College of Computing and Informatics
CS001: Computer Essentials
Computer Essentials
Module 10
Computer Networks
1. Identify the wired and wireless connections.
2. Explain what a computer network is.
3. Identify network topology.
4. Identify the benefits of using network Models.
5. Discuss the different types of Networks.
6. Explain what is meant by Intranet vs Extranet.
Contents
• WLOC1: Identify the wired and wireless connections.
• WLOC2: Explain what a computer network is.
• WLOC3: Identify network topology.
• WLOC4: Identify the benefits of using network Models.
• WLOC5: Discuss the different types of Networks.
• WLOC6: Explain what is meant by Intranet vs Extranet.
Weekly Learning
Outcomes
Required Reading
1. Chapter 24 - (Introduction to Computers and Information
Technology: Preparing for IC3 Certification)
Recommended Reading
1. Chapter 12- Essential for Computing Studies, Profession And Entrance
Examinations
2. Link1:
https://lms.seu.edu.sa/bbcswebdav/pid-11200099-dt-content-rid-19925
8419_1/xid-199258419_1
3. Link2: https://lms.seu.edu.sa/bbcswebdav/pid-11200100-dt-content-
rid-199258420_1/xid-199258420_1
• Computer Networks
Computer Networks
A computer network facilitates interaction
among end-users through various modes
C such as phone, email, instant messaging, or
video calls. It also allows for the sharing of
S
resources, including printers, storage, and
0
software, in addition to providing enhanced
0
1 storage capabilities.
8
Definition of a computer network
A computer network is a set of interconnected
computers that can share data, resources,
services. This and allows
interconnection and collaboration between different
communication
C
devices, often over significant distances, for
by
S
following a set of rules and protocols to send and
0
0
receive information. These networks can range from
1
small local area networks in a home or office to vast
global networks such as the internet.
9
Basic concepts and terminology
In the computer networking, several fundamental concepts and terminologies
are foundational to understanding how networks operate. Here is a brief
overview of some of these basic terms:
• Node
A node is any device connected to a network such as a computer, printer, or
C
any other device capable of sending or receiving data.
S
0
0
1
10
Basic concepts and terminology
• Network Interface Cards (NICs)
are hardware components that allow computers to connect to a network.
They act as the interface between the computer's internal circuitry and the
network cables or wireless signals, facilitating data transmission between the
two.
C
S
0
0
1
Wireless NIC Wired NIC
11
Basic concepts and terminology
• Data Packet
A packet is a formatted unit of data carried by a packet-switched network. In
networking, data is typically broken down into manageable packets before
transmission.
0
0 packets
Sender Receiver
1
12
Basic concepts and terminology
• Protocol
A protocol is a set of rules governing the format and transmission of data.
Examples include the Transmission Control Protocol (TCP) and the Internet
Protocol (IP).
0
0 Set of rules
1 Sender Receiver
13
Basic concepts and terminology
• IP Address
An Internet Protocol (IP) Address is a unique string of numbers separated by
periods or colons that identifies each computer using the IP to communicate
over a network.
S 123.25.91.7
0
0 4 parts
1 3 periods
Each part has number (0-255)
14
Basic concepts and terminology
• MAC Address
A MAC (Media Access Control) address is a unique identifier assigned to a
network interface controller (NIC) for use as a network address in
communications within a network segment.
Structure:
C
• Length: 48 bits.
S • Format: It's usually represented as six
0 groups of two hexadecimal digits, separated
0 by colons (e.g., 00:1A:2B:3C:4D:5E) or
1
hyphens (e.g., 00-1A-2B-3C-4D-5E).
15
Basic concepts and terminology
• Bandwidth
refers to the maximum rate of data transfer
across a network or internet connection. It data
determines how much data can be sent Sender Receiver
C
over a specific connection in a
S given
D
0 amount of time. Bandwidth is
0 typically
measured in bits per second (bps) or its A
1 Sender T Receiver
higher multiples such as Mbps (megabits a
per second) or Gbps (gigabits per second).
16
Basic concepts and terminology
• Router
A router connects multiple networks together and routes
data packets between them. Typically used in homes and
businesses to connect the local network to the internet
and to route traffic between different networks.
C
Router
S • Switch
A switch connects devices within a single network, using
Switch
0
0 MAC addresses to forward data to the appropriate device.
1 Commonly used in businesses, data centers, and large
networks to connect multiple devices within the same
local network.
17
Basic concepts and terminology
• Hub
Is a basic networking device that connects multiple
devices in a local area network (LAN). It
Hub
broadcasts
data to all connected devices. Can cause network
C
congestion due to broadcasting to all devices.
S
Key Difference between hub and switch :
0
0
A switch is more efficient than a hub as it sends data
1
only to the intended recipient, whereas a
hub broadcasts data to all devices.
18
Basic concepts and terminology
• Physical cabling
Physical cabling serves as the backbone of a network's infrastructure, enabling
the transfer of data between different devices within the network. There are
several types of physical cables used in networking, each suitable for different
C
requirements and network environments.
S
Here is an overview of common network cable types:
0
0 • Twisted Pair Cable.
1
• Coaxial Cable.
• Fiber Optic Cable.
19
Basic concepts and terminology
Physical cabling
• Twisted Pair Cable
1.Unshielded Twisted Pair (UTP): The most common type
of networking cable. It's composed of pairs of wires
C twisted together to reduce electromagnetic interference.
UTP comes in different categories, such as CAT5e, CAT6
S
and CAT7, each supporting different speeds and
0
bandwidths.
0
1 2.Shielded Twisted Pair (STP): Like UTP, but each pair of
wires is additionally shielded by foil to provide better
protection against electromagnetic interference.
20
Basic concepts and terminology
Physical cabling
• Coaxial Cable
Used for cable internet connections and cable television. It has
a single copper conductor at its center, a plastic layer providing
insulation between the conductor and a braided metal shield.
C
S
• Fiber Optic Cable
0 Transmits data as light, allowing for very high transmission
0
speeds and longer distances than wire cables. It's immune to
1
electromagnetic interference and is used for backbones, long-
distance communication.
21
Basic concepts and terminology
Physical cabling
Considerations for Network Cabling:
• Distance: Cable types have maximum distance ratings; fiber optics provide
the longest reach.
• Interference: Environments with heavy machinery or fluorescent lighting
C
might require shielded cabling.
S
• Cost: Fiber optics provide high bandwidth and immunity to interference but
0 can be more costly than copper cables.
0
• Installation: Some cables are more flexible and easier to install through
1
conduits ()قنواتand tight spaces, while others are more fragile and require
careful handling, such as fiber optic cables.
22
Benefits of networks
Benefits of Computer Networks:
1. Communication: Networks enable real-time communication, be it through
emails, instant messaging, or video calls.
2. Resource Sharing: Enabling multiple devices to use the same hardware
resources (like printers and scanners) or software applications.
C
3.Storage: Providing centralized data storage, which can be more secure and
S economical than maintaining data across numerous individual devices.
4.Cost-Effectiveness: Reduces the cost of operations by centralizing resources
0
0 and infrastructure, thereby cutting down on hardware and software expenses.
1
5.Collaboration: Promotes collaborative efforts across different geographic
locations, allowing multiple people to work on the same documents or
projects.
23
Types of Computer Networks
Computer networks can be categorized based on their size, range,
and
structure. Here are the primary types of networks you will encounter:
1.Local Area Network (LAN)
• Description: LANs are networks confined to a
small geographic area, like a single building or a
C
campus. They are typically owned, controlled,
S and managed by a single person or organization.
• Features: High transfer speeds, low latency, and LAN
0
0 relatively easy to manage. Uses technologies such
1
as Ethernet and Wi-Fi.
• Usage: Office buildings, homes, schools,
and laboratories.
24
Types of Computer Networks
2.Wide Area Network (WAN)
• Description: WANs encompass broad
geographic areas, crossing city, regional, or
LAN
national boundaries. The internet is the
largest WAN, spanning the entire globe.
C
• Features: Lower speed compared to LANs WAN
S and higher latency. They commonly use
LAN
routers and are not restricted to a single
0 LAN
0 organization.
1
• Usage: Used for multinational businesses,
government agencies, and when
connecting disparate ()مختلفةLANs.
25
Types of Computer Networks
3. Metropolitan Area Network (MAN)
• Description: A MAN spans a
larger city
area than a LAN but is
confined to a single metropolitan area, LAN
typically
city, or town.
C
• Features: It is larger than a LAN and
Man
S often combines multiple LANs into a
LAN
single larger network, which enables
0
LAN
0 efficient sharing of regional resources.
1
• Usage: City-wide government
networks, large universities.
26
Network Topologies
Network topology refers to the layout pattern of interconnections among the
various elements (nodes, links, etc.) of a computer network. It can also refer to
the physical or logical way in which the network is wired. Here's a common
network topologies:
C
• Bus.
S
• Star.
0
0 • Ring.
1
• Mesh.
27
Network Topologies
Bus Topology
• Structure: All devices are connected to a single central cable, known as the
bus or backbone.
• advantage: Easy to implement and extend; requires less cable than other
topologies.
C
• disadvantage: The failure of the central cable will bring down the entire
S network. Limited cable length and number of stations.
0
0
1
28
Network Topologies
Star Topology
• Structure: All devices are connected to a central hub. The hub can be a hub
or switch which acts as a conduit to transmit messages.
• advantage : Easy to install and manage. Failure of one node does not affect
the rest of the network.
C
• disadvantage: If the central hub fails, the whole network is inoperable.
S Requires more cable than bus topology.
0
0
1
29
Network Topologies
Ring Topology
• Structure: Each device is connected to
two other devices, forming a circular
data path. Messages travel around the
ring until they reach their destination.
C
• advantage : Data is quickly transferred
S without a central hub. Adding
additional nodes has little impact on
0
0 bandwidth.
1
• disadvantage: A break in the ring (such
as a failure in any single workstation or
cable) can result in network failure.
30
Network Topologies
Mesh Topology
• Structure: Every device is connected to every other device on the network,
providing multiple pathways for data to travel.
• advantage : Highly reliable, as there is no single point of failure. Provides
robust fault tolerance and ease of troubleshooting.
C
• disadvantage: Costly and complex due to the amount of cabling and the
S number of I/O ports required.
0
0
1
31
Sending Data Long-Distance
Packet-Switching Networks
• Most networks use packet-switching technology. The sending computer
divides information into tiny segments called packets. Each packet is marked
with a delivery address, so packet transfers are quick and accurate. When
you transfer a file, send an email, or even browse a website, you’re sending
and receiving packets.
C
Circuit-Switching Networks
S
• Some WANs use circuit-switching technology to transmit messages. Circuit-switching
happens on a real, end-to-end connection between the sending computer and the
0
receiving computer, which make up the circuit. There’s no delay on circuit-switching
0
networks, so they are ideal for sending voice messages and for teleconferencing. A
1
telephone network uses circuit-switching
32
Models of network
In networking, the two primary models of
network architecture are client-server and
peer-to-peer (P2P). Each has distinct features,
advantages, and disadvantages, making them
suitable for different situations.
C
Client-Server Network:
S In a client-server network, one or more
central servers provide services to the client
0
0 computers. These services can include access
1
to web pages, data storage, email, or other
resources.
33
Models of network
Client-Server Network:
Features:
• Centralized server(s) that manage resources and security.
• Clients request services from the server.
• Can be expanded to serve many clients.
C
• Servers are often more powerful than clients and are dedicated to their
S tasks.
0
0
1
34
Models of network
Client-Server Network:
Advantages:
• Centralized control over the network, including security and updates.
• Easier to backup and manage data.
• Efficient resource sharing.
C
S Disadvantages:
• Server dependence means that if the server goes down, the services it
0
0 provides become unavailable.
1
• Can be expensive to set up and maintain due to the need for powerful
server hardware and software.
35
Models of network
Peer-to-Peer Network:
In a peer-to-peer network, each computer, known as
a peer, can act as both a client and a server. Peers
share resources among each other without the need
for a centralized server.
C
Features:
S • No central server; all computers are equal and
operate both as client and server.
0
0 • Direct sharing of files and resources
1
between peers.
• Simple to configure and less costly to set up.
36
Models of network
Peer-to-Peer Network:
Advantages:
• Reduced costs since there is no need for a server.
• Easy setup and maintenance.
• Each user has control over their own shared resources.
C
S Disadvantages:
• Not ideal for large networks; can become inefficient as the network grows.
0
0 • Each peer must manage its own security.
1
• Lack of centralized backups can lead to data redundancy issues.
37
Wireless Networking Technologies
Wireless communications have two main uses:
The first use:
• At the endpoints of network connectivity. where a device such as a smartphone or
laptop computer connects wirelessly to a router or other device that provides
network and/or Internet accessEasy setup and maintenance.
The Second use:
C
• as a source of transferring data between locations when using cables is not
practical,
S
such as with satellite and microwave systems.
0
0
1
38
Wireless Networking Technologies
Wireless communications have two tow common technologies:
• Wi-Fi:
Wi-Fi is short for wireless fidelity, often referred to by its standard number: IEEE
802.11. It’s the common name for the wireless networking technology that’s used for
almost all home or workplace or in a public location such as a cafe or library and
business networks today.
C • Bluetooth
S
Bluetooth is a wireless technology used to connect individual devices to one another in
0
close proximity. It is most used to connect a computer to an input or output device. For
0
1 example, Bluetooth headphone that you use with your smartphone.
When the devices are no longer in range of one another, the PAN stops. Bluetooth is
limited to about 20 feet in range, so it isn’t a practical technology to use for wireless
39
networking in general
Network Protocols and the OSI Model
Network protocols are sets of established rules that dictate how to format,
transmit, and receive data so computer network devices can communicate
regardless of the differences in their underlying infrastructures, designs, or
standards. The most important protocols in networking can vary depending on
C
context and use, but generally, the Internet Protocol (IP) and the Transmission
S
Control Protocol (TCP) are among the most crucial for the functioning of the
0
0
internet and most networks.
1
40
Network Protocols and the OSI Model
TCP/IP (Transmission Control Protocol/Internet Protocol): This is the
foundational communication protocol suite of the internet and most
local networks, defining how data should be packetized, addressed,
transmitted, routed, and received.
C
HTTP (Hypertext Transfer Protocol): HTTP is used for transferring
S web pages on the internet. When a user accesses a web page, HTTP
is the protocol that delivers the page from the server to the user’s
0
0 browser.
1
HTTPS (HTTP Secure): An extension of HTTP, it is used for secure
communication over a computer network within a web browser.
41
Network Protocols and the OSI Model
FTP (File Transfer Protocol): As its name suggests, FTP is
used for the transfer of files between a client and a server
on a network.
DNS (Domain Name System): DNS translates human-
C
readable domain names (like www.example.com)
S 123.25.91.7
into machine-readable IP addresses. Ex:
0
0 DHCP (Dynamic Host Configuration Protocol): DHCP
1
automatically assigns a dynamic IP address to each device on
a network so they can communicate with other IP networks.
42
Network Protocols and the OSI Model
Sender Receiver
Application Layer 7 Application
Presentation Layer 6 Presentation
C
Session Layer 5 Session
S
Transport Layer 4 Transpor
0 t
Network Layer 3 Network
0
1 Data Link Layer 2 Data Link
Physical Layer 1 Physical
43
Network Protocols and the OSI Model
The OSI Model:
The Open Systems Interconnection (OSI) model is a conceptual framework
used to understand and implement standard protocols to facilitate
interoperability in networking. It divides the networking process into seven
layers:
C
1.Physical Layer: Concerned with the transmission and reception of the
S unstructured raw bit stream over a physical medium.
0
0 2.Data Link Layer: Provides node-to-node data transfer—a link between two
1
directly connected nodes. It also handles error correction from the physical
layer.
44
Network Protocols and the OSI Model
The OSI Model:
3.Network Layer: Handles the routing of the data (sending it in the right
direction to the correct destination on outgoing transmissions and receiving
incoming transmissions at the packet level).
C
4.Transport Layer: Provides transparent transfer of data between end systems,
S or hosts, and is responsible for end-to-end error recovery and flow control.
0
0 5.Session Layer: Controls the connections between computers. It establishes,
1
manages, and terminates the connections between the local and remote
application.
45
Network Protocols and the OSI Model
The OSI Model:
6.Presentation Layer: Translates data between the application layer and the
network format. It ensures that data is in a usable format and is where data
encryption occurs.
C
7.Application Layer: Is the closest layer to the end user, which means both the
S OSI application layer, and the user interact directly with the software
application. This layer interacts with software applications that implement a
0
0 communicating component.
1
46
Reference
s
• Weixel, S., (2018). Introduction to Computers and Information
Technology. Pearson.
Restricted
Restricted - مقيد
- مقيد