Download L01

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Computer security wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Peer-to-peer wikipedia , lookup

Transcript
CIT 513: Introduction
to Computer
Communication
Mohammed A. Saleh
http://ifm.ac.tz/staff/msaleh/CIT513.html
1
Module Description
 Provides
the student with
of fundamentals of how
communicate.
 Provides
the student
understanding of how
interact with different
systems
knowledge
computers
with an
computers
computers
2
Prerequisites

There is no prerequisites
undertaking this course.
before
3
Plagiarism Policy


Plagiarism is a serious offense
Plagiarism is presenting somebody else's work
as your own. It includes:




Copying information directly from the Web or books without
referencing the material
Submitting joint coursework as an individual effort copying
another student's coursework
Stealing coursework from another student and submitting it as
your own work.
Suspected plagiarism will be investigated and if
found to have occurred will be dealt with
accordingly.
4
Cont …

All material copied or amended from any source
(e.g. internet, books) must be placed in
quotation marks and in italics, with a full
reference to the source directly underneath the
material
5
Cont …

All material copied or amended from any source
(e.g. internet, books) must be placed in
quotation marks and in italics, with a full
reference to the source directly underneath the
material
6
Instructor






There is only one lecturer responsible for this course,
both lectures and tutorials.
Find out about my contact details from my personal
website http://ifm.ac.tz/staff/msaleh
If you need to see me in my office please book an
appointment
by
writing
me
an
email
[email protected]
My office number is Block D, room 016
All notes will be uploaded on the CIT 513 web page,
http://ifm.ac.tz/staff/msaleh/CIT513.html
A hardcopy will be submitted to the class representative
7
Basic Rules






Try to attend ALL lectures
Sign against your name on the register
Try not to be late, if you have to be late, come in
quietly.
If you miss a class find out what was covered
Material covered in lectures is examinable
The course notes are not meant to be
exhaustive, read the recommended books; Read
critically, point out any errors in the lecture
notes.
8
Assessment
This module will be assessed by a
combination
of
tests,
tutorials,
unannounced quizzes and the final exam.
 Both the tests will be written tests and the
extent of coverage will be announced in
due time.
 There will also be unannounced quizzes,
which will contribute to your coursework.

9
Cont …

And finally the Final Exam, which will
cover all contents of the course taught
during the semester.
10
Final Mark Calculation
Assessment
Marks (%)
Test I
15
Test II
15
Tutorials
5
Unannounced quizzes
5
Total
40
Final Exam
60
Grand Total
100
11
Required Readings
Author
Year
Title
Publisher
Hermachandran
L.
2003
Computer Communications
Network
Charulatha
Tanenbaum A. S.
2005
Computer Networks
Prentice-Hall
Galo M. A.
2002
Computer Communications
and Networking
Technologies
Pacific Grove
Rowe S and
Schuch
2005
Computer Networking
Pearson
12
Recommended Readings
Author
Year Title
Publisher
Kurose J. F
2001 Computer Networking a
top down approach
Pearson
Halsall
2005 Computer Networking
and Internet
McGraw-Hill
Madhulika J.
2002 Computer Networks
BPB
13
Prescribed Materials

If you have issue with getting hold of the book then it will
made it available in a CD with other additional material at
a little fee, not more than TZS 2000/-
14
How to survive this course
Materials sound simple and easy, but they
are not.
 Do not leave everything to the exam
night!.
 Not to copy others work!, try them by
yourself.
 You can read the course by yourself, but
the class makes the life for you easier.

15
Introduction
What is a Computer Network?





A network is nothing more than two or more computers
connected to each other so that they can exchange
information, such as e-mail messages or documents, or share
resources, such as disk storage or printers.
These computers may be interconnected in the same building
or different buildings.
In most cases, this connection is made via electrical cables that
carry the information in the form of electrical signals.
The cables transmitting the information are commonly known as
transmission media.
The transmissions media are classified as wired or wireless
transmission media.
16
Cont …

Examples of wired transmission medias are Unshielded
Twisted Pair (UTP), Coaxial Cable or Fiber Optic Cable
(a) Coaxial
(b) Fiber Optic
(c) UTP
17
Cont …

Wireless transmission medias include radio waves,
infrared and Bluetooth
(a) Bluetooth icon
(b) Radio signals
18
Cont …


When a computer is turned on and can be visible by all
other computers, then that computer is said to be online.
If a computer is not turned on and it is not visible by
other networked computers, it is then said to be offline.
19
Why Computer Networks?

Networks are all about sharing. are about sharing three
things: information, resources, and applications.


Sharing information: allow users to share information in several
different ways. The most common way of sharing information is
to share individual files. For example, two or more people can
work together on a word-processing document.
Sharing resource: certain computer resources, such as printers
or hard drives, can be set up so that network users can share
them. Sharing these resources can result in significant cost
savings. For example, it is cheaper to buy a single high-speed
printer with advanced features that can be shared by an entire
workgroup than it is to buy separate printers for each user in the
group.
20
Cont …


Sharing applications: several users can work together on a
single business application, For example, an accounting
department may have accounting software that can be used from
several computers at the same time.
Other uses


High reliability: All data can be
copied on two or three
machines, so if one of them is unavailable then other two copies
could be used.
Communication: A computer network can provide a powerful
communication medium along widely separated employees.
21
Networks building blocks



All networks, large or small, require specialized network
hardware to make them work.
Small networks will have less network hardware than
large networks.
Small or large, all networks are built from the following
basic building blocks:

Client computers




computers that end users use to access the resources of the network.
located on users’ desks.
usually run a desktop version of Windows such as Windows Vista, Windows
XP, Ubuntu or Open Suse, along with application soft- ware such as
Microsoft Office.
sometimes referred to as workstations.
22
Cont …

Server computers



Network interface card (NIC)



Computers that provide shared resources, such as disk storage and printers,
as well as network services, such as e-mail and Internet access.
run a specialized net- work operating system such as Windows Server 2008
or 2003, Ubuntu Server, Leopard (OS X) Server along with special software
to provide network services.
An interface that’s installed in a computer that enables the computer to
communicate over a network.
Every client and every server computer must have a NIC in order to be a
part of a network.
Cable

Computers in a network are usually physically connected to each other using
a cable
23
Cont …

Switches




Wireless networks





Network cable usually doesn’t connect computers directly to each other
Instead, each computer is connected by cable to a device known as a switch
Each switch contains a certain number of ports, typically 8 or 16
computers to communicate via radio signals
radio transmitters and receivers take the place of cables
main advantage of wireless net- working is its flexibility
main disadvantage of wireless networking is that it is inherently less secure
than a cabled network.
Network software


As important as network hardware.
Server computers typically use a special network operating system (also
known as a NOS) in order to function efficiently.
24
Clients and Servers



The network computer that contains the hard drives,
printers, and other resources that are shared with other
network computers is called a server
Any computer that’s not a server is called a client.
Differences between the two computers:

The most powerful and expensive computers in a network are
the servers


The cheaper and less powerful computers in a network are the
clients


every user on the network shares the server’s resources.
clients’ resources don’t have to be shared
Most networks have more clients than servers

A network with ten clients can probably get by with one server.
25
Types of Computer Networks


1.
2.
3.
4.
Networks are classified according to their geographical
coverage and size
Network classifications include:
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
26
Personal Area Networks (PANs)





Introduced by the presence of wireless technologies.
It is also referred to as Wireless Personal Area Networks
(WPAN).
WPAN refers to the technologies involved in connecting
devices in very close proximity to exchange data or
resources.
An example of this can be seen through connecting a
mobile device with a mobile device to exchange files
(music, photos or documents)
Connecting a laptop with a PDA.
27
Cont …


Because of the close proximity of WPAN networking,
short-range wireless technologies are typically used.
This includes Bluetooth and Infrared
A laptop sending a file to a Personal Digital Assistant
(PDA).
28
Cont …
Mobile devices that can form a PAN
29
Local Area Network (LAN)




A network that is restricted to a single geographical
location.
Encompasses a relatively small area such as an office
building or school
The function of the LAN is to interconnect workstation
computers for the purposes of sharing files and
resources.
It is typically high speed and cheaper to set up than a
WAN
30
Cont …
Local Area Network
31
Cont …
Major Characteristics of LANs
 Every computer has the potential to communicate with
any other computers of the network
 High degree of interconnection between computers
 Easy physical connection of computers in a network
 Inexpensive medium of data transmission
 High data transmission rate
Advantages
 The reliability of network is high because the failure of
one computer in the network does not effect the
functioning for other computers.
32
Cont …



Addition of new computer to network is easy.
High rate of data transmission is possible.
Peripheral devices like magnetic disk and printer can be
shared by other computers.
Disadvantages
 If the central device fails, the entire network system
breaks down.
33
Cont …
Use of LAN
 Followings are the major areas where LAN is normally
used:
1. File transfers and Access
2. Word and text processing
3. Electronic message handling
4. Remote access
5. Digital voice transmission and storage
34
Wide Area Network (WAN)





It is used to describe a computer network spanning a
regional, national or global area.
For example, for a large company the head quarters
might be at Dar Es Salaam and regional branches at
Dodoma, Arusha, Mwanza and Morogoro
They are built so that users from one location can
communicate with users from another location
WANs are slower than LANs
Often require additional and costly hardware



Routers
Dedicated leased line
Complicated implementation procedures
35
Example of WAN
Wide Area Network
36
Cont …

Followings are the major characteristics of WAN.
1.
Communication Facility: For a big company spanning over
different parts of the country the employees can save long
distance phone calls and it overcomes the time lag in
overseas communications. Computer conferencing is another
use of WAN where users communicate with each other
through their computer system.
Remote Data Entry: Remote data entry is possible in WAN. It
means sitting at any location you can enter data, update data
and query other information of any computer attached to the
WAN but located in other cities. For example, suppose you
are sitting at Dar and want to see some data of a computer
located at Arusha, you can do it through WAN.
2.
37
Cont …
3.
Centralised Information: In modern computerised
environment you will find that big organisations go for
centralised data storage. This means if the organisation
is spread over many cities, they keep their important
business data in a single place. As the data are
generated at different sites, WAN permits collection of
this data from different sites and save at a single site.
38
Difference between LAN and WAN
1.
2.
3.
Coverage: LAN is restricted to limited geographical
area of few kilometers. But WAN covers great distance
and operate nationwide or even worldwide.
Connectivity: In LAN, the computer terminals and
peripheral devices are connected with wires and coaxial
cables. In WAN there is no physical connection.
Communication is done through telephone lines and
satellite links.
Cost: Cost of data transmission in LAN is less because
the transmission medium is owned by a single
organisation. In case of WAN the cost of data
transmission is very high because the transmission
medium used are hired, either telephone lines or
satellite links.
39
Cont …
4.
5.
Speed: The speed of data transmission is much higher
in LAN than in WAN. The transmission speed in LAN
varies from 0.1 to 100 megabits per second. In case of
WAN the speed ranges from 1800 to 9600 bits per
second (bps).
Transmission Errors: Few data transmission errors
occur in LAN compared to WAN. It is because in LAN
the distance covered is negligible.
40
Metropolitan Area Network
(MAN)






A network that usually spans across the city or a large
campus
Interconnects several local area networks
It uses a high-speed cable for the interconnections
between different LANs
It might be owned or operated by a single organization
Its geographical scope falls between a WAN and a LAN
MANs provides internet connectivity for LANs in the
same metropolitan area
41
Cont …
42
Network Models

1.
2.

There are two basic wired network models from which to
choose:
Peer-to-peer network model
Client/ server network model
The model used for a network is determined by several
factors



how the network will be used
how many users will be on the network
budgetary considerations
43
Peer-to-peer Network Model



This is a decentralized network model offering no
centralized storage of data or centralized control over the
sharing of files or resources.
All systems on a peer-to-peer network can share the
resources on their local computer as well as use
resources of other systems.
Advantage:


They are cheaper and easier to implement than client/server
networks, making them an ideal solution for environments in
which budgets are a concern
It does not work well with large numbers of computer
systems
44
Cont …

Disadvantages:




As a peer-to-peer network grows, it becomes increasingly
complicated to navigate and access files and resources
connected to each computer because they are distributed
throughout the network.
The lack of centralized data storage makes it difficult to locate
and back up key files
Typically found in small offices or in residential settings
where only a limited number of computers will be
attached and only a few files and resources shared.
Rule of Thumb: Have no more than 10 computers
connected to a peer-to-peer network.
45
Client/ server Network Model


It is the most widely implemented model and the one you
are most likely to encounter when working in real-world
environments.
Advantages:

It allows for centralized network management of all network
services




user management,
security and
backup procedures.
Disadvantages:


It requires technically skilled personnel to implement and
manage the network
Adds the cost of a dedicated server hardware and software
46
Questions