CSC 325 Lecture Note (Network 2022)

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 31

SCHOOL OF SCIENCE EDUCATION

COMPUTER SCIENCE DEPARTMENT

CSC 325 – INTRODUCTION TO COMPUTER NETWORKING


LECTURE MODULE

PREPARED FOR NCE III STUDENTS

By
MAL. SHAZALI ABBAS IBRAHIM
AND
MAL. ISMAIL ISAH BALARABE
MODULE ONE
MEANING AND NATURE OF INFORMATION TECHNOLOGY
Information technology (IT) is the use of computers to store or retrieve data and information. IT
is considered to be a subset of information and communications technology (ICT).
Humans have been storing, retrieving, manipulating, and communicating information
since the Sumerians in Mesopotamia developed writing in about 3000 BC. However, the term
information technology in its modern sense first appeared in a 1958 article published in the
Harvard Business Review, the authors commented that "the new technology does not yet have a
single established name. We shall call it information technology (IT).
IT Stands for "Information Technology," and is pronounced "I.T." It refers to anything related to
computing technology, such as networking, hardware, software, the Internet, or the people that
work with these technologies. Many companies now have IT departments for managing the
computers, networks, and other technical areas of their businesses. IT jobs include computer
programming, network administration, computer engineering, Web development, technical
support, and many other related occupations. Since we live in the "information age," information
technology has become a part of our everyday lives Stands for "Information Technology," and is
pronounced "I.T." It refers to anything related to computing technology, such as networking,
hardware, software, the Internet, or the people that work with these technologies. Many companies
now have IT departments for managing the computers, networks, and other technical areas of their
businesses. IT jobs include computer programming, network administration, computer
engineering, Web development, technical support, and many other related occupations. Since we
live in the "information age," information technology has become a part of our everyday lives.
TYPES OF INFROMATION TECHNOLOGY

Information technology don’t have a specific type, almost all types of latest computer networking
technology are falls into the category of the types of information technology. Information technology
is used in creating lot of technologies that really plays an important role in maintaining the life in the
present as well as in the future. So, all the types that we generated in the field of computer networking
or in this technological World are called as the types of the information technology. But some
common types of information technologies are different types of mobile technologies; different types
of technologies used in solving the computational tasks, some types are also used in creating different
types of industrial detection system and processors etc.
IMPORTANCE OF IT IN DEVELOPING COUNTRIES

As we know that information technology plays an important role to maintain the technology and the
World for the future. However, it also plays a vital; role in the developing new countries because it
really take part to produce such technologies that are really useful and economically better for those
countries. It increases the economy of those countries and produces the new and the latest
technologies. It is also helpful in identify the different types of critical problems that take the moral
of the future down and it is also helpful in suggesting the solution related to those problems in the
way of development of new countries.

ADVANTAGES OF INFORMATION TECHNOLOGY

Due to the easy and the convenient approach to the development of the new technologies for the sake
for the good future, information technology has any advantages that are really important for human
life. Some important advantages are as follows:

1. Communication:
Information technology is used in developing different types of communicational devices and
also helpful in better communication services between the two different places for the sake of
good business and for many other purposes. It makes the communication services cheaper and
convenient and also fast than other technologies.
2. Globalization:
Another important advantage of the information technology is the globalization. With the help
of this advantage of the information technology the modern World becomes closer in the ways of
communication and provides the easy way for faster communication, which also enhances the
economy and the profit of different types of businesses.
3. Creation of new Jobs:
A major advantage of the information technology is that it provides the many ways for the
jobs and increases the vacancies in the field. Because of the development of the new technologies
in the field of information technology it provides the opportunity for the new generation to come
in the technical field and generate the technology for the future.
MODULE TWO
DEFINITION AND IMPORTANCE OF COMPUTER NETWORKING
Definition of Computer Networking:
A network can be defined as two or more computing devices sometimes refers as nodes connected
together physically or logicallyin such a way that they can share resources (such as folder, file,
printer and Disk etc.)
ADVANTAGES
1. NETWORK SUPPORT THE WAY WE LIVE.
Communication is almost as important to us as our reliance on air, water, food, and shelter. The
only known method that humans used to share information was limited to face to face
conversation. But with advent of technology the means of communication is constantly on
changing from the printing press to television.
As with every advance in communication technology, the creation and interconnection of robust
data networks is having a profound effect.
In early days of data network connected computers are only limited to exchanging character based
in formation. But the latest network technology have evolved to carry voice, video streams, text,
and graphics between many different types of devices on same platform which enable people to
interact directly with each other almost instantaneously. This has also encourages the formation
of globalcommunities which foster social interaction that is independent of location or time zone.
Resources available through the Internet can help you:
 Decide what to wear using online current weather conditions.
 Find the least congested route to your destination, displaying weather and traffic
video from webcams.
 Check your bank balance and pay bills electronically.
 Receive and send e-mail, or make an Internet phone call, at an Internet cafe over
lunch.
 Obtain health information and nutritional advice from experts all over the world, and
post to a forum to share related health or treatment information.
 Download new recipes and cooking techniques to create a spectacular dinner.
 Post and share your photographs, home videos, and experiences with friends or
with the world.
A network must be able to meet certain criteria, the most important of these are:
 Performance
 Reliability and
 Security
1. Performance: can be measured in many ways including on transit time and responds time,
transit time is the amount of time required for a message to travel from one device to another,
and the response time is elapse time between an enquiry and a response. Generally
performance of a network depends on a number of factors including the number of users, the
type of transmission medium, and the capability of the connected hardware and the efficiency
of software.
2. Reliability: In addition to accuracy of delivery, network reliability is measured by the
frequency of failure and the time it takes a link to recover from a failure.
3. Security: Network security issues includes, protecting data from un- authorized access,
protecting data from damage and implementing policies and procedures for recovery from
breaches and data loses.

USES OF NETWORK
A network is two or more computers connected together to share information and files
between them. Businesses aren't the only ones that can benefit from creating a network.
Home users can enjoy sharing music, movies and printers from any computer.
1. File Sharing
Computers connected to a network can share files and documents with each other.
Personal computers connected to a business network can choose which files and folders
are available to share on the network.
2. Printers
Computers can print pages to another computer with a printer on the network.
Additionally, printers can be connected using a print server, which allows direct printing
from all computers.
3. Sharing Media
Sharing media between computers is easy when connected to a network. Like file
sharing, computers can stream music, videos and movies from one computer to the next.
4. Media Center Server
A media center server can store your entire entertainment library on a centralized hub to
give quick access to your media from every computer on your network.
5. Video Games
Console and PC gamers benefit from networking also. You can easily set up multiplayer
matches and even host your own game server.
MODULE THREE
COMMUNICATION
A process by which information is exchanged between individuals through a common system of
symbols, signs, or behavior. Before beginning to communicate with each other, we establish rules or
agreements to govern the conversation. These rules, or protocols, must be followed in order for the
message to be successfully delivered and understood. Among the protocols that govern successful human
communication are:
 An identified sender and receiver
 Agreed upon method of communicating (face-to-face, telephone, letter, photograph)
 Common language and grammar
 Speed and timing of delivery
 Confirmation or acknowledgement requirements
QUALITY OF COMMUNICATION
Quality of communication is determined when the meaning of the message intended by the sender
is understood by the recipient.
Though in data networks quality of communication is measured with same criteria, however, many
factors can prevent the message from reaching the recipient or distort its intended meaning. These factors
can be either external or internal.
External Factors
External factors affecting the success of communication include:
 The quality of the pathway between the sender and the recipient
 The number of times the message has to change form
 The number of other messages being transmitted simultaneously on the communication
network
 The amount of time allotted for successful communication
Internal Factors
Internal factors that interfere with network communication are related to the nature of the
message itself.
Internal factors affecting the successful communication across the network include:
 The size of the message
 The complexity of the message
 The importance of the message
COMMUNICATION OVER NETWORK
Being able to reliably communicate to anyone, anywhere, is becoming important to our personal and
business lives. In order to support the immediate delivery of the millions of messages being exchanged
between people all over the world, we rely on a web of interconnected networks.
ELEMENTS OF NETWORK
Networks have four basic elements in common:
 Rules or agreements to govern how the messages are sent, directed, received and interpreted
 The messages or units of information that travel from one device to another
 A means of interconnecting these devices - a medium that can transport the messages from one
device to another
 Devices on the network that exchange messages with each other
The right side of the figure shows some of the most common intermediate devices, used to direct and manage
messages across the network, as well as other common networking symbols. Generic symbols are shown
for:
 Switch - the most common device for interconnecting local area networks
 Firewall - provides security to networks
 Router - helps direct messages as they travel across a network
 Wireless Router - a specific type of router often found in home networks
 Cloud - used to summarize a group of networking devices, the details of which may be
unimportant to the discussion at hand
 Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line
for a network to function, the devices must be interconnected. Network connections can be
 wired or
 Wireless.
In wired connections, the medium is either copper (such as twisted pair telephone wire, coaxial cable),
which carries electrical signals, or optical fiber (thin strands of glass or plastic that carry light signals),
which carries light signals.
In wireless connections, the medium is the Earth's atmosphere, or space, and the signals are
microwaves. Wireless media may include the home wireless connection between a wireless router and
a computer with a wireless network card, the terrestrial wireless connection between two ground stations,
or the communication between devices on earth and satellites.
In a typical journey across the Internet, a message may travel across a variety of media.
MODULE FOUR
TYPES OF NETWORK
Generally, networks are distinguished based on their geographical span. A network can be as small
as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself,
covering the whole geographical world,

Personal Area Network (PAN)


A Personal Area Network (PAN) is smallest network which is very personal to a user. This may
include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10
meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones,
wireless printers and TV remotes.

Local Area Network (LAN)


A computer network spanned inside a building and operated under single administrative system
is generally termed as Local Area Network (LAN). Usually, LAN covers an organization’ offices, schools,
colleges or universities. Number of systems connected in LAN may vary from as least as twoto as much
as 16 million.
LAN provides a useful way of sharing the resources between end users. The resources such as
printers, file servers, scanners, and internet are easily sharable among computers.

LANs are composed of inexpensive networking and routing equipment. It may contains local
servers serving file storage and other locally shared applications. It mostly operates on private IP addresses
and does not involve heavy routing. LAN works under its own local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN
technology and uses Star topology, while Token-ring is rarely seen.
LAN can be wired, wireless, or in both forms at once.
Metropolitan Area Network (MAN)
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV
network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand
their Local Area Networks. For example, MAN can help an organization to connect all of its offices in
a city.

Wide Area Network (WAN)


As the name suggests, the Wide Area Network (WAN) covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are Wide Area Network.
These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.

THE INTERNET
Internet is a collection of networks or network of networks. Various networks such as LAN and WAN
connected through suitable hardware and software to work in a seamless manner. It allows various
applications such as e-mail; file transfer, remote log-in, World Wide Web, Multimedia, etc. run
across the internet. The basic difference between WAN and Internet is that WAN is owned by a
single organization while internet is not so. But with the time the line between WAN and Internet is
shrinking, and these terms are sometimes used interchangeably.
Internet – network of networks

APPLICATIONS OF THE INTERNET


In a short period of time computer networks have become an indispensable part of business, industry,
entertainment as well as a common-man's life. These applications have changed tremendously from
time and the motivation for building these networks are all essentially economic and technological.

Initially, computer network was developed for defense purpose, to have a secure communication
network that can even withstand a nuclear attack. After a decade or so, companies, in various fields,
started using computer networks for keeping track of inventories, monitor productivity,
communication between their different branches offices located at different locations. For example,
Railways started using computer networks by connecting their nationwide reservation counters to
provide the facility of reservation and enquiry from anywhere across the country.

And now after almost two decades, computer networks have entered a new dimension; they are now
an integral part of the society and people. In 1990s, computer network started delivering services to
private individuals at home. These services and motivation for using them are quite different. Some
of the services are access to remote information, person-person communication, and interactive
entertainment. So, some of the applications of computer networks that we can see around us today
are as follows:

Marketing and sales: Computer networks are used extensively in both marketing and sales
organizations. Marketing professionals use them to collect, exchange, and analyze data related to
customer needs and product development cycles. Sales application includes teleshopping, which uses
order-entry computers or telephones connected to order processing network, and online-reservation
services for hotels, airlines and so on.
Financial services: Today's financial services are totally depended on computer networks.
Application includes credit history searches, foreign exchange and investment services, and
electronic fund transfer, which allow user to transfer money without going into a bank (an automated
teller machine is an example of electronic fund transfer, automatic pay-check is another).

Manufacturing: Computer networks are used in many aspects of manufacturing including


manufacturing process itself. Two of them that use network to provide essential services are
computer-aided design (CAD) and computer-assisted manufacturing (CAM), both of which allow
multiple users to work on a project simultaneously.

Directory services: Directory services allow list of files to be stored in central location to speed
worldwide search operations.

Information services: A Network information service includes bulletin boards and data banks. A
World Wide Web site offering technical specification for a new product is an information service.

Electronic data interchange (EDI): EDI allows business information, including documents such as
purchase orders and invoices, to be transferred without using paper.

Electronic mail: probably it's the most widely used computer network application.

Teleconferencing: Teleconferencing allows conference to occur without the participants being in the
same place. Applications include simple text conferencing (where participants communicate through
their normal keyboards and monitor) and video conferencing where participants can even see as well
as talk to other fellow participants. Different types of equipment’s are used for video conferencing
depending on what quality of the motion you want to capture (whether you want just to see the face
of other fellow participants or do you want to see the exact facial expression).

Voice over IP: Computer networks are also used to provide voice communication. This kind of voice
communication is pretty cheap as compared to the normal telephonic conversation.

Video on demand: Future services provided by the cable television networks may include video on
request where a person can request for a particular movie or any clip at any time he wish to see.

Summary: The main area of applications can be broadly classified into following categories:

Scientific and Technical Computing

Client Server Model, Distributed Processing, Parallel Processing, Communication Media


Commercial

Advertisement, Telemarketing, Teleconferencing

Worldwide Financial Services

Network for the People (this is the most widely used application nowadays)

Telemedicine, Distance Education, Access to Remote Information, Person-to-Person


Communication, Interactive Entertainment.

Intranet
An intranet is a computer network for sharing information, collaboration tools, operational
systems, and other computing services within an organization, usually to the exclusion of access by
outsiders. The term is used in contrast to public networks, such as the Internet, but uses most of the same
technology based on the Internet Protocol Suite

Network Design
Computer networks also differ in their design. The two basic forms of network design are called
client/server and peer-to-peer . Client-server networks feature centralized server computers that
store email, Web pages, files and or applications. On a peer-to-peer network, conversely, all
computers tend to support the same functions. Client-server networks are much more common in
business and peer-to-peer networks much more common in homes.
MODULE FIVE
NETWORKING TOPOLOGY
Network topology is the way a network is arranged, including the physical or logical description of
how links and nodes are set up to relate to each other. Physical topology is determined by the capabilities
of the network access devices and media while logical topology describes the way that the data passes
through the network from one device to the next without regard to the physical interconnection of the
devices.
Below are examples of network topology
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is connected
to sending end of the other and vice-versa.
Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus topology may have
problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses
CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple
forms of networking where a failure of a device does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon
as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-to-
point connection. That is, there exists a point to point connection between hosts and hub.

As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other
hosts fails. Every communication between hosts, takes place through only the hub. Star topology is not
expensive as to connect one more host, only one cable is required and configuration is simple.

Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not adjacent
to it, the data travels through all intermediate hosts. To connect one more host in the existing structure,
the administrator may need only one more extra cable.

Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a point of
failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-point
connection to few hosts only.

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point links.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in
use presently. This topology imitates as extended Star topology and inherits properties of bus topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network
is bifurcated into three types of network devices. The lowermost is access-layer where computers are
attached. The middle layer is known as distribution layer, which works as mediator between upper layer
and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root
of the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them. Similar to the Bus topology, if the
root goes down, then the entire network suffers, even though it is not the single point of failure. Every
connection serves as point of failure, failing of which divides the network into unreachable segment.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.

The above picture represents an arbitrarily hybrid topology. The combining topologies may contain
attributes of point to point, Star, Ring, Bus and topologies.
Advantages and Disadvantages of Network Topologies

Topology Advantages Disadvantages

Bus Easy to install. Difficult to move and change.


Is relatively in expensive. Break in bus disables entire network.
Uses less cable than other topologies. Is difficult to troubleshoot.
Star New stations can be added easily and quickly. More expensive than bus.
A single cable failure won’t bring down the entire network. It has a single point of failure, the hub.
Less cabling. The privacy and security are not secured.
It is less expensive.
Ring Easy to install. It is difficult to reconfigure.
Ring topology is relatively easy to troubleshoot. Not fault tolerant.
When a cable fault it stops receiving data from its upstream Very expensive.
neighbor.
Mesh Simplest. Reconfiguration extremely difficult.
Most fault tolerant. Extremely expensive.
Very complex.
MODULE SIX
NETWORK MEDIA
The transmission media is nothing but the physical media over which communication takes place
in computer networks.
Twisted Pair Cable
A twisted pair cable is made of two plastic insulated copper wires twisted together to form a single
media. Out of these two wires, only one carries actual signal and another is used for ground reference.
The twists between wires are helpful in reducing noise (electro-magnetic interference) and crosstalk.

There are two types of twisted pair cables:


 Shielded Twisted Pair (STP) Cable
 Unshielded Twisted Pair (UTP) Cable
STP cables comes with twisted wire pair covered in metal foil. This makes it more indifferent to
noise and crosstalk.
UTP has seven categories, each suitable for specific use. In computer networks, Cat-5, Cat-5e, and
Cat-6 cables are mostly used. UTP cables are connected by RJ45 connectors.
Coaxial Cable
Coaxial cable has two wires of copper. The core wire lies in the center and it is made of solid conductor.
The core is enclosed in an insulating sheath. The second wire is wrapped around over the sheath and
that too in turn encased by insulator sheath. This all is covered by plastic cover.

Because of its structure, the coax cable is capable of carrying high frequency signals than that of twisted
pair cable. The wrapped structure provides it a good shield against noise and cross talk. Coaxial cables
provide high bandwidth rates of up to 450 m
There are three categories of coax cables namely, RG-59 (Cable TV), RG-58 (Thin Ethernet),and RG-
11 (Thick Ethernet). RG stands for Radio Government.
Cables are connected using BNC connector and BNC-T. BNC terminator is used to terminate the wire
at the far ends.
Fiber Optics
Fiber Optic works on the properties of light. When light ray hits at critical angle it tends to refracts
at 90 degree. This property has been used in fiber optic. The core of fiber optic cable is madeof high
quality glass or plastic. From one end of it light is emitted, it travels through it and at the other end light
detector detects light stream and converts it to electric data.
Fiber Optic provides the highest mode of speed. It comes in two modes, one is single mode fiber and
second is multimode fiber. Single mode fiber can carry a single ray of light whereas multimode is capable
of carrying multiple beams of light.

Fiber Optic also comes in unidirectional and bidirectional capabilities. To connect and access fiber optic
special type of connectors are used. These can be Subscriber Channel (SC), Straight Tip(ST), or MT-RJ.

120 | P a g
e
MODULE SEVEN
NETWORK PROTOCOLS
What Is a Protocol?
A protocol is a set of rule that governs the communication between computers on a network. This
rule includes guide lines that regulate the following characteristics of a network: access method,
allowed physical topologies, types of cabling, and data transfer.

Human beings often seek to send and receive a variety of messages using computer applications; these
applications require services to be provided by the network. Some of these services include the World Wide
Web, e-mail, instant messaging, and IP Telephony. Devices interconnected by medium to provide services
must be governed by rules, or protocols. In the chart, some common services and a protocol most directly
associated with that service are listed.

The most common protocols are:


 Ethernet
 Local Talk
 Token Ring
 FDDI
 ATM

ETHERNET
The Ethernet protocol is by far the most widely used. Ethernet uses an access method called
CSMA/CD (carrier sense Multiple Access/collision Detection). This is a system where each
computer listens to the cable before sending anything through the network. If the network is clear,
the computer will transmit. If some other node is already transmitting on the cable, the computer will
wait and try again when the line is clear. Sometimes, two computers attempt to transmit at the same
instant. When this happens collision occurs. Each computer then back off and waits a random amount
121 | P a g
e
of time before attempting to transmit. With this access method it is normal to have collisions.
However, the delay caused by collisions and transmitting is very small and does not normally affect
the speed on the network.

The Ethernet protocol allows for linear bus, star topologies. Data can be transmitted over wireless
access points, twisted pair, coaxial, or fiber optic cable at a speed of 10 Mbps up to 1000 Mbps.

LOCAL TALK

Local Talk is a network protocol that was developed by Apple Computer, Inc. For Macintosh
computers. The method used by Local Talk is called CSMA/CA (carrier Sense Multiple Access with
Collision Avoidance). It is similar to CSMACD except that a computer signals its intent to transmit
before it actually does so. Local Talk adapters and special twisted pair cable can be used to connect
a series of computers through the serial port. The Macintosh operating system allows the
establishment of a peer-to peer network without the need for additional software. With the addition
of the server version of Apple share software, a client/server network can be established.

The Local Talk protocol allows for linear bus, star topologies using twisted pair cable. A primary
disadvantage of Local Talk protocol is speed. Its speed of transmission is only 230 Kbps.

TOKEN RING

The Token Ring protocol was developed by IBM in the mid- 1980s. The access method used involves
token-passing. In Token Ring, the computers are connected so that the signal travels around the
network from one computer to another in a logical ring. A single electronic token moves around the
ring from one computer to the next. If a computer does not have information to transmit, it simply
passes the toke on to next work station. If a computer wishes transmit and empty token, it attaches
data to the token. The token then proceeds around the ring until it comes to the computer for which
the data is meant. At this point, the data is captured by the receiving computer. The token Ring
protocol requires a star-wired ring using twisted pair or fiber optic cable. It can operate at
transmission speeds of 4 Mbps or 16 Mbps. Due to the increasing popularity of Ethernet, the use of
Token Ring in school environments has decreased.

FDDI

Fiber Distributed Data Interface (FDDI) is a network protocol that is used primarily to interconnect
two or more local area networks, often over large distances. The access method used by FDDI
involves token-passing. FDDI uses a dual ring physical topology. Transmission normally occurs on
one of the rings, however, if a break occurs, the system keeps information moving by automatically
using portions of the second ring to create a new complete ring. A major advantage of FDDI is speed.
It operates over fiber optic cable at 100 Mbps
122 | P a g
e
ATM

Asynchronous Transfer Mode (ATM) is a network protocol that transmits data at a speed of 155
Mbps and higher. ATM works by transmitting all data in small packets of a fixed size, whereas, other
protocols transfer variable length packets. ATM supports a variety of media such as videos, CD-
quality audio, and imaging. ATM employs a star topology, which can work with fiber optic as well
as twisted pair cable.

ATM is most often used to interconnect two or local area networks, it also frequently used by internet
service providers to utilized high speed access to the internet for their clients. As ATM technology
becomes more cost-effective, it will provide another solution for constructing faster local area
networks.

Protocol Summary
Protocol Cable Speed Topology
Ethernet Twisted Pair, Coaxial, Fiber 10 Mps Linear Bus, Star
Fast Ethernet Twisted Pair, Fiber 100 Mps Star
Local Talk Twisted Pair 23 Mps Linear Bus or Star
Token Ring Twisted Pair 4 16Mps Star Wired Ring
FDDI Fiber 100 Mps Dual ring
ATM Twisted Pair, Fiber 155288 Mps Linear Bus, Star

NETWORK TOOLS:
Network tools are the equipment use in setting up a network, it can be programs or hardware (physical
component). Among the tools we have punch tool, crimping tools, Rj-45, cable tester etc.

123 | P a g
e
MODULE EIGHT
NETWORK DEVICES

They are devices that aids connections and communication. The common network devices are;

a. Hub

b. Network Interface card

c. Switch

d. Router

e. Modem

f. Bridge

g. ISP

a. HUB: Hub is a device that connect all the other devices in a star network together. Every device in the
network connect directly to the hub through a single cable. The hub receives a message from a device and
broadcast it to all the other devices in the network and monitor it
For collision to the destination, the hub is not able to identify the device that own the message (this is
the reason why people say the hub is not intelligent).

124 | P a g
e
b. MODEM: Modem is an acronym for modulator/demodulator, it is a device that can convert a digital data
to an analog data and vice-verse. Example is a voice band modems that turn the digital data of a personal
computer into modulated electrical signal in the voice frequency range of a telephone channels.

c. SWITCH: Switch is a device that channel incoming data from any of network device to the specific device
that is the destination of the data. Unlike the hub, the switch is intelligent because it does not broadcast
but channels the data to the specific destination.

125 | P a g
e
d. BRIDGE: Bridge is a device that connect two similar network together. Example is a bridge will
connect/join two ring network together or two star network together. It could connect many similar
network together.

126 | P a g
e
e. ROUTER: Router is a network devices that connect two or more dissimilar network together. Example is
a router can connect a ring network with a star network, a wireless network and a cable network, a LAN
with a WAN etc.

19 | P a g e
f. NETWORK INTERFACE CARD (NIC): Network Interface Card is also known as a network interface
controller, network adapter, and LAN adapter and by similar terms is a computer hardware component
that connect a computer to a computer network.

INTERNET SERVICE PROVIDER (ISP)


An internet service provider (ISP) is an organization that provides access to the internet. For
monthly fee the service provider usually provide a software package, username, password and
access phone number. Equipped with a modem you can than logon to the internet and browse the
World Wide Web and USENET and send and receive e-mail. For broadband access you typically
receive the broadband modem hardware or pay a monthly fee for this equipment that is added to
your ISP account billing.

29 | P a g e
MODULE NINE
MULTIPLEXING

Multiplexing is a technique by which different analog and digital streams of transmission can be
simultaneously processed over a shared link. Multiplexing divides the high capacity medium into low
capacity logical medium which is then shared by different streams.
Communication is possible over the air (radio frequency), using a physical media (cable), and light (optical
fiber). All mediums are capable of multiplexing.
When multiple senders try to send over a single medium, a device called Multiplexer divides the physical
channel and allocates one to each. On the other end of communication, a De-multiplexer receives data
from a single medium, identifies each, and sends to different receivers.
Frequency Division Multiplexing (FDM)
When the carrier is frequency, FDM is used. FDM is an analog technology. FDM divides the
spectrum or carrier bandwidth in logical channels and allocates one user to each channel. Each user can
use the channel frequency independently and has exclusive access of it. All channels are divided in such
a way that they do not overlap with each other. Channels are separated by guard bands. Guard band is
a frequency which is not used by either channel.

Time Division Multiplexing (TDM)


TDM is applied primarily on digital signals but can be applied on analog signals as well. In TDM the
shared channel is divided among its user by means of time slot. Each user can transmit data within the
provided time slot only. Digital signals are divided in frames, equivalent to time slot i.e. frame of an
optimal size which can be transmitted in given time slot.
TDM works in synchronized mode. Both ends, i.e. Multiplexer and De-multiplexer are timely
synchronized and both switch to next channel simultaneously.

When channel A transmits its frame at one end, the De-multiplexer provides media to channel A
on the other end. As soon as the channel A’s time slot expires, this side switches to channel B. On the other
end, the De-multiplexer works in a synchronized manner and provides media to channel B. Signals from
different channels travel the path in interleaved manner.

39 | P a g e
Wavelength Division Multiplexing (WDM)
Light has different wavelength (colors). In fiber optic mode, multiple optical carrier signals are
multiplexed into an optical fiber by using different wavelengths. This is an analog multiplexing technique
and is done conceptually in the same manner as FDM but uses light as signals.

Further, on each wavelength time division multiplexing can be incorporated to accommodate more
data signals.
Code Division Multiplexing (CDM)
Multiple data signals can be transmitted over a single frequency by using Code Division
Multiplexing. FDM divides the frequency in smaller channels but CDM allows its users to full bandwidth
and transmit signals all the time using a unique code. CDM uses orthogonal codes to spread signals.
Each station is assigned with a unique code, called chip. Signals travel with these codes independently,
inside the whole bandwidth. The receiver knows in advance the chip code signal it has to

49 | P a g e
59 | P a g e

You might also like