Computer Networks
Computer Networks
_____________
HABIB ULLAH
Computer Network
Multiple computers that are connected together to share
information and other resources
Examples of Computer Network
Usage
I can send an eMail message to a remote computer using the SMTP protocol
I can browse documents residing on a remote computer using the HTTP protocol
I can download or upload files to a remote computer using the FTP protocol
Example of
a Computer Hub
Computer
D
Network
Computer
B Computer
C
Components of Conventional
Computer Networks
1. Computers
3. Hub
◦ The network traffic controller
Components of Conventional
Computer Networks
4. Cables
◦ Are either electrical or optical
◦ Not required at all for wireless networks
5. Protocol
◦ Rules governing communications over the network
How Does a Conventional
Network Work?
1. Suppose computer A wants to send a message to D
3. The NIC translates the message into electrical pulses suitable for the computer network in
use & transmits it to the hub through the cable
How Does a Conventional
Network Work?
4. The hub receives them and forwards them to all computers connected to it
5. The NICs of all computers connected to the hub receive the forwarded electrical pulses
6. The NIC of computer D decides that the message is for it, & translates the pulses back to a
form suitable for the computer
Hub
A device that is used to connect several computers to form a network
A hub has several ports. The number generally is 8, 12, 16, 24, 32, or 48
Each computer in a network is connected to one of those ports through a cable
A computer wanting to send a message to one of the others in the network sends a message to
the hub, which, in turn, broadcasts the message to all others connected to it
Packet (1)
The smallest unit of data transmitted over a computer network
A message to be transferred over the network is broken up into small packets by the sending
computer
When all packets are received by the destination computer, it reassembles them to form the
original message
Types of Computer Networks
according to the network access policy
Private
Public
Private Networks (1)
Organizations having many computers usually connect them in the form of private networks
This allows computers from within the organization to exchange info, but keeps the info private
and protected from outsiders
All equipment on a private network is generally for the exclusive use of that organization
Public Networks
All networks that are not private, are … public
Example: Internet
Communication equipment used in these networks is generally being used by users belonging to
several (possibly thousands of) organizations as well as those belonging to no organization
VPN: Virtual Private Network
From the user’s point-of-view, a VPN looks like a secure, private network
VPNs use public telecom infrastructure, maintaining privacy through security procedures
VPNs provide secure network connections for distance computers without using dedicated,
private channels to supply the connection
Examples:
◦ Computer network at your PVC
◦ Computer network of a University campus
WAN
A network in which computers are separated by great distances, typically across cities or even
continents
Example:
◦ The network connecting the ATM of a bank located in various cities
◦ A network connecting the local and oversea offices of a SW house
◦ Internet
Connecting LANs to other
Networks
Special-purpose devices are used to link LANs to other networks
A router examines the destination info in each arriving packet and then routes it through the
most efficient path available
The router either delivers the packet to the destination computer across a local network or
forwards the packet to another router that is closer to the final destination
Bridge
Used to form a connection between two separate, but similar networks
In a way, it creates an extended LAN by passing information between two or more LANs
Gateway
A special-purpose computer that provides connection and translation between networks that
use different communications protocols
Modulator converts computer messages to electrical pulses that are suitable for transmission
over the telephone lines
Demodulator converts electrical pulses received over telephone lines into messages that are
comprehensible for computers
Network Topologies
The pattern in which computers are connected to form a network
Popular patterns:
◦ Point-to-point
◦ Star
◦ Bus
◦ Ring
Computer Computer
A B
P2P
Inexpensive
Limited connectivity
Star D
Computer Computer
A Server C
Computer
B
Star (1)
A computer sends the address of the intended receiver and the data to the server
If any of the nodes goes down, the rest of the network is not affected
Computer Computer
Bus A C
Bus: A high
speed cable
Computer Computer
B D
Bus (1)
No server is required
One computer sends data to another by broadcasting the address of the receiver and the data
over the bus
All the computers in the network look at the address simultaneously, and the intended recipient
accepts the data
Bus (2)
A bus network, unlike ring or star networks, allows data to be sent directly from one computer
to another
However, only one computer at a time can transmit data. The others must wait until the bus gets
idle
If any of the nodes goes down, the rest of the network is not affected
Computer
Ring D
Computer Computer
A C
Computer
B
Ring (1)
No server is required
A computer sends the message to its neighbor. The neighbor examines the message to
determine if it is the intended recipient
If the data are not intended for that particular neighbor, it passes the message to the next
computer in the ring
Ring (2)
This process is repeated until the data arrive at their intended recipient