SlideShare a Scribd company logo
1 of 24
Name : Fatih

Surname : Bingül

Number : 20112141

Subject : Computer Networks And Topology

Course : Eng 102
Overview
Introduction to Computer Networks

   The Local Area Network




                                    2
Computer Networks
• A computer network is a system for communicating
  between two or more computers and associated devices. It
  is an interconnection of computers for the purposes of
  sharing information and resources.
• A popular example of a computer network is the internet,
  which allows millions of users to share information
• Computer networks can be classified according to their
  size:
   –   Personal area network (PAN)
   –   Local area network (LAN)
   –   Metropolitan area network (MAN)
   –   Wide area network (WAN)                               3
An example of a network


Router
                           Hub
                  Bridge         Segment   Node

            Hub



 Internet


                                                  4
Personal Area Network
•   A PAN is a network that is used for
    communicating among computers and
    computer devices (including
    telephones) in close proximity of
    around a few meters within a room
•   It can be used for communicating
    between the devices themselves, or for
    connecting to a larger network such as
    the internet
•   PAN’s can be wired or wireless
        PAN’s can be wired with a computer
         bus such as a universal serial bus: USB
         (a serial bus standard for connecting
         devices to a computer, where many
         devices can be connected concurrently)
        PAN’s can also be wireless through the
         use of bluetooth (a radio standard
         designed for low power consumption
         for interconnecting computers and
         devices such as telephones, printers or
         keyboards to the computer) or IrDA
         (infrared data association) technologies   5
Local Area Network
• A LAN is a network that is used for communicating among
  computer devices, usually within an office building or
  home
• LAN’s enable the sharing of resources such as files or
  hardware devices that may be needed by multiple users
• Is limited in size, typically spanning a few hundred meters,
  and no more than a mile
• Is fast, with speeds from 10 Mbps to 10 Gbps
• Requires little wiring, typically a single cable connecting
  to each device
• Has lower cost compared to MAN’s or WAN’s
                                                             6
LAN basics
   LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in
    wired LAN’s
   Nodes in a LAN are linked together with a certain topology. These topologies include:
        Bus
        Ring
        Star
        Branching tree
   A node is defined to be any device connected to the network. This could be a computer, a
    printer, a router, etc.
   A Hub is a networking device that connects multiple segments of the network together
   A Network Interface Card (NIC) is the circuit board that has the networking logic
    implemented, and provides a plug for the cable into the computer (unless wireless). In
    most cases, this is an Ethernet card inserted in a slot of the computer’s motherboard
   The Network Operating System (NOS) is the software (typically part of the operating
    system kernel) that communicates with the NIC, and enables users to share files and
    hardware and communicate with other computers. Examples of NOS include: Windows XP,
    Windows NT, Sun Solaris, Linux, etc..

                                                                                                    7
Network Topologies
   Bus Topology
       Each node is connected one after the other (like christmas
        lights)
       Nodes communicate with each other along the same path
        called the backbone




                                                                     8
   Ring Topology
        The ring network is like a bus network, but the “end” of the
         network is connected to the first node
        Nodes in the network use tokens to communicate with each
         other




    Backbone



                                                                        9
   Star Topology
       Each node is connected to a device in the center of the
        network called a hub
       The hub simply passes the signal arriving from any node to
        the other nodes in the network
       The hub does not route the data




                                Hub



                                                                     10
   Branching Tree Topology




                              11
Access Control Methods
   Two primary access control methods
    exist for computers to communicate
    with each other over the network
       Token based access
       Carrier Sense Multiple Access with Collision
        Detection (CSMA/CD)



                                                   12
Token based access
   Used in bus and ring network topologies (token ring)
   Each computer in the network can only send its data
    if it has the token. This prevents collisions that occur
    when data is sent at the same time over the network
   The token is a special pattern of bits/bit in a frame
    that is directly detectible by each node in the
    network
   A computer may only transmit information if it is in
    possession of the token
   The message is sent to all other computers in the
    network
                                                           13
Types of LAN’s
   The three most popular types of LAN’s
    are:
       Token ring
       Ethernet
       FDDI (Fiber Distributed Data Interface)




                                                  14
Operation of token ring
   As an example, suppose node # 1 wants to send information to
    node # 4 over the network
   Initially, an empty frame (network packet) circulates in the
    network
                           1
              6                     2


                                    3
              5
                               4

                                                               15
   When node # 1 receives the empty frame, it inserts a token in the
    token bit part of the frame. This operation may just be an insertion of a
    “1” bit
   The node then inserts the message it wants to send as well as the
    address of the receiving node in the frame
   The frame is then successively received and examined by each node in
    the network. First it is sent to node #2. Node #2 examines the frame
    and compares the address in the frame to its own address. Since
    addresses do not match, it passes the frame onto node #3, which does
    the same thing
   When the frame is received by node #4, the address of the node
    matches the destination address within the frame. The node copies the
    message and changes the token bit in the frame to “0”
   The frame is then sent over to node #5. This node also compares
    addresses and sends it to node #6 which does the same procedure
   When node #1 receives the frame, it examines the token bit and
    recognizes that it has been changed to “0”. Node #1 then concludes
    that the message has been received by the intended node: node #4.
    Node #1 then empties the frame and releases the empty frame back
    into the network for circulation

                                                                            16
Let’s see an animation of the token ring




                                           17
CSMA/CD
   Usually used in a bus topology
   Used in Ethernet LAN’s
   Unlike the token ring, all nodes can send whenever they have
    data to transmit
   When a node wants to transmit information, it first “listens” to
    the network. If no one is transmitting over the network, the
    node begins transmission
   It is however possible for two nodes to transmit simultaneously
    thinking that the network is clear
   When two nodes transmit at the same time, a collision occurs
   The first station to detect the collision sends a jam signal into
    the network
   Both nodes back off, wait for a random period of time and then
    re-transmit

                                                                    18
CSMA/CD

   A      B     C         D



   A      B     C         D



    A     B      C        D


              Collision
                              19
Ethernet
   First network to provide CSMA/CD
   Developed in 1976 by Xerox PARC (Palo Alto
    Research Center) in cooperation with DEC and Intel
   Is a fast and reliable network solution
   One of the most widely implemented LAN standards
   Can provide speeds in the range of 10Mbps- 10
    Gbps
   Used with a bus or star topology

     Ethernet data packet - datagram drawn on board.


                                                         20
Types of Ethernet LANs
   10Base-T
       Operates at 10 Mbps
       IEEE 802.3 standard
   Fast Ethernet (100Base-T)
       Operates at 100 Mbps
   Gigabit Ethernet
       Operates at 1 Gbps
       Uses fiber optic cable
   10 Gbps Ethernet
       Latest development of ethernet
       Uses fiber optic cable
       Developed to meet the increasing bandwidth needs of the LAN
        market
   Wireless Ethernet
       IEEE 802.11 standard
       Operates at around 2.4 Gbps                                   21
Fiber-Distributed Data Interface
(FDDI)
   Fiber-Distributed Data Interface (FDDI) provides a
    standard for data transmission in a local area network that
    can extend in range up to 200 kilometers (124 miles).
   The FDDI protocol uses as its basis the token ring
    protocol.
   In addition to covering large geographical areas, FDDI
    local area networks can support thousands of users.
   As a standard underlying medium it uses optical fiber
    (though it can use copper cable, in which case one can
    refer to CDDI).
   FDDI uses a dual-attached, counter-rotating token-ring
    topology.

                                                             22
Fiber-Distributed Data Interface
(FDDI)
   An FDDI network contains two token rings, one for
    possible backup in case the primary ring fails.

   FDDI has a larger maximum-frame size than standard 100
    Mbit/s ethernet, allowing better throughput.

   A small number of devices (typically infrastructure devices
    such as routers and concentrators rather than host
    computers) connect to both rings - hence the term "dual-
    attached".

   Host computers then connect as single-attached devices
    to the routers or concentrators.
                                                             23
   Reference
   http://en.wikipedia.org/wiki/Network_topo

   http://en.wikipedia.org/wiki/Computer_ne




                                         24

More Related Content

What's hot

COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answersRoman Orlowski
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Basic networking
Basic networkingBasic networking
Basic networkingworr1244
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturingN. A. Sutisna
 
Basic-networking-hardware
Basic-networking-hardwareBasic-networking-hardware
Basic-networking-hardwareIsus Isusay
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4Raghu nath
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)NYversity
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment helpJacob William
 
Working of lan
Working of lanWorking of lan
Working of lanmyrajendra
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518MdZakirHossain66
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 

What's hot (20)

COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
100 network question and answers
100 network question and answers100 network question and answers
100 network question and answers
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking
NetworkingNetworking
Networking
 
Chapter 8 the role of networking in manufacturing
Chapter 8   the role of networking in manufacturingChapter 8   the role of networking in manufacturing
Chapter 8 the role of networking in manufacturing
 
Basic-networking-hardware
Basic-networking-hardwareBasic-networking-hardware
Basic-networking-hardware
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
Network essentials chapter 4
Network essentials  chapter 4Network essentials  chapter 4
Network essentials chapter 4
 
Computer network (12)
Computer network (12)Computer network (12)
Computer network (12)
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Networking HMT-1
Networking HMT-1Networking HMT-1
Networking HMT-1
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Computer network assignment help
Computer network assignment helpComputer network assignment help
Computer network assignment help
 
Fragmentation
FragmentationFragmentation
Fragmentation
 
Working of lan
Working of lanWorking of lan
Working of lan
 
Data communication assignment id1925102518
Data communication assignment  id1925102518Data communication assignment  id1925102518
Data communication assignment id1925102518
 
information technology
information technologyinformation technology
information technology
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 

Viewers also liked

Data communication & network - ADSL
Data communication & network - ADSLData communication & network - ADSL
Data communication & network - ADSLReformist
 
Data communication part1
Data communication part1Data communication part1
Data communication part1Melvin Cabatuan
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Data communication part2
Data communication part2Data communication part2
Data communication part2Melvin Cabatuan
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALSyahriha Ruslan
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)welcometofacebook
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash functionChirag Patel
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012Syahriha Ruslan
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationGopal Sakarkar
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructurevimal kumar
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 

Viewers also liked (20)

Triggering transmission
Triggering transmissionTriggering transmission
Triggering transmission
 
Data communication & network - ADSL
Data communication & network - ADSLData communication & network - ADSL
Data communication & network - ADSL
 
Data communication part1
Data communication part1Data communication part1
Data communication part1
 
Subnetting
SubnettingSubnetting
Subnetting
 
Error control
Error controlError control
Error control
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Data communication part2
Data communication part2Data communication part2
Data communication part2
 
FP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINALFP 303 COMPUTER NETWORK PAPER FINAL
FP 303 COMPUTER NETWORK PAPER FINAL
 
Midterm review questions ans(networking)
Midterm review questions ans(networking)Midterm review questions ans(networking)
Midterm review questions ans(networking)
 
Local area network
Local area networkLocal area network
Local area network
 
Token ring
Token ringToken ring
Token ring
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
FP 303 COMPUTER NETWORK FINAL PAPER JUNE 2012
 
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and AuthenticationFirewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
Firewall, Trusted Systems,IP Security ,ESP Encryption and Authentication
 
Issues in Data Link Layer
Issues in Data Link LayerIssues in Data Link Layer
Issues in Data Link Layer
 
public key infrastructure
public key infrastructurepublic key infrastructure
public key infrastructure
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
FDDI
FDDIFDDI
FDDI
 

Similar to Introduction to Computer Networks and Topologies

Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.AnshulAnand21
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer NetworksMuhammad Waqas
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Networkvasanthimuniasamy
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptxEvadeDube
 
Network Topologies
Network TopologiesNetwork Topologies
Network TopologiesAhsan Rahim
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.pptSarthak665910
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Network Fundamentals.pdf
Network Fundamentals.pdfNetwork Fundamentals.pdf
Network Fundamentals.pdfHome
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its TopologyAyushi Gupta
 

Similar to Introduction to Computer Networks and Topologies (20)

Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Concept of Networking and Operating System.
Concept of Networking and Operating System.Concept of Networking and Operating System.
Concept of Networking and Operating System.
 
Chapter7 Computer Networks
Chapter7 Computer NetworksChapter7 Computer Networks
Chapter7 Computer Networks
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
Local area network
Local area networkLocal area network
Local area network
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
LAN
LANLAN
LAN
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.ppt
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
What is networking
What is networkingWhat is networking
What is networking
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Networks
NetworksNetworks
Networks
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Network Fundamentals.pdf
Network Fundamentals.pdfNetwork Fundamentals.pdf
Network Fundamentals.pdf
 
Computer: Network and its Topology
Computer: Network and its TopologyComputer: Network and its Topology
Computer: Network and its Topology
 

Recently uploaded

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 

Recently uploaded (20)

Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 

Introduction to Computer Networks and Topologies

  • 1. Name : Fatih Surname : Bingül Number : 20112141 Subject : Computer Networks And Topology Course : Eng 102
  • 2. Overview Introduction to Computer Networks  The Local Area Network 2
  • 3. Computer Networks • A computer network is a system for communicating between two or more computers and associated devices. It is an interconnection of computers for the purposes of sharing information and resources. • A popular example of a computer network is the internet, which allows millions of users to share information • Computer networks can be classified according to their size: – Personal area network (PAN) – Local area network (LAN) – Metropolitan area network (MAN) – Wide area network (WAN) 3
  • 4. An example of a network Router Hub Bridge Segment Node Hub Internet 4
  • 5. Personal Area Network • A PAN is a network that is used for communicating among computers and computer devices (including telephones) in close proximity of around a few meters within a room • It can be used for communicating between the devices themselves, or for connecting to a larger network such as the internet • PAN’s can be wired or wireless  PAN’s can be wired with a computer bus such as a universal serial bus: USB (a serial bus standard for connecting devices to a computer, where many devices can be connected concurrently)  PAN’s can also be wireless through the use of bluetooth (a radio standard designed for low power consumption for interconnecting computers and devices such as telephones, printers or keyboards to the computer) or IrDA (infrared data association) technologies 5
  • 6. Local Area Network • A LAN is a network that is used for communicating among computer devices, usually within an office building or home • LAN’s enable the sharing of resources such as files or hardware devices that may be needed by multiple users • Is limited in size, typically spanning a few hundred meters, and no more than a mile • Is fast, with speeds from 10 Mbps to 10 Gbps • Requires little wiring, typically a single cable connecting to each device • Has lower cost compared to MAN’s or WAN’s 6
  • 7. LAN basics  LAN’s can be either wired or wireless. Twisted pair, coax or fiber optic cable can be used in wired LAN’s  Nodes in a LAN are linked together with a certain topology. These topologies include:  Bus  Ring  Star  Branching tree  A node is defined to be any device connected to the network. This could be a computer, a printer, a router, etc.  A Hub is a networking device that connects multiple segments of the network together  A Network Interface Card (NIC) is the circuit board that has the networking logic implemented, and provides a plug for the cable into the computer (unless wireless). In most cases, this is an Ethernet card inserted in a slot of the computer’s motherboard  The Network Operating System (NOS) is the software (typically part of the operating system kernel) that communicates with the NIC, and enables users to share files and hardware and communicate with other computers. Examples of NOS include: Windows XP, Windows NT, Sun Solaris, Linux, etc.. 7
  • 8. Network Topologies  Bus Topology  Each node is connected one after the other (like christmas lights)  Nodes communicate with each other along the same path called the backbone 8
  • 9. Ring Topology  The ring network is like a bus network, but the “end” of the network is connected to the first node  Nodes in the network use tokens to communicate with each other Backbone 9
  • 10. Star Topology  Each node is connected to a device in the center of the network called a hub  The hub simply passes the signal arriving from any node to the other nodes in the network  The hub does not route the data Hub 10
  • 11. Branching Tree Topology 11
  • 12. Access Control Methods  Two primary access control methods exist for computers to communicate with each other over the network  Token based access  Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 12
  • 13. Token based access  Used in bus and ring network topologies (token ring)  Each computer in the network can only send its data if it has the token. This prevents collisions that occur when data is sent at the same time over the network  The token is a special pattern of bits/bit in a frame that is directly detectible by each node in the network  A computer may only transmit information if it is in possession of the token  The message is sent to all other computers in the network 13
  • 14. Types of LAN’s  The three most popular types of LAN’s are:  Token ring  Ethernet  FDDI (Fiber Distributed Data Interface) 14
  • 15. Operation of token ring  As an example, suppose node # 1 wants to send information to node # 4 over the network  Initially, an empty frame (network packet) circulates in the network 1 6 2 3 5 4 15
  • 16. When node # 1 receives the empty frame, it inserts a token in the token bit part of the frame. This operation may just be an insertion of a “1” bit  The node then inserts the message it wants to send as well as the address of the receiving node in the frame  The frame is then successively received and examined by each node in the network. First it is sent to node #2. Node #2 examines the frame and compares the address in the frame to its own address. Since addresses do not match, it passes the frame onto node #3, which does the same thing  When the frame is received by node #4, the address of the node matches the destination address within the frame. The node copies the message and changes the token bit in the frame to “0”  The frame is then sent over to node #5. This node also compares addresses and sends it to node #6 which does the same procedure  When node #1 receives the frame, it examines the token bit and recognizes that it has been changed to “0”. Node #1 then concludes that the message has been received by the intended node: node #4. Node #1 then empties the frame and releases the empty frame back into the network for circulation 16
  • 17. Let’s see an animation of the token ring 17
  • 18. CSMA/CD  Usually used in a bus topology  Used in Ethernet LAN’s  Unlike the token ring, all nodes can send whenever they have data to transmit  When a node wants to transmit information, it first “listens” to the network. If no one is transmitting over the network, the node begins transmission  It is however possible for two nodes to transmit simultaneously thinking that the network is clear  When two nodes transmit at the same time, a collision occurs  The first station to detect the collision sends a jam signal into the network  Both nodes back off, wait for a random period of time and then re-transmit 18
  • 19. CSMA/CD A B C D A B C D A B C D Collision 19
  • 20. Ethernet  First network to provide CSMA/CD  Developed in 1976 by Xerox PARC (Palo Alto Research Center) in cooperation with DEC and Intel  Is a fast and reliable network solution  One of the most widely implemented LAN standards  Can provide speeds in the range of 10Mbps- 10 Gbps  Used with a bus or star topology Ethernet data packet - datagram drawn on board. 20
  • 21. Types of Ethernet LANs  10Base-T  Operates at 10 Mbps  IEEE 802.3 standard  Fast Ethernet (100Base-T)  Operates at 100 Mbps  Gigabit Ethernet  Operates at 1 Gbps  Uses fiber optic cable  10 Gbps Ethernet  Latest development of ethernet  Uses fiber optic cable  Developed to meet the increasing bandwidth needs of the LAN market  Wireless Ethernet  IEEE 802.11 standard  Operates at around 2.4 Gbps 21
  • 22. Fiber-Distributed Data Interface (FDDI)  Fiber-Distributed Data Interface (FDDI) provides a standard for data transmission in a local area network that can extend in range up to 200 kilometers (124 miles).  The FDDI protocol uses as its basis the token ring protocol.  In addition to covering large geographical areas, FDDI local area networks can support thousands of users.  As a standard underlying medium it uses optical fiber (though it can use copper cable, in which case one can refer to CDDI).  FDDI uses a dual-attached, counter-rotating token-ring topology. 22
  • 23. Fiber-Distributed Data Interface (FDDI)  An FDDI network contains two token rings, one for possible backup in case the primary ring fails.  FDDI has a larger maximum-frame size than standard 100 Mbit/s ethernet, allowing better throughput.  A small number of devices (typically infrastructure devices such as routers and concentrators rather than host computers) connect to both rings - hence the term "dual- attached".  Host computers then connect as single-attached devices to the routers or concentrators. 23
  • 24. Reference  http://en.wikipedia.org/wiki/Network_topo  http://en.wikipedia.org/wiki/Computer_ne 24