SlideShare une entreprise Scribd logo
1  sur  32
15-1
Networking
• Computer network A collection of
computing devices that are connected in
various ways in order to communicate and
share resources
Usually, the connections between
computers in a network are made using
physical wires or cables
However, some connections are wireless,
using radio waves or infrared signals
15-2
Networking
• The generic term node or host refers to
any device on a network
• Data transfer rate The speed with which
data is moved from one place on a
network to another
• Data transfer rate is a key issue in
computer networks
15-3
Networking
• Computer networks have opened up an
entire frontier in the world of computing
called the client/server model
Figure 15.1 Client/Server interaction
15-4
Networking
• File server A computer that stores and
manages files for multiple users on a
network
• Web server A computer dedicated to
responding to requests (from the browser
client) for web pages
15-5
Types of Networks
• Local-area network (LAN) A network
that connects a relatively small number of
machines in a relatively close
geographical area
15-6
Types of Networks
• Various configurations, called topologies, have
been used to administer LANs
– Ring topology A configuration that connects all
nodes in a closed loop on which messages travel in
one direction
– Star topology A configuration that centers around
one node to which all others are connected and
through which all messages are sent
– Bus topology All nodes are connected to a single
communication line that carries messages in both
directions
Types of Networks
• A bus technology called Ethernet has become the
industry standard for local-area networks
Figure 15.2 Various network topologies
15-10
15-8
Types of Networks
• Wide-area network (WAN) A network that
connects two or more local-area networks over a
potentially large geographic distance
Often one particular node on a LAN is set up to serve
as a gateway to handle all communication going
between that LAN and other networks
Communication between networks is called
internetworking
The Internet, as we know it today, is essentially the
ultimate wide-area network, spanning the entire globe
15-9
Types of Networks
• Metropolitan-area network (MAN) The
communication infrastructures that have
been developed in and around large cities
15-10
So, who owns the Internet?
Well, nobody does. No single person or
company owns the Internet or even
controls it entirely. As a wide-area
network, it is made up of many smaller
networks. These smaller networks are
often owned and managed by a person or
organization. The Internet, then, is really
defined by how connections can be made
between these networks.
15-11
Types of Networks
Figure 15.1 Local-area networks connected across a distance to
create a wide-area network
15-12
Internet Connections
• Internet backbone A set of high-speed
networks that carry Internet traffic
These networks are provided by
companies such as AT&T, GTE, and IBM
• Internet service provider (ISP) A
company that provides other companies
or individuals with access to the Internet
15-13
Internet Connections
• There are various technologies available that you can
use to connect a home computer to the Internet
– A phone modem converts computer data into an analog
audio signal for transfer over a telephone line, and then a
modem at the destination converts it back again into data
– A digital subscriber line (DSL) uses regular copper phone
lines to transfer digital data to and from the phone company’s
central office
– A cable modem uses the same line that your cable TV
signals come in on to transfer the data back and forth
15-14
Internet Connections
• Broadband A connection in which transfer
speeds are faster than 128 bits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the
Internet to your home computer) may not be the same
as uploads (sending data from your home computer
to the Internet)
Packet Switching
• To improve the efficiency of transferring information over
a shared communication line, messages are divided into
fixed-sized, numbered packets
• Network devices called routers are used to direct
packets between networks
Figure 15.4
Messages
sent by
packet
switching
15-18
15-16
Open Systems
• Proprietary system A system that uses
technologies kept private by a particular
commercial vendor
One system couldn’t communicate with another,
leading to the need for
• Interoperability The ability of software and
hardware on multiple machines and from
multiple commercial vendors to communicate
Leading to
• Open systems Systems based on a common
model of network architecture and a suite of
protocols used in its implementation
15-17
Open Systems
• The International
Organization for
Standardization (ISO)
established the Open
Systems
Interconnection (OSI)
Reference Model
• Each layer deals with a
particular aspect of
network communication
Figure 15.5 The layers of the OSI Reference Model
15-18
Network Protocols
• Network protocols are layered such that
each one relies on the protocols that
underlie it
• Sometimes referred to as a protocol
stack
Figure 15.6 Layering of key network protocols
15-19
TCP/IP
• TCP stands for Transmission Control Protocol
TCP software breaks messages into packets,
hands them off to the IP software for delivery,
and then orders and reassembles the packets
at their destination
• IP stands for Internet Protocol
IP software deals with the routing of packets
through the maze of interconnected networks
to their final destination
15-20
TCP/IP (cont.)
• UDP stands for User Datagram Protocol
– It is an alternative to TCP
– The main difference is that TCP is highly
reliable, at the cost of decreased
performance, while UDP is less reliable, but
generally faster
15-21
High-Level Protocols
• Other protocols build on the foundation
established by the TCP/IP protocol suite
– Simple Mail Transfer Protocol (SMTP)
– File Transfer Protocol (FTP)
– Telnet
– Hyper Text Transfer Protocol (http)
15-22
MIME Types
• Related to the idea of network protocols
and standardization is the concept of a
file’s MIME type
– MIME stands for Multipurpose Internet Mail
Extension
– Based on a document’s MIME type, an
application program can decide how to deal
with the data it is given
15-23
MIME Types
Figure 15.7
Some
protocols and
the ports they
use
15-24
Firewalls
• Firewall A machine and its software that
serve as a special gateway to a network,
protecting it from inappropriate access
– Filters the network traffic that comes in,
checking the validity of the messages as
much as possible and perhaps denying some
messages altogether
– Enforces an organization’s access control
policy
15-25
Firewalls
Figure 15.8 A firewall protecting a LAN
15-26
Network Addresses
• Hostname A unique identification that
specifies a particular computer on the
Internet
For example
matisse.csc.villanova.edu
condor.develocorp.com
15-27
Network Addresses
• Network software translates a hostname
into its corresponding IP address
For example
205.39.145.18
15-28
Network Addresses
• An IP address can be split into
– network address, which specifies a specific network
– host number, which specifies a particular machine in
that network
Figure 15.9
An IP address is
stored in four
bytes
15-29
Domain Name System
• A hostname consists of the computer name
followed by the domain name
• csc.villanova.edu is the domain name
– A domain name is separated into two or more
sections that specify the organization, and possibly a
subset of an organization, of which the computer is a
part
– Two organizations can have a computer named the
same thing because the domain name makes it clear
which one is being referred to
15-30
Domain Name System
• The very last section of the domain is called its
top-level domain (TLD) name
Figure 15.10 Top-level domains, including some relatively new ones
15-31
Domain Name System
• Organizations based in countries other than the
United States use a top-level domain that
corresponds to their two-letter country codes
Figure 15.11
Some of the top-level domain
names based on country codes
15-32
Domain Name System
• The domain name system (DNS) is
chiefly used to translate hostnames into
numeric IP addresses
– DNS is an example of a distributed database
– If that server can resolve the hostname, it
does so
– If not, that server asks another domain name
server

Contenu connexe

Tendances

Tendances (20)

Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
Star topology
Star topologyStar topology
Star topology
 
Computer networks
Computer networks   Computer networks
Computer networks
 
Network protocals
Network protocalsNetwork protocals
Network protocals
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
internet protocol
internet protocolinternet protocol
internet protocol
 
Computer network
Computer networkComputer network
Computer network
 
Transport layer protocol
Transport layer protocolTransport layer protocol
Transport layer protocol
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networks
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Local area network
Local area networkLocal area network
Local area network
 

En vedette

En vedette (20)

2.2.2.1 Web Browser
2.2.2.1 Web Browser2.2.2.1 Web Browser
2.2.2.1 Web Browser
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
I pv6(internet protocol version 6)
I pv6(internet protocol version 6)I pv6(internet protocol version 6)
I pv6(internet protocol version 6)
 
Definition of Internet Terms
Definition of Internet TermsDefinition of Internet Terms
Definition of Internet Terms
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Integrating Web 2.0 Tools in the Math Classroom
Integrating Web 2.0 Tools in the Math ClassroomIntegrating Web 2.0 Tools in the Math Classroom
Integrating Web 2.0 Tools in the Math Classroom
 
All About Internet Services
All About Internet ServicesAll About Internet Services
All About Internet Services
 
Evolution of web browsers ppt
Evolution of web browsers pptEvolution of web browsers ppt
Evolution of web browsers ppt
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Web browser(pp ts)
Web browser(pp ts)Web browser(pp ts)
Web browser(pp ts)
 
Web browsers
Web browsersWeb browsers
Web browsers
 
SlideShare Networks
SlideShare NetworksSlideShare Networks
SlideShare Networks
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Web server
Web serverWeb server
Web server
 
Network Types
Network TypesNetwork Types
Network Types
 
Web servers
Web serversWeb servers
Web servers
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Types of Servers - Basic Differences
Types of Servers - Basic DifferencesTypes of Servers - Basic Differences
Types of Servers - Basic Differences
 

Similaire à Computer Network - Types & Definition

Computer-Networks--Network.pptx
Computer-Networks--Network.pptxComputer-Networks--Network.pptx
Computer-Networks--Network.pptxThorKumar3
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15Chakamru Pak
 
computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detailsonykhan3
 
Website Networking
Website Networking Website Networking
Website Networking Anjan Banda
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 aEashaGupta
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks IntroductionDr.Florence Dayana
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hackingsaeed7878
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkshinigami-99
 

Similaire à Computer Network - Types & Definition (18)

Computer-Networks--Network.pptx
Computer-Networks--Network.pptxComputer-Networks--Network.pptx
Computer-Networks--Network.pptx
 
Information system for you Chapter 15
Information system for you Chapter 15Information system for you Chapter 15
Information system for you Chapter 15
 
computer networking slides with full detail
computer  networking slides with full detailcomputer  networking slides with full detail
computer networking slides with full detail
 
Networking.
Networking.Networking.
Networking.
 
Computer networks- week 1
Computer networks- week 1Computer networks- week 1
Computer networks- week 1
 
Computer networks--network 2019
Computer networks--network 2019Computer networks--network 2019
Computer networks--network 2019
 
Website Networking
Website Networking Website Networking
Website Networking
 
Computing 9
Computing 9Computing 9
Computing 9
 
Prachi gupta 8 a
Prachi gupta 8 aPrachi gupta 8 a
Prachi gupta 8 a
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
M.Florence Dayana Computer Networks Introduction
M.Florence Dayana   Computer Networks IntroductionM.Florence Dayana   Computer Networks Introduction
M.Florence Dayana Computer Networks Introduction
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 
Networking
NetworkingNetworking
Networking
 
Chapter15.ppt
Chapter15.pptChapter15.ppt
Chapter15.ppt
 

Dernier

Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolinonuriaiuzzolino1
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 

Dernier (20)

Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 

Computer Network - Types & Definition

  • 1. 15-1 Networking • Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals
  • 2. 15-2 Networking • The generic term node or host refers to any device on a network • Data transfer rate The speed with which data is moved from one place on a network to another • Data transfer rate is a key issue in computer networks
  • 3. 15-3 Networking • Computer networks have opened up an entire frontier in the world of computing called the client/server model Figure 15.1 Client/Server interaction
  • 4. 15-4 Networking • File server A computer that stores and manages files for multiple users on a network • Web server A computer dedicated to responding to requests (from the browser client) for web pages
  • 5. 15-5 Types of Networks • Local-area network (LAN) A network that connects a relatively small number of machines in a relatively close geographical area
  • 6. 15-6 Types of Networks • Various configurations, called topologies, have been used to administer LANs – Ring topology A configuration that connects all nodes in a closed loop on which messages travel in one direction – Star topology A configuration that centers around one node to which all others are connected and through which all messages are sent – Bus topology All nodes are connected to a single communication line that carries messages in both directions
  • 7. Types of Networks • A bus technology called Ethernet has become the industry standard for local-area networks Figure 15.2 Various network topologies 15-10
  • 8. 15-8 Types of Networks • Wide-area network (WAN) A network that connects two or more local-area networks over a potentially large geographic distance Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks Communication between networks is called internetworking The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe
  • 9. 15-9 Types of Networks • Metropolitan-area network (MAN) The communication infrastructures that have been developed in and around large cities
  • 10. 15-10 So, who owns the Internet? Well, nobody does. No single person or company owns the Internet or even controls it entirely. As a wide-area network, it is made up of many smaller networks. These smaller networks are often owned and managed by a person or organization. The Internet, then, is really defined by how connections can be made between these networks.
  • 11. 15-11 Types of Networks Figure 15.1 Local-area networks connected across a distance to create a wide-area network
  • 12. 15-12 Internet Connections • Internet backbone A set of high-speed networks that carry Internet traffic These networks are provided by companies such as AT&T, GTE, and IBM • Internet service provider (ISP) A company that provides other companies or individuals with access to the Internet
  • 13. 15-13 Internet Connections • There are various technologies available that you can use to connect a home computer to the Internet – A phone modem converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data – A digital subscriber line (DSL) uses regular copper phone lines to transfer digital data to and from the phone company’s central office – A cable modem uses the same line that your cable TV signals come in on to transfer the data back and forth
  • 14. 15-14 Internet Connections • Broadband A connection in which transfer speeds are faster than 128 bits per second – DSL connections and cable modems are broadband connections – The speed for downloads (getting data from the Internet to your home computer) may not be the same as uploads (sending data from your home computer to the Internet)
  • 15. Packet Switching • To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered packets • Network devices called routers are used to direct packets between networks Figure 15.4 Messages sent by packet switching 15-18
  • 16. 15-16 Open Systems • Proprietary system A system that uses technologies kept private by a particular commercial vendor One system couldn’t communicate with another, leading to the need for • Interoperability The ability of software and hardware on multiple machines and from multiple commercial vendors to communicate Leading to • Open systems Systems based on a common model of network architecture and a suite of protocols used in its implementation
  • 17. 15-17 Open Systems • The International Organization for Standardization (ISO) established the Open Systems Interconnection (OSI) Reference Model • Each layer deals with a particular aspect of network communication Figure 15.5 The layers of the OSI Reference Model
  • 18. 15-18 Network Protocols • Network protocols are layered such that each one relies on the protocols that underlie it • Sometimes referred to as a protocol stack Figure 15.6 Layering of key network protocols
  • 19. 15-19 TCP/IP • TCP stands for Transmission Control Protocol TCP software breaks messages into packets, hands them off to the IP software for delivery, and then orders and reassembles the packets at their destination • IP stands for Internet Protocol IP software deals with the routing of packets through the maze of interconnected networks to their final destination
  • 20. 15-20 TCP/IP (cont.) • UDP stands for User Datagram Protocol – It is an alternative to TCP – The main difference is that TCP is highly reliable, at the cost of decreased performance, while UDP is less reliable, but generally faster
  • 21. 15-21 High-Level Protocols • Other protocols build on the foundation established by the TCP/IP protocol suite – Simple Mail Transfer Protocol (SMTP) – File Transfer Protocol (FTP) – Telnet – Hyper Text Transfer Protocol (http)
  • 22. 15-22 MIME Types • Related to the idea of network protocols and standardization is the concept of a file’s MIME type – MIME stands for Multipurpose Internet Mail Extension – Based on a document’s MIME type, an application program can decide how to deal with the data it is given
  • 24. 15-24 Firewalls • Firewall A machine and its software that serve as a special gateway to a network, protecting it from inappropriate access – Filters the network traffic that comes in, checking the validity of the messages as much as possible and perhaps denying some messages altogether – Enforces an organization’s access control policy
  • 25. 15-25 Firewalls Figure 15.8 A firewall protecting a LAN
  • 26. 15-26 Network Addresses • Hostname A unique identification that specifies a particular computer on the Internet For example matisse.csc.villanova.edu condor.develocorp.com
  • 27. 15-27 Network Addresses • Network software translates a hostname into its corresponding IP address For example 205.39.145.18
  • 28. 15-28 Network Addresses • An IP address can be split into – network address, which specifies a specific network – host number, which specifies a particular machine in that network Figure 15.9 An IP address is stored in four bytes
  • 29. 15-29 Domain Name System • A hostname consists of the computer name followed by the domain name • csc.villanova.edu is the domain name – A domain name is separated into two or more sections that specify the organization, and possibly a subset of an organization, of which the computer is a part – Two organizations can have a computer named the same thing because the domain name makes it clear which one is being referred to
  • 30. 15-30 Domain Name System • The very last section of the domain is called its top-level domain (TLD) name Figure 15.10 Top-level domains, including some relatively new ones
  • 31. 15-31 Domain Name System • Organizations based in countries other than the United States use a top-level domain that corresponds to their two-letter country codes Figure 15.11 Some of the top-level domain names based on country codes
  • 32. 15-32 Domain Name System • The domain name system (DNS) is chiefly used to translate hostnames into numeric IP addresses – DNS is an example of a distributed database – If that server can resolve the hostname, it does so – If not, that server asks another domain name server