Computer Networks and Necessary Interfacing Devices
Computer Networks and Necessary Interfacing Devices
Necessary Interfacing
Devices
By Shreevatsa PU
(1CD21CS146)
Why Computer Networks?
• A computer network is a collection of interconnected devices
and systems that can communicate with each other.
• Networks are essential for sharing resources, such as files,
printers, and internet connections, and for enabling
communication between users.
• Facilitate Communication: Networks enable communication
between users, allowing them to share information and
collaborate effectively.
• Resource Sharing: Networks allow for the sharing of hardware
resources like printers, scanners, and storage devices, as well
as software resources like applications and databases.
Why Computer Networks? (contd.)
• Increased Efficiency: By centralizing resources
and enabling communication, networks improve
efficiency in organizations by streamlining
processes and reducing duplication of efforts.
• Scalability: Networks can easily scale to
accommodate growing needs, whether it's
adding more users or expanding the
infrastructure.
• Access to Information: Networks provide
access to vast amounts of information and
resources available on the internet.
Key Networking Devices
• Router: A router is a networking device that forwards data packets between
computer networks. It connects different networks and directs traffic
efficiently.
• Switch: A switch is a networking device that connects devices within a local
area network (LAN). It operates at the data link layer of the OSI model and
forwards data only to the intended recipient.
• Wireless Access Point (WAP): A wireless access point allows wireless
devices to connect to a wired network. It acts as a bridge between wireless
devices and the wired network infrastructure.
• Client: A client is a device or software that initiates communication with a
server in a client-server architecture. Examples include computers,
smartphones, and web browsers.
• Firewall: A firewall is a security device or software that monitors and controls
incoming and outgoing network traffic based on predetermined security rules.
It protects the network from unauthorized access and cyber threats.
• Protocol: A protocol is a set of rules and conventions governing how data is
Types of Networking Devices
(contd.)
Network Topology
• Network topology refers to the physical or logical layout of a
network. Common topologies include bus, star, ring, mesh, and
hybrid topologies.
• Each topology has its advantages and disadvantages in terms of
cost, scalability, reliability, and performance.
Other Key Features
• Wide Area Network (WAN):
A WAN is a type of network that spans a large
geographical area, connecting multiple LANs or other
networks. It utilizes public or private
telecommunications infrastructure, such as leased lines,
satellite links, or fiber optics, to enable long-distance
communication.
• Address Resolution Protocol (ARP):
ARP is a protocol used to map IP addresses to MAC
addresses on a local network. When a device wants to
communicate with another device on the same network,
it uses ARP to discover the MAC address associated with
Other Key Features (contd.)
• Networking Devices:
Networking devices include routers, switches, hubs,
bridges, repeaters, and gateways. These devices facilitate
the transmission of data within and between networks,
each serving a specific purpose in network communication.
• Shared Resources:
Shared resources refer to resources such as printers, files,
and databases that are accessible to multiple users or
devices on a network. Sharing resources improves
efficiency and collaboration within organizations.
Other Key Features (contd.)
• Transmission Media and Network Cable
Types:
Transmission media are the physical mediums
used to transmit data between devices in a
network. Common types include twisted-pair
cable, coaxial cable, fiber-optic cable, and
wireless communication.
• Network Hubs:
A network hub is a basic networking device
that connects multiple devices in a network. It
operates at the physical layer of the OSI model
and simply forwards data to all connected
devices without any intelligence or filtering.
Other Key Features (contd.)
• Network Security:
Network security encompasses measures and
technologies implemented to protect a network and its
data from unauthorized access, misuse, modification, or
denial of service. It includes strategies such as
encryption, authentication, access control, firewalls,
intrusion detection systems, and antivirus software.