TOPIC 4.0 COMPUTER NETWORKING AND INTERNET
TOPIC 4.0 COMPUTER NETWORKING AND INTERNET
TVET
UNIT CODE: TBH 052/THC 052/THT 052/TSW 053
UNIT TITLE: INFORMATION COMMUNICATION TECHNOLOGY
TOPIC 4.0
COMPUTER NETWORKING AND INTERNET
Specific Objectives:
By the end of the sub-module units, the trainee should be able to:
i.) Explain the concept of Computer Networks
i.) Explain the function of Computer Networks
ii.) Explain types of Computer Networks
iii.) Explain types of Computer Networks topologies
iv.) Explain networks configuration
ii.) Explain the internet and its users
iii.) Explain the email concept
Sub-Topics:
1) Concept of Computer Networks
2) Types of Computer Network
3) Functions of Operating System
4) Introduction to Transmission modes
5) Concept of Email
INTERNET
The term "Internet" is a shortened version of "internetworking," referring to a global network of
interconnected networks that use standardized communication protocols to link billions of devices
around the world. It is a vast system of interconnected computers and devices that facilitates
communication, data sharing, and access to a wide range of online services. The Internet connects users
across the globe through a network of servers, routers, and cables that transmit data. It enables devices
like computers, smartphones, tablets, and smart devices to exchange information, access resources, and
communicate on a global scale. The Internet supports various services such as the World Wide Web
(WWW), email, file sharing, social media, and streaming.
TYPES OF INTERNETWORK
Type of Description Example
Internetwork
Intranet A private network that is restricted to an organization or Corporate intranet used by
institution. It uses Internet technologies (such as web browsers employees for accessing
and protocols) but is accessible only to authorized internal internal resources, HR portals,
users. and databases.
Limited to authorized personnel within the
organization.
Enhances productivity by allowing employees to share
resources and communicate efficiently within a secure
environment.
Extranet An extension of an intranet that provides limited access to A company allowing suppliers
external users, such as partners, vendors, or clients. Extranets to access order tracking
allow secure data sharing and collaboration between an systems or shared documents.
organization and external stakeholders.
Limited to specific external users and employees,
requiring secure login credentials.
Facilitates collaboration and communication with
external stakeholders while maintaining a level of
control and security over the information shared.
Internet A global public network that connects billions of devices The World Wide Web (WWW),
worldwide. The Internet uses standardized protocols (e.g., email services, and social
TCP/IP) to enable data sharing, communication, and access to media platforms like Facebook
online services across networks. and Twitter.
Open to anyone with an Internet connection.
Provides universal access to information,
communication, and various online services, making it a
valuable resource for individuals and organizations
globally.
VPN (Virtual A secure, encrypted connection over a public network (such as Employees using a VPN to
Private Network) the Internet) that allows users to access a private network securely access their
remotely as if they were directly connected to it. VPNs are company’s intranet from
commonly used for secure remote work and privacy. home or remote locations.
Requires specific software or credentials, creating a
secure “tunnel” for data transmission.
Ensures data privacy and security by encrypting the
connection, allowing users to safely access a network
from a remote location or over a public network.
Components of a LAN
1. Computers and Devices
o Workstations: Desktops and laptops used by individuals.
o Servers: Computers that provide shared resources, such as files, printers, and
applications.
2. Network Devices
Information Communication Technology
BY: JOHN KOGI KINYUA [email protected]//0729968636
o Switches: Devices that connect multiple computers within a LAN, managing data traffic
efficiently.
o Routers: Devices that connect the LAN to other networks, such as the internet.
o Access Points: Devices that provide wireless connectivity to the network.
3. Transmission Media
o Wired: Ethernet cables (Cat5, Cat6, etc.) that physically connect devices.
o Wireless: Wi-Fi technology that enables wireless communication within the LAN.
4. Network Interface Cards (NICs): hardware components that allow computers and other devices
to connect to a network.
o Ethernet NICs: Allow computers to connect to a wired LAN.
o Wireless NICs: Enable devices to connect to a wireless LAN.
Functions of a LAN
1. Resource Sharing
o File Sharing: Users can access and share files stored on other computers or servers within
the network.
o Printer Sharing: Multiple users can access and use shared printers.
o Application Sharing: Software applications can be installed on a server and accessed by
multiple users.
2. Communication
o Email: Internal email systems for communication within the organization.
o Instant Messaging: Real-time text-based communication among users.
o Voice and Video Conferencing: Enables voice and video calls within the network.
3. Centralized Data Management
o Data Storage: Centralized storage solutions, such as Network Attached Storage (NAS) or
file servers.
o Data Backup: Centralized backup systems to protect data against loss.
4. Network Security
o Access Control: User authentication and authorization to ensure only authorized users
can access the network.
o Firewalls: Protect the network from unauthorized access and cyber threats.
o Antivirus and Antimalware: Protection against malicious software.
5. Network Management
o Monitoring: Continuous monitoring of network performance and health.
o Configuration Management: Managing the settings and configurations of network
devices.
o Troubleshooting: Identifying and resolving network issues to maintain connectivity and
performance.
Benefits of a LAN
1. Improved Communication: Facilitates quick and easy communication among users within the
network.
2. Cost-Effective Resource Sharing: Reduces costs by allowing multiple users to share expensive
resources like printers and storage.
3. Centralized Data Management: Simplifies data management and backup processes.
4. Enhanced Security: Provides robust security measures to protect data and resources.
5. Scalability: Easily expandable to accommodate more users and devices.
Others include:
3. Metropolitan Area Network (MAN)
o Definition: A network that spans a city or a large campus.
o Characteristics: Larger than a LAN but smaller than a WAN, often used to connect
multiple LANs within a metropolitan area.
o Examples: City-wide Wi-Fi networks, university campus networks.
4. Personal Area Network (PAN)
o Definition: A network for connecting personal devices within a short range, typically
within a few meters.
o Characteristics: Used for personal devices like smartphones, tablets, and laptops, often
using wireless technologies like Bluetooth.
o Examples: Connecting a smartphone to a laptop, Bluetooth headphones.
5. Virtual Private Network (VPN)
o Definition: A secure network connection over a public network (usually the internet).
o Characteristics: Provides encrypted connections for secure data transmission, often used
by remote workers to access corporate networks.
Information Communication Technology
BY: JOHN KOGI KINYUA [email protected]//0729968636
o Examples: Remote employees accessing a company’s internal network securely.
NETWORK TOPOLOGY
Network topology refers to the physical or logical arrangement of nodes (devices) and connections in a
computer network. The choice of topology affects performance, scalability, and fault tolerance. Below
are the primary types of network topology:
Types of Network Topology
Physical topology is the geometric representation of all the nodes in a network. There are six types of
network topology which are Bus Topology, Ring Topology, Tree Topology, Star Topology, Mesh
Topology, and Hybrid Topology.
1) Bus Topology
The bus topology is designed in such a way that all the stations are connected through a single
cable known as a backbone cable called "single lane"
Each node is either connected to the backbone cable by drop cable or directly connected to the
backbone cable.
When a node wants to send a message over the network, it puts a message over the network. All
the stations available in the network will receive the message whether it has been addressed or
not.
The configuration of a bus topology is quite simpler as compared to other topologies.
The backbone cable is considered as a "single lane" through which the message is broadcast to
all the stations.
The most common access method of the bus topologies is CSMA (Carrier Sense Multiple Access).
3) Star Topology
o Star topology is an arrangement of the network in which every node is connected to the central
hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices attached to the server are
known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
o Efficient troubleshooting: Troubleshooting is quite efficient in a star topology as compared to
bus topology. In a bus topology, the manager has to inspect the kilometers of cable. In a star
topology, all the stations are connected to the centralized network. Therefore, the network
administrator has to go to the single station to troubleshoot the problem.
o Network control: Complex network control features can be easily implemented in the star
topology. Any changes made in the star topology are automatically accommodated.
o Limited failure: As each station is connected to the central hub with its own cable, therefore
failure in one cable will not affect the entire network.
o Familiar technology: Star topology is a familiar technology as its tools are cost-effective.
o Easily expandable: It is easily expandable as new stations can be added to the open ports on the
hub.
o Cost effective: Star topology networks are cost-effective as it uses inexpensive coaxial cable.
o High data speeds: It supports a bandwidth of approx 100Mbps. Ethernet 100BaseT is one of the
most popular Star topology networks.
Disadvantages of Star topology
o A Central point of failure: If the central hub or switch goes down, then all the connected nodes
will not be able to communicate with each other.
Information Communication Technology
BY: JOHN KOGI KINYUA [email protected]//0729968636
o Cable: Sometimes cable routing becomes difficult when a significant amount of routing is
required.
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected with each other
in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes are the
descendants of the root node.
o There is only one path exists between two nodes for the data transmission. Thus, it forms a
parent-child hierarchy.
Advantages of Tree topology
o Support for broadband transmission: Tree topology is mainly used to provide broadband
transmission, i.e., signals are sent over long distances without being attenuated.
o Easily expandable: We can add the new device to the existing network. Therefore, we can say
that tree topology is easily expandable.
o Easily manageable: In tree topology, the whole network is divided into segments known as star
networks which can be easily managed and maintained.
o Error detection: Error detection and error correction are very easy in a tree topology.
o Limited failure: The breakdown in one station does not affect the entire network.
o Point-to-point wiring: It has point-to-point wiring for individual segments.
5) Mesh topology
o Full Mesh Topology: In a full mesh topology, each computer is connected to all the computers
available in the network.
o Partial Mesh Topology: In a partial mesh topology, not all but certain computers are connected
to those computers with which they communicate frequently.
i. Simplex mode
In Simplex mode, the communication is unidirectional, i.e., the data flow in one direction.
o
A device can only send the data but cannot receive it or it can receive the data but cannot send
o
the data.
o This transmission mode is not very popular as mainly communications require the two-way
exchange of data. The simplex mode is used in the business field as in sales that do not require
any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners but never allows
them to transmit back.
o Keyboard and Monitor are also the examples of the simplex mode as a keyboard can only accept
the data from the user and monitor can only be used to display the data on the screen.
o The main advantage of the simplex mode is that the full capacity of the communication channel
can be utilized during transmission.
Advantage of Simplex mode:
o In simplex mode, the station can utilize the entire bandwidth of the communication channel, so
that more data can be transmitted at a time.
Disadvantage of Simplex mode:
o Communication is unidirectional, so it has no inter-communication between devices.
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit and receive the
data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any error occurs, then
the receiver requests the sender to retransmit the data.(Advantage)
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one party speaks, and
another party listens. After a pause, the other speaks and first party listens. Speaking
simultaneously will create the distorted sound which cannot be understood.
In Full duplex mode, the communication is bi-directional, i.e., the data flow in both the
o
directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in one direction, and
another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network. When two people
are communicating with each other by a telephone line, both can talk and listen at the same
time.
Advantage of Full-duplex mode:
o Both the stations can send and receive the data at the same time.
Send/Receive A device can only send the Both the devices can Both the devices can send and
data but cannot receive it send and receive the receive the data simultaneously.
or it can only receive the data, but one at a time.
data but cannot send it.
Performance The performance of half- The performance of The Full-duplex mode has better
duplex mode is better than full-duplex mode is performance among simplex and
the simplex mode. better than the half- half-duplex mode as it doubles the
duplex mode. utilization of the capacity of the
communication channel.
Example Examples of Simplex mode Example of half-duplex Example of the Full-duplex mode is
are radio, keyboard, and is Walkie-Talkies. a telephone network.
monitor.
ACTIVITY:
1. What is a computer network, and why is it significant in facilitating modern communication?
2. Explain the various functions of computer networks and provide examples to illustrate their
application.
3. Compare and contrast the Internet, Intranet, and Extranet, including examples for each.
4. Discuss the role of internet connectivity in advancing the Kenyan economy.
5. Why is network security important? Outline methods to protect computer networks from security
threats.
6. Define network topology and explain its relevance in designing efficient networks.
7. Highlight the pros and cons of the following network topologies:
i. Bus topology
ii. Ring topology
iii. Star topology