KEMBAR78
NET200 - Chapter 1 & 2 | PDF | Network Topology | Computer Network
0% found this document useful (0 votes)
25 views24 pages

NET200 - Chapter 1 & 2

The document covers the fundamentals of computer networks, including definitions, uses, and telecommunication systems. It discusses various applications of networks in business, home, mobile, and social contexts, as well as different network topologies such as point-to-point, star, bus, ring, mesh, and tree. Additionally, it highlights the importance of communication modes and the components of telecommunication systems for effective data exchange.

Uploaded by

mberengakelvin0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views24 pages

NET200 - Chapter 1 & 2

The document covers the fundamentals of computer networks, including definitions, uses, and telecommunication systems. It discusses various applications of networks in business, home, mobile, and social contexts, as well as different network topologies such as point-to-point, star, bus, ring, mesh, and tree. Additionally, it highlights the importance of communication modes and the components of telecommunication systems for effective data exchange.

Uploaded by

mberengakelvin0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

COMPUTER NETWORKS (NET200)

NET200 For BACHELOR OF APPLIED ACCOUNTING: AUDIT AND INFORMATION SYSTEMS


JAN-JUNE 2016
TOPICS COVERED:

 Definition of Networks
 Uses Of Computer Networks
 Telecommunication Systems

Prepared by Sten Namatumbo


Email: stennamatumbo@yahoo.com / snamatumbo@malawiposts.com
Cell :+265 991938988
Skype : sten.Namatumbo
Chapter 1
Understanding Networks
 In its broadest sense, a network consists of two or more entities, or objects,
sharing resources and information.
 Our main focus in this lecture will be computer network, how they are designed,
operated and manipulated in a communication environment.
 A computer network consists of a collection of computers, printers and other
equipment that is connected together so that they can communicate with each
other. It is basically all of the components (hardware and software) involved in
connecting computers across small and large distances.
 A computer network is sometimes referred to as a data network
 There are so different types of computer networks but the most common and
widely used form of Computer Network is the INTERNET
 A world-wide network connecting millions of computer networks for the purpose of
exchanging data and communications using special rules of communication.
 Think of other types of computer networks you know
Figure 1.0 below shows a simple illustration of a computer network
Network Communication
 For a computer network to exist or to be functional, there always has to be a mode of
communication through which data or information has to be transferred
 In a computer network there are different realms where computers and other network
devices communicate. These may be both physical or wireless
 Examples of physical mode of communications include :
- Wires
- Optical Cables
 Wireless transmission protocols include:
-Infrared/Bluetooth
-Radio frequency
-Microwave
 These Modes of transmission in Computer networks will be covered at length later in
Course
Uses of Computer Networks

 In recent years due to the advancement in technology, networks have become


a vital component in most aspects of life. Networking especially one which
involves computers is used in almost everyday to day life endeavours.
 Networks usage and applications is demarcated in the following categories
-Business Applications
-Home Applications
-Mobile Users
-Social Users
 These four categories represent the biggest share in computer networks usage
and applications which shall be dissected in greater detail.
Business Applications
 Most companies and organisations use networking as a tool for the following reasons:
1-Resource Sharing
availability of data and resources to anyone on the network without regard to the
physical location of the resource or the user. Usually involves the use of VPNs(Virtual
Private Networks),Servers and Web based application software
2- Facilitating Centralized Data Management
Having a network environment with centralized servers or point of control reduces
operational costs and provides an optimal working environment in most business entities
e.g. having one network where different software programs interact or One of the
greatest benefits of installing a network at a school is the fact that all of the software
can be loaded on one computer (the file server). This eliminates that need to spend time
and energy installing updates and tracking files on independent computers throughout
the building.
Business Applications Continued…..

3- Virtual communication
This is mainly achieved through two main forms. In a busy business environment,
employees may exchange data through electronic mail(Email) and Telephone in form
of VoIP(Voice over IP). Telephone calls between employees may be carried by the
computer network instead of by the phone company. This technology is called IP
telephony or Voice over IP (VoIP) when Internet technology is used. The microphone
and speaker at each end may belong to a VoIP-enabled phone or the employee’s
computer. Companies find this a wonderful way to save on their telephone bills
4 E-Commerce
This is a modernised way of conducting business electronically especially with
customers and suppliers. Examples include airlines, bookstores, car manufactures,
mobile phone manufacturers etc. All the require a well executed and robust network
to manage their business transactions
Home Applications
 1-Connectivity
Networks in a local resident or home are usually used for connectivity with remote
computers or servers to access information and more recently connection to the
internet. As with companies, home users can access information, communicate with
other people, and buy products and services with e-commerce
Access to remote information comes in many forms. It can be surfing the World Wide
Web for information or just for fun. Information available includes the arts, business,
cooking, government, health, history, hobbies, recreation, science, sports, travel, and
many others. Fun comes in too many ways to mention, plus some ways that are better
left unmentioned.
2- Entertainment
This comes in form of radio an television networks. All these function with the aid of a
centralised network to distribute the data. TV shows now reach many homes via IPTV
(IP Television) systems that are based on IP technology instead of cable TV or radio
transmissions. Media streaming applications let users tune into Internet radio stations
or watch recent episodes of their favorite TV shows. Examples Include Netflix,Dstv
WebApp
Home Applications Continued…..

3- Security
Morden homes and buildings are now wired with sophisticated security systems
and technologies all which are wired across a network system.
Many homes are already wired with security systems that include door and
window sensors, and there are many more sensors that can be folded in to a smart
home monitor, such as energy consumption. Your electricity, gas and water meters
could also report usage over the network. This would save money as there would
be no need to send out meter readers. And your smoke detectors could call the
fire department instead of making a big noise (which has little value if no one is
home) .
This type of network arrangement is often referred to as UBIQUITOUS
COMPUTING
Mobile Users
1-Connectivity
Mobile computing nowadays is an emerging technology. With the invention of Tablets,
laptops and PDAs has revolutionised the need for networking.
Its achieved with the emergence of wireless hotspots which are used for internet
connectivity and file sharing. . Wireless hotspots based on the 802.11 standard are
another kind of wireless network for mobile computers.
2-Data Storage
Data is being continually loaded on the computers of every fledgling network user as
they expanded their network use. Users quickly ran out of space on their own local
computers so the transfer the excess data on mobile platforms as on was of data
storage across a network.
Mobile wireless applications, such as people walking around stores with a handheld
computers recording inventory. At many busy airports, car rental return clerks work in
the parking lot with wireless mobile computers. They scan the barcodes or RFID chips
of returning cars, and their mobile device, which has a built-in printer, calls the main
computer, gets the rental information, and prints out the bill on the spot.
Social Users

1-Instant Messaging
By the turn of the centaury everyone has experienced the art of social networking.
The emergence of social network applications has made connectivity and information
sharing almost universal. Agile network protocols have been invented to manage the
swarm of social network users. Invention of powerful data storage computers known
as servers has made data exchange and network interoperability easy.
Popular social network platforms such as Facebook, Instagram, Twitter,Google
+,LinkedIn and WhatsApp all run through a web of sophisticated and highly efficient
network machinery.
Even more loosely, groups of people can work together to create content. A wiki, for
example, is a collaborative Web site that the members of a community edit. The most
famous wiki is the Wikipedia, an encyclopedia anyone can edit, but there are
thousands of other wikis.
Chapter 2
Telecommunication systems
 Telecommunication systems and computer networking have been used
interchangeably over the years due to its similarities in both management and
functionality
 Telecommunication is – according to Article 1.3 of the International
Telecommunication Union´s (ITU) Radio Regulations (RR) – defined as Any
transmission, emission or reception of signs, signals, writings, images and
sounds or intelligence of any nature by wire, radio, optical or other
electromagnetic systems and occurs when the exchange of information
between two or more entities (communication) includes the use of technology
 Telecommunication systems rely upon the use of channels as a mode of
transmission which may be in either physical (cables and wires) or in a form
of electromagnetic waves(signals and propagated wave frequencies)
Components of a Telecommunication
system
 Every Communication system is made up of components (Both software and
hardware ) that function in conjunction with one another in order to achieve
one distinct goal, data/information exchange
 Major Components of telecommunications system include
- Computers(desktops, Laptops, PDAs) to process information.
-Terminals or any input/output devices that send or receive data.
-Communication channels,(physical or wireless) the links by which data or
voice are transmitted between sending and receiving devices in a network
-Communication processors, such as Routers, bridges, modems etc. which
provide communications support for data transmission and reception.
-Communication software to manage network such as firewalls, DMZ,
SharePoint etc.
Functions of a Telecoms Systems
 As stated before, Telecommunications system is a collection of compatible
hardware and software arranged to communicate information from one location
to other. Having said that its a system, we can now go on to examine the
functions of a telecommunication system
 Below are some of the core functions of any Telecommunication system
1-Transmits information – Telecom systems form an integral part in information
exchange by transiting and receiving data
2-Establishes the common interface between sender and receiver- accomplished
using relevant network software to match the interface of both sender and user
3- Routing of messages/data along the most efficient paths -Since computers and
terminals in a network can be connected in multiple ways, there are different paths
from a sender to a receiver, the telecom system figures out a path in such a way
that transmission and reception is done in an uninterrupted manner and at the same
time through the shortest path consuming the shortest time.
Functions continued…..

4- Ensures that the right message reaches the right user- Telcom systems map out
the correct paths for each message using routing protocols and algorithms
5-Performs editorial tasks such as checking for transmission errors
6-Converts the messages from one speed to another-Networks use communication
channels and other hardware and software that vary in their transmission and reception
speeds. The telecom system is responsible for managing the speed of transmission and
reception irrespective of what type of channel and which type of other hardware and
software is used
7- Converts the messages from one format to another - Networks often have
information processing hardware and software which require information to be
presented for processing in a given format, when information is not in that format, its
not processed and furthered on the network. Thus, converting information from one
format to another is a very important function of the telecommunication system
8- Controls the flow of information- Involves management of network traffic and
redirection of data packets sent across a network
Network Topologies
 Network topology is basically the arrangement of components and peripherals
in a Telcoms network
 There are two basic categories of network topologies: Physical topologies and
Logical topologies
 Physical Topology refers to the cabling layout used to link devices in a network
 Conversely Logical Topology is the way that the signals act on the network
media, or the way that the data passes through the network from one device
to the next without regard to the physical interconnection of the devices.
 The logical classification of network topologies generally follows the same
classifications as those in the physical classifications of network topologies but
describes the path that the data takes between nodes being used as opposed to
the actual physical connections between nodes. The logical topologies are
generally determined by network protocols as opposed to being determined by
the physical layout of cables, wires, and network devices or by the flow of the
electrical signals
 There are 6 main network topologies which are used when designing
computer and telecommunication networks, these are:
1- Point-to-Point
2- star
3-Bus
4-Ring/Circular
5-Mesh
6-Tree
 Other include hybrid and Daisy Chain but we will concentrate on the 6 major
ones
Point-to-Point Topology
 A point-to-point topology has a single connection between two devices. In this
topology, two devices can directly communicate without interference from
other devices. These types of connections are not common when many
devices need to be connected together. An example of a point-to-point
topology is when you connect two routers across a dedicated WAN circuit..
 The value of a permanent point-to-point network is unimpeded
communications between the two endpoints. Examples include a Telephony
system and Home desktop to an ISP
 Figure 1.2 below illustrates the point-to-point topology
Star Topology
 In a star topology, a central device has many point-to-point connections to
other devices. Star topologies are used in environments where many devices
need to be connected
 Every node (computer workstation or any other peripheral) is connected to a
central node called hub, router or switch. The switch is the server and the
peripherals are the clients.
 The primary disadvantage of the star topology is that the hub represents a
single point of failure.
 Figure 1.3 below illustrates the Star topology
Bus Topology
 A bus topology uses a single connection or wire to connect all devices with the
help of interface connectors
 A signal from the source travels in both directions to all machines connected
on the bus cable until it finds the intended recipient. If the machine address
does not match the intended address for the data, the machine ignores the
data. Alternatively, if the data matches the machine address, the data is
accepted.
 Easy to implement because of it only contains one wire
Ring topology
 A network topology is set up in a circular fashion in such a way that they
make a closed loop.
 This way data travels around the ring in one direction and each device on the
ring acts as a repeater to keep the signal strong as it travels. Each device
incorporates a receiver for the incoming signal and a transmitter to send the
data on to the next device in the ring
 The network is dependent on the ability of the signal to travel around the
ring. When a device sends data, it must travel through each device on the
ring until it reaches its destination. Every node is a critical link
 Below is the ring topology illustration
Mesh Topology
 In this Topology, each node relays data for the network. All mesh nodes
cooperate in the distribution of data in the network.
 Mesh networks can relay messages using either a Flooding technique or a
routing technique. With routing, the message is propagated along a path by
hopping from node to node until it reaches its destination
 Below is the Mesh topology arrangement
Tree topology
 A tree topology is essentially a combination of bus topology and star topology.
The nodes of bus topology are replaced with standalone star topology
networks. This results in both disadvantages of bus topology and advantages
of star topology
 For example, if the connection between two groups of networks is broken
down due to breaking of the connection on the central linear core, then those
two groups cannot communicate, much like nodes of a bus topology. However,
the star topology nodes will effectively communicate with each other.
 Its mainly implemented in super computers due to its level of complexity i.e.
the Clay X2
References and Prescribed Texts

 Andrew Tanenbaum (2006). Computer Network. 5th Edition, Prentice Hall;


ISBN-10: 0130661023
 Kenneth Loudon and Karol Trevor (2011) Management Information System:
Managing the digital firm.12th Edition

You might also like