Lecture-1 and 2 (Introduction)
Lecture-1 and 2 (Introduction)
Networks
Prepared by
Dr. Chetna(CSE)
Index
1 Networks Connect Us
In today’s world, through the use of networks, we are connected like never
before. People with ideas can communicate instantly with others to make those
ideas a reality. News events and discoveries are known worldwide in seconds.
Individuals can even connect and play games with friends separated by oceans
and continents
2 No Boundaries
The creation of online communities for the exchange of ideas and information
has the potential to increase productivity opportunities across the globe. The
creation of the cloud lets us store documents and pictures and access them
anywhere, anytime. So whether we are on a train, in a park, or standing on top
of a mountain, we can seamlessly access our data and applications on any
device.
Network Components
3 End devices
The network devices that people are most familiar with are end devices. To distinguish one
end device from another, each end device on a network has an address. When an end device
initiates communication, it uses the address of the destination end device to specify where to
deliver the message. An end device is either the source or destination of a message
transmitted over the network.
End device
End device
LAN
Internetwork
LAN
Functions: Regenerates and retransmits communication signals, Maintain information about what pathways exist through the network and
internetwork, Notify other devices of errors and communication failures, Direct data along alternate pathways when there is a link failure, Classify
and direct messages according to priorities, Permit or deny the flow of data, based on security settings
Note: The ethernet hub is known as a multiport repeater. Repeater Regenerates and retransmits communication signals. Notice all intermediary
devices perform the function of a repeater.
Criteria for choosing: max. distance, environment, amount of data, cost of media, and installation.
Network representation
Note: The terms port and interface are often used interchangeably.
Different Types of Computer Networks
Characteristics of PAN
Below are the main characteristics of
PAN:
•It is mostly personal devices network
equipped within a limited area.
•Appliances use for PAN: cordless
mice, keyboards, and Bluetooth
systems.
Characteristics of LAN
Here are the important
characteristics of a LAN
network:
•It is a private network, so an
outside regulatory body never
controls it.
•LAN operates at a relatively
higher speed compared to other
WAN systems.
Figure 11 Generic workflow of the simplest type of LAN network
Advantages and Disadvantages of LAN
WAN:Wide Area Network
Figure 13 illustrates the levels of access that different groups have to a company intranet, a company
extranet, and the internet
Topologies
In star topology, all the devices are connected to a single networking device through a
cable. This central device may be hub, switch, router and all other nodes are
connected to the central node.
Figure 18 Star topology, Hub at centre and rest all are PC’s
Star Topology
Bus topology is a network type in which every computer and network device is
connected to a single cable. It transmits the data from one end to another in a single
direction. No bi-directional feature is in bus topology.
•It allows more devices to be attached to a single central hub thus it decreases the
distance that is traveled by the signal to come to the devices.
•It allows the network to get isolated and also prioritize from different computers.
Network security:
Network security is an integral part of computer networking. Some common security threats are
Viruses, worms, Trojan horses, Spyware and adware, Zero-day attacks, Threat actor attacks, Denial of
service attacks, Identity theft, etc. Further, security solutions can be Antivirus and antispyware,
Firewall filtering, etc.
Cisco Packet Tracer
Cisco packet Tracer
Simulation, Visualization, Collaboration
1.During a routine inspection, a technician discovered that software that was installed on a computer was secretly
collecting data about websites that were visited by users of the computer. Which type of threat is affecting this
computer?
identity theft
Spyware*
zero-day attack
DoS attack
2.Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and
collaborators?
Internet
Extranet*
extendednet
Intranet
3.A large corporation has modified its network to allow users to access network resources from their personal
laptops and smart phones. Which networking trend does this describe?
Bring your own device*
video conferencing
cloud computing
online collaboration
Questions
4.What is an ISP?
It is a standards body that develops cabling and wiring standards for networking.
It is a networking device that combines the functionality of several different networking devices in one.
It is a protocol that establishes how computers within a local network communicate.
It is an organization that enables individuals and businesses to connect to the Internet.*