Loading...

COMPUTER NETWORKING  

>

LEARNING OUTCOME 1

COMPUTER NETWORKING

Computer networking is the process of connecting two or more computing devices to exchange data and share resources.

EXPLAIN COMPUTER NETWORKS IN LINE WITH ORGANISATIONAL NEEDS

Data communications is the transfer of data between two or more devices. This can be done over a variety of media, such as copper cables, optical fibers, or even the air.

Computer networks are a collection of devices that are interconnected so that they can share data and resources. Computer networks can be small, such as a home network, or large, such as the Internet.

ADVANTAGES OF USING COMPUTER NETWORKS

  1. Resource sharing: Computer networks allow users to share resources, such as printers, scanners, and software. This can save businesses money and improve efficiency.
  2. Improved communication: Computer networks allow users to communicate with each other more easily and quickly. This can be done through email, instant messaging, video conferencing, and other applications.
  3. Increased productivity: Computer networks can help businesses to improve productivity by allowing employees to access information and resources more easily. They can also help to streamline workflow and collaboration.
  4. Enhanced decision-making: Computer networks can help businesses to make better decisions by providing access to real-time data and information. This can help businesses to identify trends, spot problems, and make better-informed decisions.
  5. Global reach: Computer networks allow businesses to reach a global audience. This can help businesses to expand their markets and grow their businesses.
  6. Cost-effectiveness: Computer networks can be a cost-effective way for businesses to communicate, collaborate, and share resources.
  7. Scalability: Computer networks can be scaled up or down to meet the needs of businesses. This makes them a flexible and adaptable solution for businesses of all sizes.
  8. Security: Computer networks can be made secure by using encryption and other security measures. This can help to protect businesses from data breaches and other security threats.
  9. Ease of use: Computer networks are relatively easy to use. This makes them a good option for businesses that do not have a lot of technical expertise.
  10. Innovation: Computer networks can help businesses to innovate by providing access to new technologies and applications. This can help businesses to stay ahead of the competition.

DISADVANTAGES OF USING COMPUTER NETWORKS

  1. Security risks: Computer networks are vulnerable to security risks, such as hacking, malware, and data breaches. This can lead to the loss of sensitive data and financial losses.
  2. Dependence on technology: Computer networks are dependent on technology. This means that if the network fails, businesses can lose access to important information and resources.
  3. Complexity: Computer networks can be complex to manage and maintain. This can require businesses to invest in training and resources.
  4. Cost: Computer networks can be expensive to set up and maintain. This can be a barrier for businesses with limited budgets.
  5. Downtime: Computer networks can experience downtime. This can disrupt business operations and lead to lost productivity.
  6. Privacy concerns: Computer networks can raise privacy concerns. This is because data that is transmitted over the network can be intercepted by unauthorized individuals.
  7. Bandwidth limitations: Computer networks have bandwidth limitations. This means that the amount of data that can be transferred over the network is limited. This can impact the performance of applications and services that rely on the network.
  8. Technical support: Computer networks require technical support. This can be a challenge for businesses that do not have the in-house expertise to manage and maintain the network.
  9. Compliance requirements: Computer networks must comply with a variety of regulations, such as data protection laws. This can be a challenge for businesses that need to ensure that their networks are compliant.
  10. Obsolescence: Computer networks can become obsolete. This means that businesses may need to upgrade their networks to keep up with the latest technologies.

ANALOG SIGNALS

Analog signals are used to transmit data over physical media such as copper wires and coaxial cables. Analog signals are continuous in time and amplitude, meaning that the signal can take on any value within a certain range. They are typically transmitted using a technique called modulation.

Modulation is the process of combining an analog signal with a high-frequency carrier signal. The carrier signal is a pure sine wave that is used to transport the analog signal over the physical medium. Once the analog signal has been modulated, it can be transmitted over the physical medium to the receiving device. The receiving device demodulates the signal to recover the original analog signal.

Analog signals are used in a number of different computer networking applications, including:

Analog signals are also used in a number of different computer networking components, such as:

ADVANTAGES AND DISADVANTAGES OF ANALOG SIGNALS IN COMPUTER NETWORKING

Analog signals have a number of advantages over digital signals in computer networking, including:

However, analog signals also have a number of disadvantages over digital signals in computer networking, including:

DIGITAL SIGNALS

Digital signals are signals that represent data as a sequence of discrete values. At any given time, a digital signal can only take on one of a finite number of values. This contrasts with analog signals, which can represent any value within a continuous range of values.

Digital signals are used in a wide variety of applications, including:

ADVANTAGES AND DISADVANTAGES OF DIGITAL SIGNALS

Digital signals have a number of advantages over analog signals, including:

However, digital signals also have some disadvantages, including:

DIGITAL SIGNALS IN COMPUTER NETWORKING

Digital signals are used in a wide variety of computer networking applications, including:

Digital signals are also used in a number of different computer networking components, such as:

Differences between Analogue and Digital Signals

ANALOGUE DIGITAL
  • Analogue signals are continuous signals that represent physical measurements.
  • They are denoted by sine waves.
  • They use a continuous range of values to represent information.
  • They are time-varying and can be processed and transmitted better.
  • They are more susceptible to electronic noise and distortion, which can degrade the quality of the signal.
  • Digital signals are discrete signals that represent data as a sequence of separate values at any point in time.
  • They are denoted by square waves.
  • They use discrete values (0 and 1) to represent information.
  • They are represented as square waves or clock signals.
  • They are less susceptible to noise compared to analog signals.

APPLICATIONS OF COMPUTER NETWORKING

ILLUSTRATED NETWORK TYPES AND DESIGNS

DISCUSS NETWORK TYPES AND TOPOLOGIES

NETWORK TYPES

Personal Area Network (PAN):

Personal Area Network

A personal area network (PAN) is a computer network for interconnecting electronic devices within an individual person's workspace. PANs are typically small networks that connect devices within a few feet of each other. PANs can be either wired or wireless.

Some examples of PANs include:

PANs are used for a variety of purposes, including:

PANs can be used to improve productivity, convenience, and safety. For example, a wireless mouse and keyboard can make it easier to use a laptop. A fitness tracker can help people stay motivated to exercise. A smart home system can help people save energy and improve security.

Here are some specific examples of how PANs are used in the real world:

1. Local Area Network (LAN):

Local Area Network

A local area network (LAN) is a computer network that interconnects computers and peripheral devices within a limited geographic area such as a residence, school, laboratory, university campus or office building. By contrast, a wide area network (WAN) not only covers a larger geographic distance, but also generally involves leased telecommunication circuits.

Some examples of LANs include:

LANs are used for a variety of purposes, including:

Here are some specific examples of how LANs are used in the real world:

Benefits of using a LAN

There are many benefits to using a LAN, including:

2. Wireless Local Area Network (WLAN)

A WLAN is a type of LAN that uses wireless technology to connect devices. WLANs are commonly used in homes, offices, and public places such as airports and coffee shops.

3. Campus Area Network (CAN):

Campus Area Network

A campus area network (CAN) is a computer network that interconnects multiple local area networks (LANs) within a limited geographic area such as a college or university campus, corporate campus, or hospital campus. CANs are typically larger than LANs but smaller than metropolitan area networks (MANs) and wide area networks (WANs).

Examples of CANs

Uses of CANs

Real-World Examples of CANs

  1. A student at a university uses the CAN to access the school's library database and print out a research paper.
  2. A group of employees at a corporate campus use the CAN to share files and collaborate on a project.
  3. A doctor at a hospital uses the CAN to access a patient's medical records and consult with other doctors about the patient's care.
  4. CANs are an essential part of modern education and healthcare. They offer a number of benefits that can help organizations to improve efficiency, productivity, and security.

Metropolitan Area Network (MAN)

A metropolitan area network (MAN) is a computer network that interconnects users with computer resources in a geographic region of the size of a metropolitan area. This could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).

Examples of MANs

Uses of MANs

Real-World Examples of MANs

Wide Area Network (WAN)

A wide area network (WAN) is a computer network that connects two or more local area networks (LANs) across a large geographic area. WANs can span cities, countries, or even the entire world.

Examples of WANs

Uses of WANs

Real-World Examples of WANs

WANs are an essential part of the modern world. They allow organizations to connect their employees, students, and citizens to the resources they need across a large geographic area.

NETWORK TOPOLOGIES

Network topology refers to the physical or logical arrangement of nodes and connections in a network.

NEtwork Topologies

Point to Point (P2P)

Point-to-point topology is the easiest of all the network topologies. In this method, the network consists of a direct link between two computers.

Point to Point Topologies

Advantages

Disadvantages

Bus Topology

Bus Topology

Bus topology uses a single cable which connects all the included nodes. The main cable acts as a spine for the entire network. One of the computers in the network acts as the computer server. When it has two endpoints, it is known as a linear bus topology.

Advantages

Disadvantages

Ring Topology

Ring Topology

In a ring network, every device has exactly two neighboring devices for communication purposes. It is called a ring topology as its formation is like a ring. In this topology, every computer is connected to another computer. Here, the last node is combined with the first one. This topology uses a token to pass the information from one computer to another. In this topology, all the messages travel through a ring in the same direction.

Advantages

Disadvantages

Star Topology

Point to Point Topologies

In the star topology, all the computers connect with the help of a hub. This cable is called a central node, and all other nodes are connected using this central node. It is most popular on LAN networks as they are inexpensive and easy to install.

Advantages

Disadvantages

Mesh Topology

Point to Point Topologies

The mesh topology has a unique network design in which each computer on the network connects to every other. It develops a P2P (point-to-point) connection between all the devices of the network. It offers a high level of redundancy, so even if one network cable fails, still data has an alternative path to reach its destination.

Types of Mesh Topology

Advantages

Disadvantages

Tree Topology

Tree Topologies

Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates various star topologies together in a single bus, so it is known as a Star Bus topology. Tree topology is a very common network which is similar to a bus and star topology.

Advantages

Disadvantages

Hybrid Topology

HybridTopologies

Hybrid topology combines two or more topologies. You can see in the above architecture in such a manner that the resulting network does not exhibit one of the standard topologies. For example, as you can see in the above image that in an office in one department, Star and P2P topology is used. A hybrid topology is always produced when two different basic network topologies are connected.

Advantages

Disadvantages

IDENTIFY APPROPRIATE NETWORKING EQUIPMENT

Transmission media refers to the physical paths through which data is transmitted from one location to another. There are different types of transmission media, each with its own characteristics, advantages, and limitations. Here are some of the most common types of transmission media:

Twisted Pair Cable:

Twisted Cable

Twisted pair cable is a type of copper cable that is used for telecommunications and computer networking. It consists of two insulated copper wires that are twisted together around a central core. The twisting of the wires helps to reduce electromagnetic interference (EMI) and crosstalk, which can improve the quality of the signal.

Twisted pair cable is the most common type of cable used for computer networks. It is relatively inexpensive and easy to install. It is also available in a variety of speeds and bandwidths, making it suitable for a wide range of applications.

Advantages of Twisted Pair Cable:

Disadvantages of Twisted Pair Cable:

Unshielded twisted pair (UTP) is the most common type of twisted pair cable. It is used in a wide range of applications, including telephone networks, computer networks, and security systems.

Shielded twisted pair (STP) is a type of twisted pair cable that is shielded to reduce noise and interference. It is typically used in noisy environments, such as factories and warehouses.

STP is more expensive than UTP, but it offers better performance and reliability. It is also more secure than UTP, as it is more difficult to tap or intercept.

Twisted pair cable is a versatile and reliable type of network cabling. It is suitable for a wide range of applications, from small home networks to large enterprise networks.

Coaxial Cable:

Coaxial Cable Coaxial Cable diagram

Coaxial cable is a type of cable that consists of a central copper conductor surrounded by a layer of insulation and a braided metal shield. The shield helps to reduce electromagnetic interference (EMI) and crosstalk, which can improve the quality of the signal.

Coaxial cable was once the most common type of cable used for computer networks, but it has been largely replaced by twisted pair cable in recent years. However, coaxial cable is still used in some applications, such as cable television and satellite TV.

Advantages of Coaxial Cable:

1. High bandwidth: Coaxial cable can support high bandwidth, making it suitable for demanding applications such as video streaming and high-speed internet access.
2. Low signal loss: Coaxial cable has low signal loss, which means that it can transmit signals over long distances without significant degradation.
3. Durable: Coaxial cable is durable and can withstand a lot of wear and tear.
4. Easy to install: Coaxial cable is relatively easy to install and terminate.
5. Widely available: Coaxial cable is widely available from a variety of vendors.
6. Supported by a wide range of devices: Coaxial cable is supported by a wide range of devices, including cable TV modems, satellite TV receivers, and high-speed internet modems.
7. Relatively inexpensive: Coaxial cable is relatively inexpensive, especially compared to fiber optic cable.
8. Resistant to moisture and corrosion: Coaxial cable is resistant to moisture and corrosion, making it suitable for outdoor use.

Disadvantages of Coaxial Cable:

1. Susceptible to bending and kinking: Coaxial cable is susceptible to bending and kinking, which can damage the cable and reduce its performance.
2. Requires special connectors: Coaxial cable requires special connectors to terminate the ends of the cable.
3. Not as flexible as twisted pair cable: Coaxial cable is not as flexible as twisted pair cable, making it more difficult to route through tight spaces.
4. Can be difficult to troubleshoot: Coaxial cable can be difficult to troubleshoot, especially if it is installed in a complex network.
5. Not as secure as fiber optic cable: Coaxial cable is not as secure as fiber optic cable, as it can be tapped or intercepted more easily.
6. Can be difficult to install in some locations: Coaxial cable can be difficult to install in some locations, such as underground or underwater.

Fiber Optic Cable

Fibre Optic Cable

Fiber optic cable is a type of cable that uses light to transmit data. It consists of a thin core of glass or plastic that is surrounded by a cladding. The cladding helps to reflect the light back into the core, which allows the light to travel over long distances without attenuation.

Fiber optic cable is the fastest and most reliable type of network cabling available. It is used in a wide range of applications, including telecommunications networks, data centers, and enterprise networks.

Advantages of Fiber Optic Cable:

1. Extremely high bandwidth: Fiber optic cable can support extremely high bandwidth, making it suitable for demanding applications such as video streaming, high-speed internet access, and cloud computing.
2. Low signal loss: Fiber optic cable has very low signal loss, which means that it can transmit signals over very long distances without significant degradation.
3. Immune to EMI and crosstalk: Fiber optic cable is immune to electromagnetic interference (EMI) and crosstalk, which can improve the quality and reliability of the signal.
4. Secure: Fiber optic cable is very difficult to tap or intercept, making it a secure choice for transmitting sensitive data.
5. Durable: Fiber optic cable is durable and can withstand a lot of wear and tear.
6. Lightweight and flexible: Fiber optic cable is lightweight and flexible, making it easy to install and route.

Disadvantages of Fiber Optic Cable:

1. Expensive: Fiber optic cable is more expensive than other types of network cabling, such as twisted pair cable and coaxial cable.
2. Requires special connectors and tools: Fiber optic cable requires special connectors and tools to terminate the ends of the cable.
3. Difficult to troubleshoot: Fiber optic cable can be difficult to troubleshoot, especially if it is installed in a complex network.
4. Susceptible to physical damage: Fiber optic cable is susceptible to physical damage, such as cuts and breaks.

Wireless Transmission

Wireless Connection

Wireless transmission is the transmission of data without the use of physical wires or cables. It is used in a wide range of applications, including computer networks, telecommunications networks, and consumer electronics.

Advantages of Wireless Transmission

Disadvantages of Wireless Transmission

Examples of Wireless Transmission

Connectivity Devices

Connectivity devices are hardware devices that are used to connect different parts of a network together. They are essential for ensuring that data is transmitted efficiently and securely across the network. Here are some of the most common connectivity devices:

1. Firewall:

Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It acts as a barrier between a trusted internal network and an untrusted external network, such as the internet. Firewalls can be implemented in hardware, software, or a combination of both.

Hardware firewalls are physical devices that sit between the internal network and the internet. They typically have multiple ports that are used to connect to different networks. Hardware firewalls are typically more expensive than software firewalls, but they offer better performance and security.

Software firewalls are programs that are installed on individual computers or servers. They typically use a combination of packet filtering and stateful inspection to monitor and control network traffic. Software firewalls are less expensive than hardware firewalls, but they can have a negative impact on the performance of the computer or server that they are installed on.

Both hardware and software firewalls can be configured to allow or block specific types of traffic, such as web traffic, email traffic, and file transfer traffic. Firewalls can also be used to create VPNs (virtual private networks) that allow users to securely access resources on a remote network.

Here are some examples of how firewalls can be used to protect a network:

2. Router:

Router

A router is a network device that connects two or more computer networks. It forwards data packets between networks based on their IP addresses. Routers are used in a wide variety of networks, from small home networks to large enterprise networks.

Operation

Routers operate at the network layer (layer 3) of the OSI model. The network layer is responsible for routing packets between different networks. Routers use a variety of routing protocols to determine the best path to forward packets to their destination.

Main Functions of a Router

Routers are essential devices for any network that connects to the internet. They provide a number of important functions, including routing packets, NAT, DHCP, and firewall protection.

Examples of Router Usage

3. Network Switch

Network Switch

A network switch is a networking device that connects multiple devices on a computer network. Switches operate at the data link layer (layer 2) of the OSI model. The data link layer is responsible for transmitting and receiving data frames between devices on the same network.

Switches work by maintaining a MAC address table. The MAC address table is a database that maps MAC addresses to ports on the switch. When a switch receives a frame, it looks up the MAC address of the destination device in the MAC address table. If the destination device is connected to the switch, the switch forwards the frame to the appropriate port. If the destination device is not connected to the switch, the switch broadcasts the frame to all of its ports.

Main Functions of a Network Switch

Switches are used in a wide variety of networks, from small home networks to large enterprise networks. They are an essential part of most modern networks.

Examples of Network Switch Usage

A switch is a device that connects multiple devices together within a network and directs data traffic between them. It is used to provide high-speed connectivity between devices within a network.

4. A Network Hub

NEtwork Hub

A network hub is a networking device that connects multiple devices on a computer network. It works at the physical layer (layer 1) of the OSI model. The physical layer is responsible for transmitting and receiving raw bits of data over a physical medium such as a copper cable or fiber optic cable.

Functionality

When a hub receives data from one device, it forwards the data to all of the other devices connected to the hub. This means that all devices on a hub share the same bandwidth.

Advantages and Disadvantages

Hubs are relatively inexpensive and easy to install. However, they are not as efficient as switches because they can cause collisions. Collisions occur when two devices try to transmit data at the same time.

Current Usage

Hubs are not used as much as they once were because switches offer better performance and are more affordable. However, hubs are still used in some applications, such as small home networks and legacy networks.

Examples of Network Hubs Usage

Bridge

Network Bridge

A bridge is a network device that connects two or more network segments.

It operates at the data link layer (layer 2) of the OSI model. The data link layer is responsible for transmitting and receiving data frames between devices on the same network.

How Bridges Work

Bridges work by filtering and forwarding frames based on their MAC addresses. When a bridge receives a frame, it looks up the MAC address of the destination device in its forwarding table. If the destination device is on the same network segment as the bridge, the bridge drops the frame. If the destination device is on a different network segment, the bridge forwards the frame to the appropriate network segment.

Benefits of Using Bridges

6. Modem:

Picture of a Modem

A modem is a device that converts digital signals from a computer into analog signals that can be transmitted over a telephone line or cable TV line. It also converts analog signals received over a telephone line or cable TV line into digital signals that can be understood by a computer.

Modem Operation

Modems operate at the physical layer (layer 1) of the OSI model. The physical layer is responsible for transmitting and receiving raw bits of data over a physical medium such as a copper cable or fiber optic cable.

Types of Modems

There are two main types of modems:

Current Usage

Broadband modems are the most common type of modem used today. They offer speeds that are fast enough for most home and business needs.

A Wireless Access Point (AP)

AP AP

A wireless access point (AP) is a networking device that connects wireless devices to a wired network. It works by converting the digital signals from the wired network into radio waves that can be transmitted to wireless devices. Wireless APs are typically used in homes, businesses, and other locations where wireless internet access is needed.

Operation of Wireless APs

Wireless APs operate at the data link layer (layer 2) of the OSI model. The data link layer is responsible for transmitting and receiving data frames between devices on the same network.

Uses of Wireless APs

Importance of Wireless APs

Wireless APs are an essential part of many modern networks. They allow us to connect to the internet and to each other from anywhere in a building or even a large campus.

Media Converter

Media converter

A Media Converter

A media converter is a networking device that converts one type of network media to another. For example, it can convert copper cable to fiber optic cable, or vice versa. Media converters are used to extend the reach of a network, or to connect networks that use different types of media.

Operation

Media converters operate at the physical layer (layer 1) of the OSI model. The physical layer is responsible for transmitting and receiving raw bits of data over a physical medium such as a copper cable or fiber optic cable.

Typical Scenarios for Media Converters

A Wireless Range Extender

Wireless Range extender

A wireless range extender, also known as a Wi-Fi extender, is a device that amplifies and retransmits a Wi-Fi signal, extending its range. This can be useful for homes or businesses with large areas, or for homes or businesses with thick walls or other obstacles that can interfere with Wi-Fi signals.

How Wireless Range Extenders Work

Wireless range extenders work by connecting to an existing Wi-Fi network and creating a new Wi-Fi network with the same name and password. This allows devices to connect to the Wi-Fi network that has the strongest signal, whether it is the original network or the extender's network.

Key Features

A Voice over Internet Protocol (VoIP) Endpoint

A Voice over Internet Protocol (VoIP) endpoint is a device that allows users to make and receive voice calls over the internet. VoIP endpoints can be used in a variety of settings, including homes, businesses, and call centers.

Types of VoIP Endpoints

VoIP endpoints use a variety of technologies to transmit voice calls over the internet. The most common technology is Session Initiation Protocol (SIP). SIP is a signaling protocol that allows devices to establish and manage VoIP calls.

Advantages of VoIP Endpoints

Network Operating Systems

A Network Operating System (NOS) is a specialized operating system for a network device such as a router, switch, or firewall. It is designed to enable workstations and other hardware connected on a local network. Network operating systems exist in contrast with traditional operating systems that are designed for individual machines without network capabilities in mind.

The main advantage of a network operating system is that it allows workstations easy access to other machines on the network for the purposes of file and application sharing, or utility access for services like printing. Businesses use network operating systems to save time on workstation set up as applications can easily be shared to new machines, and utilities like printers won’t have to be set up manually for each workstation.

Functions of Network Operating Systems

Examples of Network Operating Systems

Common Features of Network Operating Systems

Usage of Network Operating Systems

Transmission Modes

Data transmission modes refer to the way data is transmitted between devices in a network. There are different types of data transmission modes, each with its own characteristics, advantages, and limitations.

Broadband

Broadband is a type of internet connection that offers high speeds, typically much faster than traditional dial-up internet. Broadband connections are always on, meaning that you don't have to connect each time you want to use the internet.

Technologies Used in Broadband

Uses of Broadband

Baseband

Baseband is a type of signal that represents data in its original form, without any modulation. Baseband signals are typically used for short-distance communication, such as within a computer or between two devices connected by a cable.

Applications of Baseband Signals

Advantages and Disadvantages of Baseband Signals

Broadband versus Baseband

Characteristic Broadband Baseband
Signal type Analog Digital
Modulation Yes No
Transmission distance Long Short
Susceptibility to noise and interference Less More
Cost Higher Lower
Applications Internet, cable TV, satellite TV, cellular networks Computer networks, telecommunications networks, consumer electronics

SYNCHRONOUS

Synchronous transmission is a type of data transmission in which data is sent in a continuous stream at a constant rate. The sender and receiver are synchronized using a common clock signal, which ensures that the data is received correctly.

Synchronous transmission is often used for applications where reliable and timely delivery of data is critical, such as voice over IP (VoIP), video streaming, and financial transactions. It is also used in industrial control systems and other critical applications.

Synchronous transmission is typically implemented using a variety of technologies, including:

Synchronous transmission has a number of advantages over asynchronous transmission, including:

However, synchronous transmission also has some disadvantages, including:

ASYNCHRONOUS

Asynchronous transmission is a type of data transmission in which data is sent one character at a time, with start and stop bits between characters. The sender and receiver do not need to be synchronized, which makes it simpler to implement and less expensive than synchronous transmission.

Asynchronous transmission is often used for applications where data does not need to be delivered in real time, such as email, file transfer, and web browsing. It is also used in low-speed applications, such as serial console connections.

Asynchronous transmission is typically implemented using a variety of technologies, including:

Asynchronous transmission has a number of advantages over synchronous transmission, including:

However, asynchronous transmission also has some disadvantages, including:

Synchronous versus Asynchronous

Synchronous transmission is a type of data transmission in which data is transmitted in a continuous stream, while asynchronous transmission is a type of data transmission in which data is transmitted in discrete packets. Synchronous transmission is used for high-speed data transmission, while asynchronous transmission is used for low-speed data transmission.

SIMPLEX

Simplex transmission is a type of communication in which information flows in one direction only. The sender can only send data, and the receiver can only receive data. The receiver cannot reply to the sender.

Simplex transmission is often used in applications where feedback or response is not required, such as broadcasting or surveillance. Here are some examples of simplex transmission:

Simplex transmission has a number of advantages, including:

However, simplex transmission also has some disadvantages, including:

HALF DUPLEX

Half-duplex transmission is a type of communication in which information can flow in both directions, but only one direction at a time. The sender and receiver can both send and receive data, but they cannot do so at the same time.

Half-duplex transmission is often used in applications where two-way communication is needed, but where it is not necessary to send and receive data simultaneously. Here are some examples of half-duplex transmission:

Half-duplex transmission has a number of advantages, including:

However, half-duplex transmission also has some disadvantages, including:

FULL DUPLEX

Full-duplex transmission is a type of communication in which information can flow in both directions simultaneously. The sender and receiver can both send and receive data at the same time.

Full-duplex transmission is often used in applications where two-way communication is needed and where it is necessary to send and receive data simultaneously. Here are some examples of full-duplex transmission:

Full-duplex transmission has a number of advantages, including:

However, full-duplex transmission also has some disadvantages, including:

DESCRIBE INTERNETWORKING TECHNOLOGIES

DESCRIBE CIRCUIT SWITCHING, MESSAGE SWITCHING, PACKET SWITCHING, NARROWBAND AND BROADBAND NETWORKS

CIRCUIT SWITCHING:

Circuit switching is a type of network technology that establishes a dedicated communication channel between two devices for the duration of the call or session. This is in contrast to packet switching, which breaks down messages into smaller packets and sends them over the network independently of each other.

Circuit switching is typically used for real-time communication applications such as voice and video calls, as it guarantees a constant bandwidth and low latency. It is also used for some high-speed data applications, such as dedicated lines between businesses.

Here is how circuit switching works:

  1. The calling device sends a request to the network to establish a circuit connection with the called device.
  2. The network checks to see if the called device is available and if there is a circuit available between the two devices.
  3. If the called device is available and there is a circuit available, the network establishes the connection.
  4. The two devices can now communicate with each other over the dedicated circuit.
  5. When the communication session is over, either device can send a request to the network to terminate the circuit connection.

Circuit switching has a number of advantages, including:

However, circuit switching also has some disadvantages, including:

MESSAGE SWITCHING:

Message switching is a network technology that stores and forwards messages between devices. It is in contrast to circuit switching, which establishes a dedicated communication channel between two devices for the duration of the call or session.

Message switching is typically used for applications where real-time communication is not required, such as email, file transfer, and messaging. It is also used for some high-speed data applications, such as data transmission between servers.

Here is how message switching works:

  1. The sender device sends a message to the network.
  2. The network stores the message in a buffer.
  3. When the network has resources available, it forwards the message to the destination device.
  4. The destination device receives the message and stores it in a buffer.
  5. When the destination device is ready, it delivers the message to the recipient.

Message switching has a number of advantages, including:

However, message switching also has some disadvantages, including:

3. PACKET SWITCHING:

Packet switching is a network technology that breaks down messages into smaller packets and sends them over the network independently of each other. This is in contrast to circuit switching, which establishes a dedicated communication channel between two devices for the duration of the call or session.

Packet switching is the most common network technology used today. It is used in the Internet, as well as in many other types of networks, such as local area networks (LANs) and wide area networks (WANs).

Here is how packet switching works:

1. The sender device breaks down the message into smaller packets.
2. Each packet is assigned a header, which contains information about the source device, the destination device, and the sequence number of the packet.
3. The packets are sent over the network independently of each other.
4. The packets can take different routes through the network, and they may arrive at the destination device out of order.
5. The destination device reassembles the packets in the correct order to form the original message.

Packet switching has a number of advantages over circuit switching, including:

• Efficiency: Packet switching is more efficient than circuit switching because it does not require the network to dedicate resources to each message. Instead, the network can multiplex multiple messages over a single circuit.
• Flexibility: Packet switching is more flexible than circuit switching because it does not require the sender and receiver to be available at the same time. Instead, the network can store and forward packets when convenient.
• Scalability: Packet switching is more scalable than circuit switching because it can support a large number of users and devices without requiring a dedicated circuit for each one.

However, packet switching also has some disadvantages, including:

• Latency: Packet switching can have higher latency than circuit switching because the network has to store and forward packets.
• Reliability: Packet switching is less reliable than circuit switching because there is a risk that packets can be lost or corrupted in transit.

NARROWBAND NETWORKS:

Narrowband networks are communication networks that have a limited bandwidth. This means that they can only transmit a small amount of data at a time. Narrowband networks are often used for applications that do not require a lot of data, such as voice calls, text messaging, and email.

Narrowband networks can be implemented using a variety of technologies, including:

• Dial-up modems: Dial-up modems use telephone lines to transmit data. Dial-up modems have a very limited bandwidth, typically around 56 kilobits per second (Kbps).
• Cellular networks: Cellular networks use radio waves to transmit data. Cellular networks have a higher bandwidth than dial-up modems, typically around 1 megabit per second (Mbps).
• Low-power wide-area networks (LPWANs): LPWANs are a type of cellular network that is designed for low-power devices, such as sensors and smart meters. LPWANs have a very low bandwidth, typically around 100 kilobits per second (Kbps).

Narrowband networks have a number of advantages over broadband networks:

• Cost: Narrowband networks are less expensive to implement and operate than broadband networks.
• Coverage: Narrowband networks have a wider coverage area than broadband networks.
• Power consumption: Narrowband networks consume less power than broadband networks.

However, narrowband networks also have some disadvantages:

• Bandwidth: Narrowband networks have a lower bandwidth than broadband networks.
• Speed: Narrowband networks are slower than broadband networks.
• Latency: Narrowband networks have higher latency than broadband networks.

Overall, narrowband networks are a good choice for applications that do not require a lot of data and where cost, coverage, and power consumption are important factors. However, they are not a good choice for applications that require a lot of data or high-speed transmission.

Here are some examples of how narrowband networks are used:

• Voice calls: Voice calls are typically transmitted over narrowband networks, such as cellular networks.
• Text messaging: Text messages are typically transmitted over narrowband networks, such as cellular networks.
• Email: Email messages are typically transmitted over narrowband networks, such as cellular networks.
• Machine-to-machine (M2M) communication: M2M communication is the communication between devices, such as sensors and smart meters. M2M communication is typically transmitted over narrowband networks, such as LPWANs.

BROADBAND NETWORKS:

Baseband is a type of signal that represents data in its original form, without any modulation. Baseband signals are typically used for short-distance communication, such as within a computer or between two devices connected by a cable.

Baseband signals can be analog or digital. Analog baseband signals are used in applications such as voice communication, while digital baseband signals are used in applications such as computer networking.

Baseband signals have a number of advantages, including:

• Simplicity: Baseband signals are simple to generate and transmit.
• Cost: Baseband signals are relatively inexpensive to implement.
• Reliability: Baseband signals are reliable for short-distance communication.

However, baseband signals also have some disadvantages, including:

• Bandwidth: Baseband signals require a lot of bandwidth.
• Distance: Baseband signals cannot be transmitted over long distances without distortion.

Baseband signals are used in a variety of applications, including:

• Computer networks: Baseband signals are used in computer networks to connect devices such as computers, printers, and servers.
• Telecommunications: Baseband signals are used in telecommunications networks to transmit voice and data signals over copper wires or fiber optic cables.
• Consumer electronics: Baseband signals are used in consumer electronics devices such as TVs, stereos, and computers.

Here are some examples of how baseband signals are used in different settings:

• In a home network, baseband signals are used to connect devices such as computers, printers, and smart TVs to each other.
• In a business network, baseband signals are used to connect devices such as computers, servers, and printers to each other.
• In a telecommunications network, baseband signals are used to transmit voice and data signals over copper wires or fiber optic cables.
• In a consumer electronics device, such as a TV or stereo, baseband signals are used to transmit audio and video signals between the different components of the device.

NETWORKING MODELS

OSI MODEL

The Open Systems Interconnection (OSI) model is a conceptual model that describes how data is communicated over a network. It was developed by the International Organization for Standardization (ISO) in the 1970s and is still widely used today.

The OSI model is divided into seven layers, each of which has a specific function. The layers are:

1. Physical layer: The physical layer is responsible for the physical transmission of data over a network medium, such as copper wires, fiber optic cables, or radio waves.
2. Data link layer: The data link layer is responsible for framing data into packets and for error detection and correction.
3. Network layer: The network layer is responsible for routing packets from the source device to the destination device.
4. Transport layer: The transport layer is responsible for providing reliable end-to-end communication between the source device and the destination device.
5. Session layer: The session layer is responsible for establishing, managing, and terminating sessions between two devices.
6. Presentation layer: The presentation layer is responsible for transforming data into a format that can be understood by the destination device.
7. Application layer: The application layer is responsible for providing network services to applications, such as email, file transfer, and web browsing.

The OSI model is a useful tool for understanding how networks work and for troubleshooting network problems. It is also used to design and implement new network technologies.

Here is an example of how the OSI model works:

1. A user types a message into an email application.
2. The application layer of the OSI model on the user's computer converts the message into a format that can be transmitted over the network.
3. The transport layer of the OSI model on the user's computer segments the message into packets and assigns each packet a sequence number.
4. The network layer of the OSI model on the user's computer routes the packets to the destination email server.
5. The transport layer of the OSI model on the destination email server reassembles the packets into the original message.
6. The application layer of the OSI model on the destination email server delivers the message to the recipient's inbox.
OSI Model

TCP/IP MODEL

The Transmission Control Protocol/Internet Protocol (TCP/IP) model is a suite of protocols that are used to communicate over the internet. It is the most widely used network model in the world.

The TCP/IP model is divided into four layers, each of which has a specific function. The layers are:

The TCP/IP model is simpler than the OSI model, but it is still a powerful tool for understanding how networks work and for troubleshooting network problems. It is also used to design and implement new network technologies.

Here is an example of how the TCP/IP model works:

The TCP/IP model is an essential part of the modern internet. It allows us to communicate with each other and to access information and resources from all over the world.

Here are some of the key benefits of the TCP/IP model:

Network Access Layer

Internet Layer

Following are the protocols used in this layer are:

ARP Protocol

ICMP Protocol

Transport Layer

The transport layer is responsible for the reliability, flow control, and correction of data which is being sent over the network.

The two protocols used in the transport layer are User Datagram protocol and Transmission control protocol.

Application Layer

Following are the main protocols used in the application layer:

NETWORK PORTS AND PROTOCOLS

Network ports and protocols are essential for communication between devices on a network. A port is a communication endpoint that is used to identify a specific process or application on a device. A protocol is a set of rules that governs how data is transmitted over a network. Here are some common network ports and protocols:

  1. Connection-oriented versus Connectionless Protocols: Connection-oriented protocols, such as TCP, establish a dedicated connection between two devices before data transmission begins. Connectionless protocols, such as UDP, do not establish a dedicated connection before data transmission begins.
  2. IP: The Internet Protocol (IP) is a connectionless protocol that is responsible for routing data packets between devices on a network.
  3. TCP: The Transmission Control Protocol (TCP) is a connection-oriented protocol that provides reliable, ordered, and error-checked delivery of data between devices on a network.
  4. UDP: The User Datagram Protocol (UDP) is a connectionless protocol that provides fast, unreliable, and unordered delivery of data between devices on a network.
  5. FTP: The File Transfer Protocol (FTP) is a protocol used for transferring files between devices on a network. It uses TCP for reliable data transfer.
  6. SFTP: The Secure File Transfer Protocol (SFTP) is a protocol used for transferring files securely between devices on a network. It uses SSH for secure data transfer.
  7. TFTP: The Trivial File Transfer Protocol (TFTP) is a simple protocol used for transferring small files between devices on a network. It uses UDP for fast data transfer.
  8. SMTP: The Simple Mail Transfer Protocol (SMTP) is a protocol used for sending email between devices on a network.
  9. HTTP: The Hypertext Transfer Protocol (HTTP) is a protocol used for transferring data between web servers and web clients.
  10. HTTPS: The Hypertext Transfer Protocol Secure (HTTPS) is a protocol used for transferring data securely between web servers and web clients.
  11. POP: The Post Office Protocol (POP) is a protocol used for retrieving email from a mail server.
  12. IMAP: The Internet Message Access Protocol (IMAP) is a protocol used for retrieving email from a mail server.
  13. Telnet: The Telnet protocol is a protocol used for remote access to devices on a network.
  14. Secure Shell (SSH): The Secure Shell protocol is a protocol used for secure remote access to devices on a network.
  15. ICMP: The Internet Control Message Protocol (ICMP) is a protocol used for error reporting and diagnostic purposes on a network.
  16. NTP: The Network Time Protocol (NTP) is a protocol used for synchronizing the clocks of devices on a network.
  17. LDAP: The Lightweight Directory Access Protocol (LDAP) is a protocol used for accessing and managing directory information on a network.
  18. SNMP: The Simple Network Management Protocol (SNMP) is a protocol used for managing and monitoring network devices.
  19. SIP: The Session Initiation Protocol (SIP) is a protocol used for establishing and managing multimedia sessions on a network.
  20. RDP: The Remote Desktop Protocol (RDP) is a protocol used for remote access to devices on a network.
  21. SMB: The Server Message Block (SMB) protocol is a protocol used for file and printer sharing between devices on a network.
  22. ARP and RARP: The Address Resolution Protocol (ARP) and Reverse Address Resolution Protocol (RARP) are protocols used for mapping IP addresses to MAC addresses and vice versa.

DISCUSS INTERNET ACCESS TECHNOLOGIES

Internet access technologies refer to the different methods used to connect to the internet. Here are some common internet access technologies:

  1. DSL: Digital Subscriber Line (DSL) is a family of technologies used to provide internet connectivity over telephone lines. DSL provides high-speed internet access and is widely available in urban and suburban areas.
  2. Cable Broadband: Cable broadband is a type of internet access that uses the same coaxial cable that delivers cable television. Cable broadband provides high-speed internet access and is widely available in urban and suburban areas.
  3. Dial-up: Dial-up is a type of internet access that uses a modem and a phone call placed over the public switched telephone network (PSTN) to connect to a pool of modems operated by an ISP. Dial-up is a slow and outdated technology and is rarely used today.
  4. Public Switched Telephone Network: The Public Switched Telephone Network (PSTN) is a global network of public telephone networks that provides circuit-switched telephone communication.
  5. Satellite Internet Access: Satellite internet access is a type of internet access that uses a satellite dish to connect to the internet. It is commonly used in rural or remote areas where other types of internet access are not available.
  6. Wireless Internet Access: Wireless internet access is a type of internet access that uses wireless networks to connect to the internet. It is commonly used in urban areas and is available through Wi-Fi hotspots and cellular networks.

End of Outcome Quiz

1 of 20

    Quiz Score

    Percentage: 0%

    Answered Questions: 0

    Correct Answers: 0

    Faults: