authoritative servers, and root
servers.
Thank
you for
your

You might also like