CS101 Lesson 5 PDF
Document Details
Uploaded by ModestRadium7251
Misr University for Science and Technology
Dr Mohamed Badawy
Tags
Related
- Computer Network Systems: ICS-432 Chapter 1 PDF
- Data Communications and Networking, With TCP/IP Protocol Suite (PDF)
- Week 01 - Basic Concepts 2024 PDF
- Chapter 1: Introduction to Data Communications and Networking - PDF
- Computer Communication and Networks Lecture 1 PDF
- Computer Networks Lecture 1 PDF
Summary
This document is a presentation on Computer Networking, specifically Session 5. It covers topics including networking components, connection models, hardware, and protocols. The presentation also explains different network topologies.
Full Transcript
Presented by: Dr Mohamed Badawy Networking Network Components Connection Models Shapes and Topologies Detailed view of hardware Recap How do different computers communicate together? Transforming and sharing data through a medium Benefits...
Presented by: Dr Mohamed Badawy Networking Network Components Connection Models Shapes and Topologies Detailed view of hardware Recap How do different computers communicate together? Transforming and sharing data through a medium Benefits Drawbacks ⚬ Licenses can be shared. ⚬ Cables and devices are expensive. ⚬ Users can communicate easily. ⚬ Viruses affect all devices connected. ⚬ When using servers: data is reliable and consistent. ⚬ Network managers apply security rules. Hardware ⚬ Router Se Protocols IP ⚬ Cables ⚬ IP ⚬ Switches ⚬ LAN Cards. ⚬ DSL Se Software ⚬ Security Applications ⚬ Network back-end management. ⚬ Firewalls Client-Server Model Peer-To-Peer Model Data is managed and distributed by No Central Server. the central server. Nodes (peers) share data directly. Back-ups are consistent and done by e.g. Bluetooth the server. Can be bottlenecked on concurrent requests. Bus Topology Star Topology All nodes are connected along a All nodes are connected to a central connection line. hub/switch. Data is sent to all computers with no Secure, since the central unit can security checks. manage data. Mesh Topology Hybrid Topology All nodes are connected to every other Any combination of the other topologies. node. Very secure, since data travels along a dedicated route. Can get very complicated as we add more nodes. Hub Switch Takes data packets and sends them to Nodes have MAC addresses, used by every node switches to send data packets. Not secure and wasted bandwidth More secure than Hub Hub Switch Gateway Router Entry point of network Same as Gateway. Required when communicating outside Calculated the best route to send data the network. through. Used to convert protocols. Modem Converts between analog and digital Gateway Modem