0% found this document useful (0 votes)
56 views31 pages

Networking Basics

The document discusses different types of computer networks including local area networks, wide area networks, wireless local area networks, and others. It also describes common network devices like modems, hubs, switches, and routers and how they function within a network.

Uploaded by

Izza Amir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views31 pages

Networking Basics

The document discusses different types of computer networks including local area networks, wide area networks, wireless local area networks, and others. It also describes common network devices like modems, hubs, switches, and routers and how they function within a network.

Uploaded by

Izza Amir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Networking Basics

APPLICATION OF INF ORMATION &


COMMUNICATION TE CHNOLOGIES ( ICT)
Computer Network
A computer network is a collection of interconnected devices, such as
computers, servers, printers, or other hardware, that are linked
together to facilitate communication and share resources. These
networks can be as small as a local area network (LAN) within a single
building or as vast as a global wide area network (WAN) connecting
networks across different geographical locations.
Computer networks can be wired or wireless.
Wired networks use physical cables to connect
devices, while wireless networks use radio waves
for communication, allowing devices to connect
without the need for physical cables.
Types of Network
• Local Area Network (LAN): A LAN connects devices within a limited
area, such as a home, office, or school. Computers in a LAN can share
files, printers, and internet connections.

• Wide Area Network (WAN): A WAN covers a broad area, often a city,
country, or even worldwide. The internet is the largest example of a
WAN, connecting computers and networks globally.

• Wireless Local Area Network (WLAN): WLANs use wireless


technology to create LANs without the need for physical cables. Wi-Fi
networks in homes and public places are common examples.
• Metropolitan Area Network (MAN): MANs cover a larger
geographical area, like a city. They connect multiple LANs within a city
and can provide high-speed connections.
• Personal Area Network (PAN): PANs are small networks used for
personal devices, like smartphones and laptops. Bluetooth technology is
often used to create PANs.
• Intranet: An intranet is a private network within an organization that
uses internet technologies to share information, collaborate, and
conduct business operations.
• Extranet: An extranet allows controlled access to specific parts of an
organization’s intranet to external users, such as business partners or
customers.
Local Area Network (LAN)
◦ These systems are usually within one building, or certainly not very far away from each other
geographically.
◦ A typical LAN will consist of a number of computers and devices that are connected to hubs or
switches (hubs and switches are explained later in network devices).
◦ One of the hubs or switches will usually be connected to a router and a modem to allow the LAN
to connect to the internet; in doing so it then become part of a WAN.
LAN
Advantages The sharing of resources (such as expensive peripherals and applications software).

Ease of communication between users

A network administrator to control and monitor all aspects of the network (e.g.,
changing passwords, monitoring internet use and so on).

Disadvantages Easier spread of viruses throughout the whole network


Printer queues developing, which can be frustrating
Slower access to external networks, such as internet
Increased security risk when compared to stand-alone computers
If the main server breaks down, in most cases the network will no longer function
Wide Area Network (WAN)
◦ Wide area network (WAN) are used where computers are situated a long distance from each other
geographically (e.g., in a city or country).
◦ When a number of LANs are joined together using a router or modem, then they form a WAN.
◦ Most common example of WAN include the internet and the network of ATMs used by banks.
◦ Because of the long distance between devices, WANs usually make use of some public communication
network (such as telephone lines or satellites) but they can use dedicated or leased communication lines
which can be less expensive and also more secure (less risk of hacking).
Wireless LAN (WLAN)
◦ Wireless LANs (WLAN) are similar to LANs but there are no wires or cables.
◦ It provides wireless network communications over fairly short distances using radio or
infrared signals instead of cables.
◦ Devices, known as access points (APs) or wireless nodes, are connected into the wired
network at fixed locations.
◦ Because of the limited range, most commercial LANs need several APs to permit
uninterrupted wireless communication.
◦ The APs use either spread spectrum technology* or infrared*.

* Spread Spectrum Technology (which is a wideband radio frequency with a range of about
30 – 50m)
* Infrared (which has a very short range, about 1 – 2m, and is easily blocked; it therefore
has a limited use)
WLAN
WLAN
Advantages All computers can access the same services and resources from anywhere within range of the
APs
As there is no cabling there is a safety improvement and increased flexibility

Adding new computers and devices is very easy and the costs are reduced since extra cabling
isn’t needed

Disadvantages Security can be a big issue since anyone with a WLAN-enabled laptop can access a network if
it can pick up a signal; it is therefore necessary to adopt complex data encryption techniques
There may be problems of interference, which can effect the signal

The data transfer rate is slower than in a wired LAN


These networks enable efficient data sharing,
resource utilization, and communication among
devices, making them fundamental in today’s
digital world.
Uses of Computer Network
Computer networks have a wide range of uses in various fields. Some
common applications include:
File Sharing: Networks enable users to share files and resources, making
it easier to collaborate and work on projects together.
Internet Access: Networks provide access to the internet, allowing users
to browse websites, send emails, and access online services.
Communication: Networks support various forms of communication,
such as email, instant messaging, and video conferencing, enabling
people to connect globally.
Remote Access: Networks allow remote access to data and applications,
enabling users to work from different locations.
Resource Sharing: Networks enable the sharing of resources such as
printers, scanners, and storage devices, optimizing resource utilization.
Data Backup and Recovery: Networks facilitate centralized data storage,
backup, and recovery processes, ensuring data safety.
Online Gaming: Multiplayer online games utilize networks to connect
players worldwide, enabling real-time gaming experiences.
E-commerce: Networks power online shopping platforms, enabling
transactions, inventory management, and secure payment processing.
Social Networking: Social media platforms operate on computer
networks, connecting people and facilitating social interactions.
Education: Networks support online learning platforms, providing
access to educational resources and virtual classrooms.
Business Applications: Businesses use networks for tasks like customer
relationship management (CRM), enterprise resource planning (ERP),
and supply chain management.
Research and Development: Researchers collaborate globally, sharing
data and findings through networked systems, accelerating scientific
progress.
Telemedicine: Networks support remote medical consultations,
allowing patients and healthcare professionals to connect without
physical presence.
Security Systems: Networks enable the integration of security systems
like surveillance cameras and access control devices for monitoring and
controlling physical spaces.
Smart Home Devices: Networks connect smart home devices, enabling
automation and remote control of home appliances, lighting, and
security systems.
Data Analysis: Networks facilitate the collection and analysis of large
datasets, aiding businesses and researchers in making informed
decisions.
Network Devices
◦ Modems
◦ Hubs
◦ Switches
◦ Router
◦ Data Packet
Modems
◦ Modem means ‘modulator demodulator’.
◦ It is a device that converts a computer’s digital signal into an analogue signal
for transmission over an existing communication line like telephone line or
cable system.
◦ It can also reverse the process by converting analogue signal to digital signal
enabling the computer to understand and process data.
◦ Modems are essentially used to allow computers to connect to network over
long distance using the existing telephone networks.
◦ Internet Connectivity: Modems are commonly used to establish internet
connections over telephone lines (dial-up modems) or cable systems (cable
modems). They facilitate the exchange of digital data between a user's
computer and the internet service provider (ISP).
Modems
•Dial-up modems:These modems establish internet connections over traditional
telephone lines. They are relatively slow compared to modern broadband
connections.

•DSL Modems: DSL (Digital Subscriber Line) modems use telephone lines to
provide high-speed internet access. DSL technology allows faster data
transmission than dial-up modems.

•ADSL (asymmetric digital subscriber line) or broadband modems: these


modems use cable television lines to offer broadband internet access. They
provide faster speeds compared to DSL and dial-up connections.
Hubs
◦ Hubs are hardware devices that can have a number of devices or computers
connected to them.
◦ Used to connect number of devices to and form a LAN.
◦ It takes data packets* from one port to another and broadcast them to other
computers.
◦ Its not a most secure or efficient mean for data distribution.

*Data Packets: this is a group of data being transmitted


Hubs
Working of Hubs
Switches
◦ Switches are similar to hubs but are much more efficient in distributing data
packets.
◦ As with hubs, they also connect a number of devices or computers together to
form a LAN.
◦ Switches check both the source and destination addresses and then transfer to
the appropriate address.
◦ Better and efficient way to distribute data than a hub.
Switches
◦ Each device or computer on a network has a media access control (MAC)
address that uniquely identifies it.
◦ Data packets sent to switches will have a MAC address identifying the source
of the data and additional addresses identifying each device that should
receive the data.
Router
Router enable data packets to be routed between the different networks, e.g. to join
LAN to a wide are network (WAN).
A router would typically have an internet cable plugged into it and several cables
connecting to computers and other devices on the LAN.
Router
◦ The router’s main function is ‘to transmit internet and transmission protocols
between two networks and also allow private networks to be connected
together’.
◦ Routers inspect the data packets sent to it from any computer on any of the
network connected to it.
Data Packets
◦ The data is carried in the packet according to which protocol (set of
rules) is used.
◦ Packets of data contain:
1. Some form of header to identify the data packets
2. The sender’s IP address
3. The receiver’s IP address
4. How many data packets make up the whole message
5. The identity number of each packet
◦ This information allows the router to route a packet across a network to
its correct destination.
◦ Allows the data packets to be reassembled in their correct order
according to identity number at the receiving station
Network Hardware
◦ Network interface cards (NIC)
◦ A NIC is needed to allow a device to connect to a network (like internet)
◦ It is usually part of the device hardware and fits into computer’s expansion
slot and provides a port where network cable is attached.
◦ Wireless NIC
▪ Will have an antenna
▪ Light will indicate the connection
Wi-Fi
◦ A wireless transmitter receives information from a network via its connection.
◦ The transmitter converts the received information into radio waves and then transmits
them.
◦ A device receives the radio waves via an installed wireless adaptor which allows it to
download the information from data source.
◦ Wi-Fi best suited to operating full-scale network since it offers much faster data transfer
rates, better range and better security.
◦ A Wi-Fi enable device can access internet wirelessly at any access point (AP) or hot spot
up to 100m away.
Bluetooth
•Bluetooth sends and receives radio waves in a band of 79 different frequencies
(known as channel).
•Devices using Bluetooth automatically detect and connect to each other, but they
don’t interfere with other devices since each communicating pair uses a different
channel.
•When a device wants to communicate, it picks one of the 79 channels at random.
If the channel is already being used, it randomly picks another channel. This is
known as spread-spectrum frequency hopping.
•To further minimize the risks of interference with other devices, the
communication pairs constantly change the frequencies (channels) they are using.
(several times a second).
Bluetooth
Essentially, Bluetooth is useful:
◦ When transferring data between two or more devices that are very close
together (<30 meters distance)
◦ When the speed of data transmission is not critical.
◦ For low-bandwidth application (e.g., when sending music files from a mobile
phone to a headset).

Bluetooth creates a secure wireless personal area network(WPAN).


Difference b/w Wi-Fi and Bluetooth

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy