Professional Documents
Culture Documents
Chapter 1
Chapter 1
1441-1442
Faculty of Sciences/Northern Borders University
2020-2021
Chapter I
Salem.Belhaj@nbu.edu.sa
Computer Science Department
1
Key concepts
• Telecommunication is communication at a distance by
technological means, particularly through electrical signals or
electromagnetic waves
• Reminder:
– 1MB =1 000 000 bytes =106 bytes
Computer Networks 3
Why a Network?
• Broadcast
• Unicast
Computer Networks 4
Network Devices
Computer Networks 5
Network Connections
Computer Networks 6
PAN (Personal Area Network)
Computer Networks 7
LAN (Local Area Network)
• A LAN is a privately owned network that operates within and nearby a
building like a home, office factory or University.
– Restricted in size
– High throughput
• Wired LANs run at speeds of 100 Mbps to 1 Gbps
– Recent LAN reach higher flow rates up to 10Gbit/s HSLAN (High Speed
LAN )
• Low delay: nanoseconds< delay < microseconds
• Very few errors
• When LANs are used by companies, they are called enterprise
networks.
• Examples:
– Cable television networks available in many cities
– IEEE 802.16 known as WiMax
Computer Networks 9
WAN (Wide Area Network)
• Generally extended > 100 Km
• Example: Internet
Computer Networks 10
Topologies
• Network topology is the arrangement of the various
elements (links, nodes, etc.) of a computer network
Computer Networks 12
Bus Topology
• Each node (machine) is connected to a single cable
Bus
Computer Networks 13
Bus Topology
Computer Networks 14
Star Topology
• Each host is connected to a central hub or switch with a point-to-
point connection
• All of the traffic that transverses the network passes through the
central hub
• The hub acts as a signal booster or repeater which in turn allows
the signal to travel greater distances.
• Widely implemented
• Hub is the single point of failure
PABX Matra
MC6500
Computer Networks 15
Star Topology
Computer Networks 16
Ring Topology
• Each host is connected to the network in a closed loop or ring
• Each host has a unique address that is used for identification
• The signal passes through each machine or computer
connected to the ring in one direction
• Ring topologies typically utilize a token passing scheme, used
to control access to the network
• By utilizing this scheme, only one machine can transmit on
the network at a time
Ring
Computer Networks 17
Ring Topology
Computer Networks 18
The OSI reference model
• This model is developed by the International Standards
Organization (ISO)
• The OSI model has seven layers
Computer Networks 19