Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

lOMoARcPSD|38271051

HCS135 Introduction to Information Technology Unit 4


Lecture Notes
Applied accounting (Midlands State University)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)
lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 1 of 16 13-03-2023

LECTURE NOTES

ON

UNIT 4: COMPUTER NETWORKS

Prepared By Kundayi Chinyongo

UNIT 4: COMPUTER NETWORKS

OBJECTIVES
After going through this unit, you would be able to:
 explain the reasons for networking computers
 identify different types of networks
 Identify two (2) types of Local Area Network
 Relate star topology, mesh topology and hybrid topology to Client/server network, peer-to-peer
network and WAN respectively
 identify hardware required to set-up a computer network
 distinguish between different networks topologies
 factors to consider when selecting a network topology

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 2 of 16 13-03-2023

UNIT 4: Computer networks

1. Explain the reasons for networking computers


Networking computers is the process of connecting two or more computers together to share information
and resources. Here are some reasons why networking computers is important:
1. Resource sharing: One of the primary reasons for networking computers is to share resources such
as printers, scanners, and files. With a network, multiple users can access the same resources, which
makes collaboration easier and more efficient.
2. Internet access: A network allows all computers on the network to share a single internet
connection, which can save costs and simplify administration. With internet access, users can
communicate with each other through email, video conferencing, and instant messaging.
3. Data backup: A network can also provide a centralized location for data backup. By backing up
important data to a central server, users can ensure that their data is protected in the event of a
hardware failure or other disaster.
4. Improved security: A network can also provide improved security by allowing administrators to
control access to resources and monitor network activity. This can help prevent unauthorized access
to sensitive information and protect against cyber-attacks.
5. Remote access: A network can also provide remote access to resources, which allows users to
access files and applications from anywhere in the world as long as they have an internet
connection. This can be particularly useful for businesses with remote employees or for individuals
who need to work from home.

A NODE can be computer, printer, or any other device capable of sending or receiving the data. The
links connecting the nodes are known as communication channels.

A Computer network is a set of computers connected to share resources.

In computer networks, the computing devices exchange the data with each other by using the
connections between nodes. The data links are established over cable media such as wires or optic
cables or wireless media such as Wi-Fi.

Thus, a computer network is a digital telecommunication network which allows nodes to share the
resources. It is the group of computer systems and other computing hardware devices. Those
devices are linked together through communication channels to facilitate communication and
resource sharing among a wide range of
users.

Overall, networking computers offers a range of benefits that can make work more efficient and
productive. By allowing users to share resources, access the internet, and collaborate more effectively,
networking computers can help organizations and individuals achieve their goals more quickly and
effectively.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 3 of 16 13-03-2023

Figure 4.1: The computer network

Reasons for networking computers


 File sharing
 Resource sharing
 Sharing a single internet connection
 Increasing storage capacity
2. Types of networks
A computer network can be categorised by their size. Basically, there are four types of computer networks
as presented below:
 PAN (Personal Area Network)
 LAN (Local Area Network)- Client/server and peer-to-peer
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 4 of 16 13-03-2023

3. Personal Area Network


A Personal Area Network (PAN) is a type of computer network used for communication among devices
such as computers, smartphones, tablets, and other personal digital assistants within a short range of
typically around 10 meters or less. This may include Bluetooth enabled devices or infra-red enabled
devices. PAN has connectivity range up to 10 meters.

PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless
printers and TV remotes.

For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices
connected together in a master-slave fashion. Other technologies used for PANs include infrared (IR), near
field communication (NFC), and ZigBee.

4. Local Area Network

A Local Area Network (LAN) is a computer network that connects devices within a limited geographical
area such as a home, office building, school, or small campus.

It typically uses wired or wireless connections to allow devices such as computers, printers, and servers
to communicate with each other and share resources like Files, Applications, and Internet access.

LANs are typically owned and operated by a single organization or individual, and they can be configured
and managed in a variety of ways. They can be set up as peer-to-peer networks where all devices have
equal status and can share resources freely, or as client-server networks where one or more central devices
act as servers to provide services to other devices on the network.
In addition to providing shared access to resources, LANs can also improve efficiency and productivity by
enabling collaboration and communication between devices and users. They can also enhance security by
allowing administrators to control access to resources and monitor network activity.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 5 of 16 13-03-2023

The distinguishing features of LAN are


 Network size is limited to a small geographical area, presently to a few kilometers.
 Data transfer rate is generally high. They range from 100 Mbps to 1000 Mbps.
 In general, a LAN uses only one type of transmission medium, commonly category 5 coaxial
cables.
 A LAN is distinguished from other networks by their topologies. The common topologies are bus,
ring, mesh, and star.
 The number of computers connected to a LAN is usually restricted. In other words, LANs are
limitedly scalable.
 IEEE 802.3 or Ethernet is the most common LAN. They use a wired medium in conjuncture with a
switch or a hub. Originally, coaxial cables were used for communications. But now twisted pair
cables and fiber optic cables are also used. Ethernet’s speed has increased from 2.9 Mbps to 400
Gbps.

Wireless LANs (WLAN)

Wireless LANs (WLANs) are networks that use wireless technology to connect devices such as computers,
smartphones, and other devices to each other and to the internet. WLANs are commonly used in homes,
businesses, schools, and public places such as airports and coffee shops.

WLANs use radio waves to transmit and receive data. The radio waves are transmitted through an antenna
and picked up by a wireless adapter in the device. WLANs typically operate on the 2.4 GHz or 5 GHz
frequency band, and they can achieve speeds of up to several hundred megabits per second (Mbps) or even
gigabits per second (Gbps) in some cases.

The main advantages of WLANs include their flexibility, convenience, and ease of use. They allow users
to connect to the network without the need for cables, which makes it easy to move around and connect to
the network from anywhere within the coverage area. They also provide easy access to the internet and
other network resources.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 6 of 16 13-03-2023

However, WLANs also have some disadvantages. They can be affected by interference from other wireless
devices, such as microwaves and cordless phones, which can degrade their performance. They are also
vulnerable to security risks such as unauthorized access, interception of data, and denial-of-service attacks.
To address these issues, WLANs typically use security protocols such as WPA2 or WPA3, which encrypt
the data transmitted over the network and require authentication before allowing access to the network.

Virtual LANs (VLAN)


A Virtual LAN (VLAN) is a type of network configuration that allows multiple devices to be logically
grouped together, even if they are physically located in different areas or connected to different network
switches. VLANs are used to segment a network into smaller, more manageable parts, which can improve
network performance, security, and ease of management.
In a VLAN, devices are grouped together based on their common network requirements. For example,
devices used by a particular department in an organization can be grouped together in a VLAN, while
devices used by another department can be grouped together in a separate VLAN. Each VLAN is assigned
a unique VLAN ID, which is used to identify the VLAN and ensure that traffic is only sent to devices
within the same VLAN.
VLANs are implemented by configuring network switches to associate certain ports with specific VLANs.
This allows traffic to be separated into different VLANs based on the port on which it enters the switch.
VLANs can also be configured to span multiple switches, which allows devices to be grouped together
even if they are physically located in different areas.
The main advantages of VLANs include improved network performance, increased security, and ease of
management. By separating network traffic into smaller segments, VLANs can reduce network congestion
and improve overall network performance. They also provide enhanced security by isolating sensitive
network traffic and preventing unauthorized access to resources. Additionally, VLANs can make network
management easier by allowing network administrators to apply policies and manage network resources on
a per-VLAN basis.
However, VLANs can also have some disadvantages. They can be complex to configure and manage,
especially in larger networks. Additionally, VLANs can introduce additional overhead and complexity to
network traffic, which can affect network performance if not properly configured.
5. Metropolitan Area Network

A Metropolitan Area Network (MAN) is a type of computer network that spans a metropolitan area, such
as a city or a large campus. It typically consists of a collection of interconnected local area networks
(LANs) that are connected together using high-speed data links, such as fiber optic cables.
A MAN is designed to provide high-speed connectivity to a large number of users over a geographically
diverse area. It is often used by businesses, government organizations, and educational institutions to

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 7 of 16 13-03-2023

connect their various locations within a city or a campus. MANs are also used by internet service providers
to provide high-speed internet connectivity to their customers.
The main advantage of a MAN is its high-speed connectivity. By using high-speed data links, a MAN can
provide much faster data transfer rates than a traditional WAN. This makes it ideal for applications that
require high-bandwidth, such as video conferencing, streaming media, and online gaming.

6. Wide Area Network


As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across provinces
and even a whole country. Generally, telecommunication networks are Wide Area Network. These
networks provide connectivity to MANs and LANs. Since they are equipped with very high speed
backbone, WANs use very expensive network equipment.

WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and
Synchronous Optical Network (SONET). WAN may be managed by multiple administration.

7. Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest network in
existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and
Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day,
Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating
from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It uses WWW,
FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid
under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by
client software known as Web Browsers. When a user requests a page using some web browser located on
some Web Server anywhere in the world, the Web Server responds with the proper HTML page. The
communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
 Web sites
 E-mail

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 8 of 16 13-03-2023

 Instant Messaging
 Blogging
 Social Media
 Marketing
 Networking
 Resource Sharing
 Audio and Video Streaming

8. Hardware required to set-up a computer network

The basic computer hardware components that are needed to set up a network are as follows

Network Cables
Network cables are the transmission media to transfer data from one device to another. A commonly used
network cable is category 5 cable with RJ 45 connector, as shown in the image below:

Routers
A router is a connecting device that transfers data packets between different computer networks. Typically,
they are used to connect a PC or an organization’s LAN to a broadband internet connection. They contain
RJ-45 ports so that computers and other devices can connect with them using network cables.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 9 of 16 13-03-2023

Repeaters, Hubs, and Switches


Repeaters, hubs and switches connect network devices together so that they can function as a single
segment.
A repeater receives a signal and regenerates it before re-transmitting so that it can travel longer distances.
A hub is a multiport repeater having several input/output ports, so that input at any port is available at
every other port.
A switch receives data from a port, uses packet switching to resolve the destination device and then
forwards the data to the particular destination, rather than broadcasting it as a hub.

Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from the source network to
the destined network.

Gateways
A gateway connects entirely different networks that work upon different protocols. It is the entry and the
exit point of a network and controls access to other networks.

Network Interface Cards


NIC is a component of the computer to connect it to a network. Network cards are of two types: Internal
network cards and external network cards.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 10 of 16 13-03-2023

9. Network topologies

What is Topology?
Topology defines the structure of the network of how all the components are interconnected to each
other. There are two types of topology: physical and logical topology.
Physical topology is the geometric representation of all the nodes in a network.

 Cost − Installation cost is a very important factor in overall cost of setting up an infrastructure. So
cable lengths, distance between nodes, location of servers, etc. have to be considered when
designing a network.
 Flexibility − Topology of a network should be flexible enough to allow reconfiguration of office
set up, addition of new nodes and relocation of existing nodes.
 Reliability − Network should be designed in such a way that it has minimum down time. Failure of
one node or a segment of cabling should not render the whole network useless.
 Scalability − Network topology should be scalable, i.e. it can accommodate load of new devices
and nodes without perceptible drop in performance.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 11 of 16 13-03-2023

 Ease of installation − Network should be easy to install in terms of hardware, software and
technical personnel requirements.
 Ease of maintenance − Troubleshooting and maintenance of network should be easy.

10.Bus Topology
Data network with bus topology has a linear transmission cable, usually coaxial, to which
many network devices and workstations are attached along the length. Server is at one end of the
bus. When a workstation has to send data, it transmits packets with destination address in its
header along the bus.

In a Bus topology, there is a single communication line or cable shared by all the nodes in the
network by drop lines and taps. In the above figure, the drop line connects the nodes and the
mainline, using a tap to add another device to the main cable. When one computer sends a signal
up the cable, all the computers on the network receive the information. Still, the message is
accepted by only that computer whose address is specified in the message's address field, and the
rest of the nodes reject the message.

The data travels in both the directions along the bus. When the destination terminal sees the data, it
copies it to the local disk.
Advantages of Bus Topology
These are the advantages of using bus topology −
 Easy to install and maintain
 Can be extended easily
 Very reliable because of single transmission line
Disadvantages of Bus Topology
These are some disadvantages of using bus topology −
 Troubleshooting is difficult as there is no single point of control
 One faulty node can bring the whole network down
 Dumb terminals cannot be connected to the bus

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 12 of 16 13-03-2023

11.Ring Topology
In ring topology each terminal is connected to exactly two nodes, giving the network a circular
shape. Data travels in only one pre-determined direction.

In a ring topology, the computers are connected by a single ring-shaped cable. Unlike the bus
topology, there are no terminated ends. The signals are transmitted in the loop in one direction and
forwarded via each computer. Each computer serves as a repeater to amplify the signal and send it
to the next computer. In larger systems, several LANs can be interconnected in a ring topology.
ThickNet coaxial cables or fiber optic cables were used for this purpose.

Token passing

The method of transferring data in the ring structure is called token passing. A token is a special
sequence of bits containing control information. Owning the token allows a network device to
transfer data to the network. There is only one token in each network.
The sending computer removes the token from the ring and sends the requested data in the ring.
Each computer forwards the data until the packet finds the computer that matches the data address.
The receiving computer then sends a message that the data has been received back to the sending
computer. After verification, the sending computer creates a new token and releases it to the
network

Advantages of Ring Topology


These are the advantages of using ring topology −
 Small cable segments are needed to connect two nodes

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 13 of 16 13-03-2023

 Ideal for optical fibres as data travels in only one direction


 Very high transmission speeds possible
Disadvantages of Ring Topology
These are some the disadvantages of using ring topology −
 Failure of single node brings down the whole network
 Troubleshooting is difficult as many nodes may have to be inspected before faulty one is identified
 Difficult to remove one or more nodes while keeping the rest of the network intact

12.Star Topology
In a star topology, cable segments from each computer in the network are connected to a central
component, the so-called hub/switch.
A hub/switch is a device that connects multiple computers. In a star topology, the signals are
transmitted from the computer via the hub/switch to all computers in the network. In larger
systems, several LANs can be connected to each other using a star topology.

Advantages of Star Topology


These are the advantages of using star topology −
 Failure of one node does not affect the network
 Troubleshooting is easy as faulty node can be detected from central node immediately
 Simple access protocols required as one of the communicating nodes is always the central node
Disadvantages of Star Topology
These are the disadvantages of using star topology −
 Long cables may be required to connect each node to the server
 Failure of central node brings down the whole network

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 14 of 16 13-03-2023

13.Tree Topology
Tree topology has a group of star networks connected to a linear bus backbone cable. It
incorporates features of both star and bus topologies. Tree topology is also called hierarchical
topology. Also known as Hierarchical Topology, this is the most common form of network
topology in use presently.This topology imitates as extended Star topology and inherits properties
of bus topology.

Advantages of Tree Topology


These are some of the advantages of using tree topology −
 Existing network can be easily expanded
 Point-to-point wiring for individual segments means easier installation and maintenance
 Well suited for temporary networks
Disadvantages of Tree Topology
These are some of the disadvantages of using tree topology −
 Technical expertise required to configure and wire tree topology
 Failure of backbone cable brings down entire network
 Insecure network
 Maintenance difficult for large networks

14.Hybrid Topology
It is the combination of two or more different topologies. For example, in a college we have so many
departments, let us say one department uses ring topology and another department uses Star topology,
connecting these two topologies which results in Hybrid Topology.

Hybrid= Ring+Star

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 15 of 16 13-03-2023

Features
The features of Hybrid Topology are as follows −
 Hybrid Topology is the combination of two or more topologies.
 It inherits the advantages and disadvantages of other topologies also.
Advantages
The advantages of Hybrid topology are given below −
 It is effective and flexible.
 Troubleshooting is easy.
 Error detecting is reliable.
 It is scalable because the size can be increased easily.
Disadvantages
The disadvantages of Hybrid Topology are given below −
 Designing is difficult or complex.
 It is costly.

15.Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate devices.
But the end hosts are unaware of underlying network and see each other as if they are connected
directly.

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)


lOMoARcPSD|38271051

Lecture Notes

LN-IMS-001 Ver. 001 Page 16 of 16 13-03-2023

16.Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-point
connection to few hosts only.

Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-point
links. Mesh technology comes into two types:
 Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for
every new host n(n-1)/2 connections are required. It provides the most reliable network structure
among all network topologies.
 Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to
each other in some arbitrarily fashion. This topology exists where we need to provide reliability to
some hosts out of all.

17.Factors to consider when choosing a network


 Cost
 Flexibility
 Reliability

Downloaded by Guy-Steve Rwodzi (rwodziguysteve@gmail.com)

You might also like