0% found this document useful (0 votes)
69 views

NETWORKING FUNDAMENTALS LECTURE 1updated

A computer network connects multiple devices to enable communication, data sharing, and collaboration. The main purposes of networks are to facilitate efficient sharing of information, resources, and ideas between users regardless of physical location. Networks provide advantages like improved communication, centralized resource management, remote access and flexibility. However, networks also present disadvantages such as security risks, maintenance complexity, and initial investment costs. Common types of networks include local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).

Uploaded by

Deco Sankoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
69 views

NETWORKING FUNDAMENTALS LECTURE 1updated

A computer network connects multiple devices to enable communication, data sharing, and collaboration. The main purposes of networks are to facilitate efficient sharing of information, resources, and ideas between users regardless of physical location. Networks provide advantages like improved communication, centralized resource management, remote access and flexibility. However, networks also present disadvantages such as security risks, maintenance complexity, and initial investment costs. Common types of networks include local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).

Uploaded by

Deco Sankoh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

NETWORKING

FUNDAMENTALS
LECTURE 1
COMPUTER NETWORKS : RATIONALE(WHY COMPUTER
NETWORKS?)
▪ The rationale behind computer networks is driven by the need to enable efficient communication, resource sharing, and
collaboration among devices and users.
1. Communication: Computer networks provide a means for devices and users to communicate and exchange information. By
connecting computers, servers, and other devices, networks facilitate seamless and rapid communication, enabling
individuals and organizations to share data, messages, and media across different locations.
2. Resource Sharing: Networks allow for the sharing of hardware resources, such as printers, scanners, storage devices, and
servers. Instead of each device having its own dedicated resources, networks enable centralized management and
utilization of resources, leading to cost savings and improved efficiency.
3. Collaboration: Networks enable collaboration by providing a platform for individuals and teams to work together on
projects and share information in real-time. Users can access shared documents, collaborate on files, and communicate
instantly, regardless of their physical location, leading to increased productivity and innovation.
4. Data Sharing and Access: Networks facilitate the sharing and access of data across different devices and locations within an
organization. This enables employees to retrieve and update information, work on common databases, and access shared
applications, ensuring consistent and up-to-date data across the network.
5. Scalability and Flexibility: Networks provide the flexibility to scale up or down based on the organization's needs. As the
number of users, devices, and data increases, networks can accommodate the growing demands by adding additional
hardware or expanding the network infrastructure. Networks also allow for remote access, enabling employees to work
from anywhere, which promotes flexibility and agility.
Computer Networking?

▪ A computer networking is a process of connecting two or more than two

computers with the purpose to share data, provide technical support, and to

communicate (especially for the business purpose.

▪ Computer networks refer to interconnected systems or devices that are designed to

facilitate communication, data sharing, and resource sharing between computers and other

devices. A computer network allows multiple devices, such as computers, servers, printers,

and mobile devices, to communicate and exchange data with each other.
PRIMARY PURPOSE

▪ The primary purpose of computer networks is to enable efficient


communication and data sharing. Networks provide a framework
for transmitting data packets between devices, allowing users to
access shared resources, such as files, applications, and services.
Through networks, users can collaborate, share information, and
work together regardless of their physical location.
Advantages & Disadvantages of Computer Network

▪ It's important for corporate organizations to evaluate these advantages and


disadvantages when planning and managing their computer networks. Proper
network design, security measures, and ongoing maintenance can help maximize the
benefits while minimizing the drawbacks.

▪ Computer networks offer several advantages for corporate organizations, but they
also come with certain disadvantages. Here are some of the key advantages and
disadvantages:
Advantages of Computer Networks in Corporate Organizations:

1. Improved Communication: Networks enable seamless and efficient communication among employees,
departments, and branches. They facilitate the sharing of information, resources, and ideas, leading to increased
collaboration and productivity.
2. Resource Sharing: Networks allow for centralized management and sharing of hardware resources, such as
printers, scanners, and servers. This reduces costs and enhances resource utilization within the organization.
3. Data Sharing and Collaboration: Networks enable easy sharing and access to data and files across the
organization. Employees can collaborate on projects in real-time, leading to improved efficiency and faster
decision-making.
4. Enhanced Flexibility: Networks enable employees to access company resources and data remotely, facilitating
remote work, telecommuting, and flexible work arrangements. This flexibility can improve work-life balance and
attract talent from diverse locations.
5. Cost Savings: Networks can lead to cost savings by centralizing IT resources, reducing the need for individual
hardware and software for each employee. Additionally, networked communication tools, such as video
conferencing, can replace costly travel expenses.
Disadvantages of Computer Networks in Corporate Organizations:
1. Security Risks: Networks can be vulnerable to security breaches, including unauthorized access, data theft, and
malware attacks. Organizations need to invest in robust security measures, such as firewalls, encryption, and user
authentication, to mitigate these risks.
2. Dependency on Network Infrastructure: Organizations rely heavily on network availability and performance. If the
network experiences downtime or issues, it can disrupt operations and productivity until the problems are
resolved.
3. Complexity and Maintenance: Networks require ongoing maintenance, monitoring, and upgrades. This can be
complex and time-consuming, requiring skilled IT personnel and resources. Network issues and troubleshooting
may cause downtime and impact business operations.
4. Privacy Concerns: Networks involve the sharing and transmission of sensitive information. Organizations need to
ensure privacy and compliance with data protection regulations to maintain the trust of customers, partners, and
employees.
5. Initial Investment: Setting up a robust and scalable network infrastructure requires a significant initial investment in
hardware, software, and skilled IT professionals. Organizations need to carefully plan and budget for network
implementation and expansion.
Advantages of Networking

▪ Easy Sharing of Data


▪ With the help of networking, it is very simple to share all formats of digital data from
one computer system to another (irrespective of their geographic location).
▪ Easy Sharing of Hardware Resource
▪ With the help of networking, it has now become very simple to share the expensive
resources including storage space, processor, fax, etc.
▪ Easy to Decentralize Data Processing
▪ Through the networking system, it is very simple to decentralize the data processing
system. It ultimately helps to control, secure, and manage the important data.
▪ Easy to Communicate
▪ With the help of networking, the communication system has now become highly
efficient, frugal, and fast. The different modes of communication are text chatting,
video chatting, emails, etc.
Types of Network

▪ Computer networks can be categorized based on various factors. Here are some common categories of

computer networks:

1. Local Area Network (LAN): A LAN is a network that spans a relatively small geographical area, such as an office
building, school, or home. It connects devices within close proximity and typically uses Ethernet or Wi-Fi
technology.
2. Wide Area Network (WAN): A WAN covers a larger geographical area and connects multiple LANs or remote
locations. It can span across cities, countries, or even continents, utilizing public or private communication
links, such as leased lines or the internet.
3. Metropolitan Area Network (MAN): A MAN is a network that covers a larger area than a LAN but smaller than
a WAN. It typically serves a city or a metropolitan region, connecting multiple LANs or institutions.
4. Personal Area Network (PAN): A PAN is a network used for communication between personal devices in close
proximity to an individual. Examples include Bluetooth connections between smartphones, tablets, and
wearable devices.
Types of Computer Network Cont’d

1. Campus Area Network (CAN): A CAN is a network that spans a university campus or a large corporate facility.
It connects multiple buildings or locations within a defined area, providing connectivity to various
departments or entities.
2. Storage Area Network (SAN): A SAN is a specialized network architecture dedicated to providing high-speed
access to centralized storage devices, such as disk arrays or tape libraries. It enables efficient storage
management and data sharing across multiple servers.
3. Wireless Local Area Network (WLAN): A WLAN is a LAN that uses wireless communication technologies, such
as Wi-Fi, to connect devices without the need for physical cables. It allows for flexible connectivity within a
limited area.
4. Virtual Private Network (VPN): A VPN is a network that provides secure communication over public
networks, such as the internet. It creates an encrypted tunnel between remote locations or individual users,
ensuring privacy and data protection.
Local Area Network

Local Area Network or simply LAN is the


technique of interconnecting a few
computers located in a given premise. It
is normally used for a single business
office or a residential apartment.
The major purpose of such
interconnectivity is to establish a
communication system in order to make
the work easier.
However, in such connectivity, some
other devices can also be attached such
as laser printers, fax machine, etc
Metropolitan Area Network

▪ Metropolitan Area Network or simply MAN is a


system of network that normally covers a large
metropolitan area (city part).

▪ It provides high speed Internet services throughout


the area covered within the network.
Wide Area Network

▪ Wide Area Network or simply WAN is a system of


network that covers a large geographical area across
the world.

▪ The services of WAN are provided by public


(government) agencies as well as private agencies. The
network also provides the facility to access databases
located remotely.
THE OSI MODEL
What Is the OSI Model?

▪ The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network. It was the first
standard model for network communications, adopted by all major computer
and telecommunication companies in the early 1980s

▪ The modern Internet is not based on OSI, but on the simpler TCP/IP model.
However, the OSI 7-layer model is still widely used, as it helps visualize and
communicate how networks operate, and helps isolate and troubleshoot
networking problems.
The OSI (Open Systems Interconnection) model is a conceptual framework that
standardizes the functions and protocols used in computer networks. It consists
of seven layers, each serving a specific purpose in the network communication
process. Here's a simple description of each layer:
▪ The OSI model helps in understanding and organizing the various functions
involved in network communication. It allows different networking
technologies and protocols to work together by providing a framework for
standardization and interoperability.
RATIONALE OF THE OSI MODEL

▪ The rationale behind the OSI model is to provide a structured approach to designing and implementing communication protocols.
By dividing the communication process into distinct layers, each with its specific responsibilities, the OSI model offers several
benefits:

▪ Interoperability: The OSI model promotes interoperability between different vendors and systems. By defining standardized
protocols at each layer, it ensures that devices from different manufacturers can communicate effectively. As long as the protocols
adhere to the specifications of each layer, devices can exchange information seamlessly.

▪ Scalability: The layered architecture of the OSI model supports scalability. Adding or modifying a layer does not require changing
the entire system, as each layer operates independently. This flexibility allows for the incorporation of new technologies or
functionalities without disrupting the entire communication infrastructure.

▪ Troubleshooting and Debugging: The OSI model aids in troubleshooting and debugging network issues. Since each layer has well-
defined functions and interfaces, it becomes easier to identify the source of a problem. By examining the communication flow at
each layer, network administrators can isolate issues and apply appropriate solutions.
1. Physical Layer: This layer deals with the physical transmission of data, such as electrical or optical signals, over the
network media. It defines the specifications for cables, connectors, and network hardware.
2. Data Link Layer: The data link layer provides error-free transfer of data frames between nodes on the same network
segment. It handles issues like addressing, framing, and flow control, and it ensures reliable transmission over the
physical layer.

3. Network Layer: The network layer establishes and manages logical connections between different networks. It
handles the routing of data packets, determining the optimal path for data to reach its destination across
interconnected networks.

4. Transport Layer: The transport layer ensures reliable delivery of data between end systems. It provides services like
segmentation and reassembly of data, flow control, error correction, and end-to-end connection management.
5. Session Layer: The session layer establishes, maintains, and terminates communication sessions between applications
running on different devices. It manages the dialogue control and synchronization between applications.

6. Presentation Layer: The presentation layer is responsible for data formatting, compression, encryption, and
decryption. It ensures that data sent by one system can be understood by the receiving system, regardless of their
underlying differences.

7. Application Layer: The application layer interacts directly with end-user applications, providing services like email, file
transfer, remote access, and network resource sharing. It enables communication between applications and network
services.
7. Application Layer

▪ The application layer is used by end-user software such as web browsers and email

clients. It provides protocols that allow software to send and receive information

and present meaningful data to users. A few examples of application layer

protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP),

Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain

Name System (DNS).


6. Presentation Layer

▪The presentation layer prepares data for the application layer.


It defines how two devices should encode, encrypt, and
compress data so it is received correctly on the other end.
The presentation layer takes any data transmitted by the
application layer and prepares it for transmission over the
session layer.
5. Session Layer

▪ The session layer creates communication channels, called sessions,


between devices. It is responsible for opening sessions, ensuring they
remain open and functional while data is being transferred, and closing
them when communication ends. The session layer can also set
checkpoints during a data transfer—if the session is interrupted, devices
can resume data transfer from the last checkpoint.
4. Transport Layer

▪ The transport layer takes data transferred in the session layer and
breaks it into “segments” on the transmitting end. It is responsible for
reassembling the segments on the receiving end, turning it back into
data that can be used by the session layer. The transport layer carries
out flow control, sending data at a rate that matches the connection
speed of the receiving device, and error control, checking if data was
received incorrectly and if not, requesting it again.
3. Network Layer

▪ The network layer has two main functions. One is breaking up


segments into network packets, and reassembling the packets on the
receiving end. The other is routing packets by discovering the best
path across a physical network. The network layer uses network
addresses (typically Internet Protocol addresses) to route packets to a
destination node.
2. Data Link Layer

▪ The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into
frames and sends them from source to destination. This layer is
composed of two parts—Logical Link Control (LLC), which identifies
network protocols, performs error checking and synchronizes frames, and
Media Access Control (MAC) which uses MAC addresses to connect
devices and define permissions to transmit and receive data.
1. Physical Layer

▪ The physical layer is responsible for the physical cable


or wireless connection between network nodes. It
defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible
for transmission of the raw data, which is simply a series
of 0s and 1s, while taking care of bit rate control.
Advantages of OSI Model

▪ The OSI model helps users and operators of computer networks:


▪ Determine the required hardware and software to build their network.
▪ Understand and communicate the process followed by components
communicating across a network.
▪ Perform troubleshooting, by identifying which network layer is causing
an issue and focusing efforts on that layer.
▪ The OSI model helps network device manufacturers and networking software vendors:

▪ Create devices and software that can communicate with products from any other vendor, allowing
open interoperability

▪ Define which parts of the network their products should work with.

▪ Communicate to users at which network layers their product operates – for example, only at the
application layer, or across the stack.
TCP/IP MODEL

▪ The TCP/IP (Transmission Control Protocol/Internet Protocol) model is a network communication model that
defines the protocols and functions used in computer networks, specifically in the context of the Internet. It
is named after its two key protocols: TCP, which provides reliable and connection-oriented communication,
and IP, which handles the routing and addressing of packets.

▪ The TCP/IP model consists of four layers, each responsible for specific tasks:
1. Network Interface Layer (or Network Access Layer): This layer deals with the physical transmission of data on
the network. It defines the protocols and standards for transmitting data over specific network interfaces,
such as Ethernet or Wi-Fi. It handles tasks like framing, addressing, and error detection.

2. Internet Layer: This layer is responsible for routing packets across multiple networks. It uses the Internet
Protocol (IP) to assign unique addresses (IP addresses) to devices, enabling them to send and receive data
across the internet. The Internet Layer also handles fragmentation and reassembly of packets.
3. Transport Layer: The Transport Layer ensures reliable and efficient data transfer between devices. It
primarily uses two protocols: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). TCP
provides reliable, connection-oriented communication, while UDP offers unreliable, connectionless
communication. This layer manages flow control, error recovery, and data segmentation.

4. Application Layer: The top layer of the TCP/IP model is the Application Layer. It encompasses various
protocols and services that enable user applications to communicate over the network. Examples of
protocols at this layer include HTTP (Hypertext Transfer Protocol), FTP (File Transfer Protocol), SMTP
(Simple Mail Transfer Protocol), and DNS (Domain Name System).
▪TRANSMISSION MEDIA
MEDIA TRANSMISSION & TYPES
▪ Guided and unguided network media are terms used to describe different types of transmission media in
computer networks.

▪ Guided Media: Guided media refers to the physical media that provide a guided path for data transmission.
These media use cables or wires to transmit signals from one point to another. The signals are confined within the
physical boundaries of the medium. Some examples of guided media include:

▪ a. Twisted Pair: It consists of two insulated copper wires twisted together, commonly used in Ethernet networks.
▪ b. Coaxial Cable: It comprises a central conductor surrounded by insulation and a metallic shield, often used in
cable television (CATV) and broadband networks.
▪ c. Fiber Optic Cable: It utilizes thin strands of glass or plastic fibers to transmit data as light pulses, offering high-
speed and long-distance transmission.
▪ Guided media provides better signal quality and security due to its physical protection from external
interference. However, it has limitations in terms of maximum distance and bandwidth capacity.
Here are some examples of guided media commonly used in the corporate
world, along with their advantages and disadvantages:

▪ Twisted Pair:is a type of guided media commonly used in computer networks and telecommunications. It
consists of two insulated copper wires twisted together in a helical pattern. The twisting of the wires helps to
reduce electromagnetic interference (EMI) and crosstalk, which improves signal quality and reduces data
transmission errors.

Advantages of twisted pair cables:


• Cost-effective: Twisted pair cables are relatively inexpensive compared to other guided media options.
• Easy installation: They are easy to install and terminate, making them ideal for LANs and office environments.
• Compatibility: Twisted pair cables are compatible with a wide range of networking equipment and devices.
• Disadvantages of twisted pair cables:
• Limited bandwidth: Twisted pair cables have limitations on bandwidth and distance, making
them less suitable for long-distance or high-speed applications.
• Susceptible to interference: They are susceptible to electromagnetic interference (EMI) and
crosstalk, which can degrade signal quality
Types of Twisted pair cable

▪ Twisted pair cables are categorized into two main types:


1. Unshielded Twisted Pair (UTP): UTP cables are widely used in Ethernet networks, telephone
systems, and other data communication applications. Each of the two wires is individually
insulated, and multiple pairs are often bundled together within a single cable. UTP cables are
available in various categories, such as Cat 5e, Cat 6, and Cat 6a, with each category providing
different levels of performance in terms of bandwidth and data transmission capabilities.

2. Shielded Twisted Pair (STP): STP cables have an additional layer of shielding, usually metallic,
around the twisted wire pairs. This shielding provides better protection against external
electromagnetic interference, resulting in improved signal integrity. STP cables are commonly
used in environments with high EMI, such as industrial settings or areas with a high
concentration of electronic equipment.
TWISTED PAIR CABLE
Coaxial Cable:

Is a type of guided media commonly used for data transmission in computer networks, television broadcasting, and other
communication systems. It consists of a central conductor, surrounded by insulation, which is then covered by a metallic
shield, and finally enclosed in an outer protective jacket. The structure of coaxial cable provides several advantages for
signal transmission and protection against interference.

• Advantages of coaxial cable:

• Higher bandwidth: Coaxial cables offer higher bandwidth compared to twisted pair cables, making them suitable for
multimedia and video applications.

• Longer distances: Coaxial cables can transmit signals over longer distances without significant signal degradation.

• Shielding: Coaxial cables have better shielding against interference compared to twisted pair cables.
Disadvantages of Coaxial cable

• Bulky and less flexible: Coaxial cables are bulkier and less flexible compared to twisted pair
cables, making them harder to install and manage.

• Cost: Coaxial cables are generally more expensive than twisted pair cables.

• Limited applications: Coaxial cables are primarily used for specific applications such as cable
television (CATV) and broadband networks.
Here are some key characteristics and components of coaxial cable:

1. Central Conductor: The central conductor is typically made of copper or copper-plated steel
and carries the electrical signal. It is surrounded by insulation to prevent signal leakage or
interference.
2. Insulation: The insulation material, such as foam or solid plastic, surrounds the central
conductor, providing electrical separation and preventing signal loss or crosstalk between
adjacent conductors.
3. Metallic Shield: The metallic shield, usually made of braided copper or aluminum foil,
surrounds the insulation layer. It serves as a protective barrier against external
electromagnetic interference (EMI) and reduces signal leakage.
4. Outer Jacket: The outer jacket, made of durable and protective material like PVC, provides
mechanical protection to the cable and enhances its durability. It also offers additional
insulation and safeguards against environmental factors.
Fiber Optic Cable

Fiber optic cable is a type of guided media that utilizes thin strands of glass or plastic fibers to transmit data as
pulses of light. It is widely used in telecommunications, computer networking, and high-speed internet
connections. Fiber optic cables offer several advantages over other types of guided media, such as higher
bandwidth, longer transmission distances, and immunity to electromagnetic interference (EMI).

• Advantages of fiber optic:


• High bandwidth: Fiber optic cables offer extremely high bandwidth, making them ideal for high-speed data
transmission, including multimedia and video applications.
• Long-distance transmission: Fiber optic cables can transmit data over long distances without significant signal
degradation.
• Immunity to interference: Fiber optic cables are immune to electromagnetic interference (EMI) and crosstalk,
ensuring reliable signal transmission.
• Disadvantages of fiber optic:

• Specialized equipment: Fiber optic cables require specialized equipment for termination and splicing,
increasing installation and maintenance costs.

• Fragility: Fiber optic cables are delicate and can be easily damaged if mishandled or improperly installed.
• Cost: Fiber optic cables are generally more expensive than other types of guided media, such as twisted
pair or coaxial cables. The cost is primarily associated with the specialized manufacturing processes and
the materials used.
• Installation and Maintenance: Installing and terminating fiber optic cables require specialized tools and
expertise. Additionally, fiber optic cables are delicate and can be easily damaged if mishandled during
installation or maintenance.
• Limited Compatibility: Fiber optic cables require specific interfaces and equipment designed for optical
connections, which may not be universally compatible with all devices or networking infrastructure.
Adapters or converters may be needed to connect fiber optic cables to devices with different interfaces.
Here are the key components and characteristics of fiber optic cable:

1. Core: The core is the central part of the fiber optic cable where light travels. It is made of optically transparent
materials, typically glass or plastic, and is designed to efficiently carry the light signals.

2. Cladding: The core is surrounded by a layer called cladding, which has a lower refractive index than the core. The
cladding helps to keep the light within the core by reflecting it back into the core through total internal reflection.

3. Buffer: A buffer layer provides protection to the core and cladding and is typically made of materials like plastic or
a combination of plastic and Kevlar for strength.

4. Outer Jacket: The outer jacket surrounds the entire cable and provides mechanical protection, moisture resistance,
and durability.
TYPES OF FIBER OPTIC
▪ There are mainly three types of fiber optic cables based on the refractive index profile and the number of
modes that can propagate through the fiber:
1. Single-Mode Fiber (SMF):
1. Single-mode fiber has a small core diameter, typically around 9 to 10 microns.
2. It allows for the transmission of a single mode of light, which means that only one path or ray of light can propagate through the
fiber.
3. Single-mode fiber is used for long-distance communication and high-speed data transmission, such as in long-haul
telecommunications and internet backbone networks.
4. It provides higher bandwidth and longer transmission distances compared to other types of fiber optic cables.
5. Single-mode fiber is typically more expensive than multimode fiber and requires more precise alignment of light sources and
receivers.

2. Multimode Fiber (MMF):


1. Multimode fiber has a larger core diameter, usually 50 or 62.5 microns.
2. It allows multiple modes or rays of light to propagate through the fiber simultaneously.
3. Multimode fiber is commonly used for shorter-distance applications, such as LANs, data centers, and campus networks.
4. It provides lower bandwidth and shorter transmission distances compared to single-mode fiber.
5. Multimode fiber is less expensive and easier to work with than single-mode fiber, as it can use lower-cost light sources and
connectors.
1. Plastic Optical Fiber (POF):
1. Plastic optical fiber is an alternative to glass fiber and is made of a plastic core and cladding.
2. It has a larger core diameter, typically around 1 millimeter.
3. POF is primarily used for short-distance communication and consumer applications, such as home networking,
automotive systems, and consumer electronics.
4. It is more flexible and easier to handle compared to glass fiber, making it suitable for applications that require
simple installation and lower-cost components.
5. Plastic optical fiber has lower bandwidth and shorter transmission distances compared to glass fiber.
Unguided Media
• Wireless Transmission: Utilizes radio waves or infrared signals for data
transmission without the need for physical cables. Examples include Wi-
Fi networks, cellular networks, Bluetooth, and satellite communication.
• Microwave Communication: Uses high-frequency radio waves for point-
to-point communication over long distances, commonly employed in
microwave links for connectivity between buildings or across
geographical areas.

▪ Unguided media allow for mobility and flexibility in network connections


but may be susceptible to interference and signal degradation caused by
obstacles, distance, or environmental factors.
Unguided Media contd’
▪ Unguided Media: Unguided media, also known as wireless or unbounded media, refers to the
transmission of data through the air or free space without the use of physical cables. The signals are
not confined to a specific path or boundary but propagate freely in the surrounding environment.
Some examples of unguided media include:
▪ a. Radio Waves: Wireless communication using radio frequencies, commonly used in Wi-Fi networks,
Bluetooth, and cellular networks.
▪ b. Microwaves: Higher frequency electromagnetic waves used in point-to-point communication,
such as microwave links for long-distance communication or satellite communication.
▪ c. Infrared: It uses infrared light for short-range wireless communication, commonly found in devices
like remote controls or IrDA (Infrared Data Association) for short-range data transfer.
Radio Wave

▪ Transmission of data using radio frequencies is called radio-wave transmission. We

all are familiar with radio channels that broadcast entertainment programs. Radio

stations transmit radio waves using transmitters, which are received by the receiver

installed in our devices.


Network Devices

▪ Hardware devices that are used to connect computers, printers, fax machines and other electronic

devices to a network are called network devices. These devices transfer data in a fast, secure and

correct way over same or different networks.

▪ Network devices are hardware or software components that enable the transmission, routing, and

management of data within a computer network. These devices operate at various layers of the OSI (Open

Systems Interconnection) model, which is a conceptual framework that defines how different network

protocols interact and communicate with each other.


Here is a description of some common network devices and their examples at
different layers of the OSI model:
1. Layer 1: Physical Layer
1. Devices: Repeater, Hub
2. Description: The physical layer deals with the transmission and reception of raw bit streams over physical media. Devices at this layer
amplify or regenerate signals to extend the reach of the network. Repeaters and hubs are examples of layer 1 devices.

2. Layer 2: Data Link Layer


1. Devices: Switch, Bridge
2. Description: The data link layer provides reliable and error-free data transfer between nodes connected by a physical link. Switches and
bridges operate at this layer to forward data based on MAC (Media Access Control) addresses.

3. Layer 3: Network Layer


1. Devices: Router
2. Description: The network layer is responsible for routing and forwarding data packets across different networks. Routers examine IP
(Internet Protocol) addresses and make decisions on how to best route the packets to their destination .
4. Layer 4: Transport Layer
1. Devices: Gateway, Firewall
2. Description: The transport layer ensures reliable and ordered delivery of data between end systems. Gateways act as interfaces
between networks using different protocols, while firewalls monitor and control network traffic based on predefined security
rules.

5. Layer 6: Presentation Layer


1. Devices: Encryption/Decryption Devices
2. Description: The presentation layer is responsible for data formatting, encryption, and decryption. Devices at this layer handle
encryption and decryption processes to ensure secure communication.

6. Layer 7: Application Layer


1. Devices: Proxy Server, Load Balancer
2. Description: The application layer provides network services and interfaces for user applications. Proxy servers act as
intermediaries between clients and servers, while load balancers distribute incoming network traffic across multiple servers to
optimize performance.
NETWORK DEVICES

▪ Network devices are hardware or software components that facilitate the communication, connectivity, and
management of computer networks. These devices play crucial roles in enabling data transfer, routing,
security, and network administration. Here is a description of some common network devices:
1. Network Switch:
Description: A network switch is a device that connects multiple devices within a local area network (LAN). It operates at the data link
layer (Layer 2) of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. Switches provide high-
speed, full-duplex communication between connected devices and enhance network performance by reducing collisions.

2. Router:
Description: A router is a device that connects multiple networks together, such as LANs or wide area networks (WANs). It operates at
the network layer (Layer 3) of the OSI model and uses IP addresses to route data packets between different networks. Routers
determine the best path for data transmission based on routing protocols and maintain routing tables to guide packet forwarding.

3. Firewall:
1. Description: A firewall is a network security device that monitors and controls incoming and outgoing network traffic. It acts as a
barrier between networks and filters traffic based on predefined rules or policies. Firewalls protect networks from unauthorized
access, malicious attacks, and potential threats by inspecting packets and applying security measures.
4. Wireless Access Point (WAP):
Description: A wireless access point is a device that enables wireless connectivity within a network. It allows wireless devices, such as
laptops, smartphones, or IoT devices, to connect and communicate with the network. WAPs provide wireless coverage by creating a
wireless local area network (WLAN) and typically support Wi-Fi standards.

5. Modem:
Description: A modem, short for modulator-demodulator, is a device that facilitates the conversion of digital data to analog signals for
transmission over communication lines and vice versa. It enables the connection of a computer or network to an internet service provider
(ISP) or other wide area networks. Modems are commonly used for DSL, cable, or fiber optic internet connections.

6. Network Interface Card (NIC):


Description: A network interface card, also known as a network adapter or Ethernet card, is a hardware component that enables a device to
connect to a network. It provides the physical interface between a device and the network medium, allowing for data transmission. NICs
are typically built into computers or can be added as separate expansion cards.

7. Proxy Server:
Description: A proxy server acts as an intermediary between clients and servers. It receives client requests and forwards them to the
appropriate server on behalf of the client. Proxy servers can provide various functions such as caching, filtering, or enhancing security and
privacy.
NETWORK TOPOLOGY

▪ In computer networking, network topology refers to the physical or logical arrangement of the devices
and connections within a network. It defines how devices such as computers, servers, switches,
routers, and other networking equipment are interconnected and how data flows between them.

▪ Network topology determines the structure and communication paths of a network. It plays a crucial
role in determining factors such as network performance, scalability, fault tolerance, and ease of
management. Here are some key concepts related to network topology:
1. Nodes: Nodes are devices connected to the network, such as computers, servers, printers, and networking devices like
switches and routers.

2. Links: Links are the physical or logical connections between nodes. They can be wired (e.g., Ethernet cables) or wireless
(e.g., Wi-Fi).
3. Physical Topology: Physical topology refers to the actual physical layout of the network,
including the placement of devices and the cables connecting them. It describes how devices
are physically connected and located, such as in a star, bus, ring, or mesh arrangement.

4. Logical Topology: Logical topology defines how data flows between devices in the network. It
focuses on the logical paths and protocols used for communication rather than the physical
layout. Examples include Ethernet, Token Ring, or TCP/IP.

5. Point-to-Point and Broadcast Connections: Point-to-point connections allow communication


between two devices directly, while broadcast connections allow communication from one
device to all others on the network.
6. Centralized and Decentralized Topologies: Some topologies have a central device or hub that controls
communication (e.g., star or tree), while others distribute control across multiple devices (e.g., mesh or peer-to-
peer networks).

Different network topologies have their own advantages and disadvantages.

Organizations choose a specific topology based on factors such as network size, scalability requirements, fault
tolerance, cost, and performance needs.

Overall, network topology provides a blueprint for how devices are connected and how data flows, enabling
efficient communication and collaboration within a networked environment.
TYPES OF NETWORK TOPOLOGY

Bus Topology: Bus topology is a network topology in which all devices are connected to a common
communication medium, often referred to as a "bus" or a backbone. In this topology, devices are
connected in a linear fashion, with each device linked to the same shared communication channel.
Key characteristics of a bus topology include:

1. Shared Medium: All devices in a bus topology share a single communication channel, typically a
coaxial cable or Ethernet cable. Data transmitted by one device can be received by all other devices
on the network.

2. Linear Connection: Devices are connected to the communication medium in a linear or daisy-chain
fashion. Each device is attached to the bus through connectors or taps.

3. Terminators: At each end of the bus, terminators are used to absorb the signals, preventing them
from reflecting back and causing signal interference.
▪ Advantages of bus topology:
• Simplicity: Bus topology is relatively easy to install and implement. It requires minimal cabling, making it cost-effective
for small networks.
• Cost-effective: The shared communication medium reduces the need for individual connections between devices,
resulting in cost savings in terms of cabling infrastructure.
• Flexibility: Devices can be easily added or removed from the network without disrupting the overall network
operation.
▪ Disadvantages of bus topology:
• Single Point of Failure: If the main cable (bus) fails, the entire network becomes inaccessible. A fault in one device or
cable connection can disrupt the entire network's operation.
• Limited Scalability: As more devices are added to the network, the performance can degrade due to increased traffic
and collisions on the shared communication channel.
• Difficulty in Identifying Issues: Troubleshooting can be challenging in bus topology as pinpointing the location of a
fault or identifying problematic devices can be complex.
Star Topology: Star topology is a network configuration in which all devices are connected to a central device,
typically a switch or a hub. In this topology, each device has a dedicated point-to-point connection to the central
device.
▪ Key characteristics of a star topology include:
• Central Hub: The central device, such as a switch or a hub, acts as a central point of connection for all devices in
the network.
• Point-to-Point Connections: Each device has its own separate connection to the central hub, creating a
dedicated link between the device and the hub.
• Independent Communication: Data transmitted by one device is directed to the central hub and then forwarded
to the intended recipient device.
▪ Advantages of star topology:
• Centralized Management: The central hub facilitates easy management and troubleshooting. It provides a single point
of control and makes it simpler to identify and address network issues.
• Fault Isolation: If a device or connection fails in a star topology, it only affects the specific device, not the entire
network. Other devices can continue to operate without disruption.
• Scalability: It is relatively easy to add or remove devices in a star topology, as each device connects directly to the
central hub.
▪ Disadvantages of star topology:
• Dependency on the Central Hub: The central hub becomes a single point of failure. If the hub malfunctions or loses
power, the entire network loses connectivity.
• Cost of Implementation: Star topology requires more cabling compared to other topologies as each device requires an
individual connection to the central hub.
• Limited Distance: The distance between the devices and the central hub is limited by the maximum length of the
cables used.
2. Ring Topology: Ring topology is a network configuration where devices are connected in a closed loop or ring
formation. In this topology, each device is connected to exactly two other devices, creating a circular pathway for
data transmission.
▪ Key characteristics of a ring topology include:

• Circular Connection: Devices are connected in a ring formation, where the output of one device is connected to
the input of the next device, and so on, until the loop is completed.

• Unidirectional Data Flow: Data flows in only one direction in a ring topology. Each device regenerates and
forwards the data to the next device until it reaches the intended recipient.

• Ring-In/Ring-Out: Some ring topologies use a Ring-In/Ring-Out (RIO) configuration, where each device has two
connections to the ring, allowing for easier troubleshooting and fault tolerance.
▪ Advantages of ring topology:
• Equal Access to Resources: In a ring topology, all devices have equal access to network resources since data flows in a
circular manner.
• Simplicity: Ring topology is relatively easy to implement and manage, especially in small networks.
• No Central Device: Ring topology does not depend on a central hub, reducing the risk of a single point of failure.
▪ Disadvantages of ring topology:
• Ring Breakage: If a single device or connection fails in a ring topology, it can cause the entire network to become
inaccessible, as data cannot be transmitted around the ring.
• Limited Scalability: Expanding or modifying a ring topology can be challenging. Adding or removing devices requires
breaking and reestablishing the ring, causing disruption to the network.
• Data Collisions: Without proper mechanisms in place, simultaneous data transmissions from multiple devices can lead
to collisions and performance degradation.
Mesh Topology: Mesh topology is a network configuration in which every device is connected to every other
device in the network. It creates a fully interconnected network where each device has a dedicated connection to
every other device.

▪ Key characteristics of a mesh topology include:

• Full Connectivity: Every device in the network has a direct point-to-point connection with every other device,
enabling multiple communication paths.

• Redundancy: Mesh topology provides high redundancy and fault tolerance since there are multiple pathways for
data to travel. If one link or device fails, alternative paths are available.

• Scalability: Mesh topology is highly scalable as new devices can be easily added without affecting the network's
overall performance or requiring significant changes to existing connections.
▪ Advantages of mesh topology:
• High Reliability: The multiple connections in mesh topology make it highly reliable. If one link or device fails,
data can still be transmitted through alternative paths.
• Robustness: Mesh topology can handle heavy network traffic without experiencing significant performance
degradation or bottlenecks.
• Security: Data can be transmitted through encrypted connections in a mesh topology, enhancing network
security.
▪ Disadvantages of mesh topology:
• Cost: Implementing a full mesh topology can be expensive as it requires a large number of connections and
cabling infrastructure.
• Complex Implementation: The design and configuration of a mesh topology can be complex, especially as the
network grows larger. Managing and maintaining a fully interconnected network can also be challenging.
Tree Topology: Tree topology, also known as hierarchical topology, is a network configuration that combines
characteristics of both bus and star topologies. It arranges devices in a hierarchical structure resembling a tree.

▪ Key characteristics of a tree topology include:

• Hierarchical Structure: Devices in a tree topology are organized in multiple levels or layers, with a root node at
the top and child nodes branching out below it. Each layer can have its own sub-network.

• Centralized or Distributed Control: Tree topology can have a central root node (e.g., a switch or a server) that
acts as a central point of control, or it can distribute control across multiple nodes.

• Point-to-Point Connections: Devices are connected in a point-to-point manner, similar to a star topology, where
each device has a dedicated link to its parent node.
▪ Advantages of tree topology:

• Scalability: Tree topology is highly scalable as new devices can be added by extending the tree structure without affecting the entire
network.

• Ease of Management: Tree topology provides a hierarchical structure, making it easier to manage and troubleshoot network issues.
Control can be centralized or distributed as per the network's requirements.

• Flexibility: Tree topology allows for the creation of multiple sub-networks or branches, enabling network segmentation and efficient
resource allocation.

▪ Disadvantages of tree topology:

• Dependency on the Root Node: The root node becomes a single point of failure. If the root node fails, the entire network or specific
branches connected to it can become inaccessible.

• Cost: Tree topology may require more cabling compared to other topologies, especially when adding devices to lower layers or extending
branches.

• Complexity: As the network grows larger and more layers are added, managing and maintaining the tree structure can become complex.

You might also like