LESSON 1 INTRODUCTION TO DATA COMM COMPUTER NETWORKs
LESSON 1 INTRODUCTION TO DATA COMM COMPUTER NETWORKs
LESSON 1 INTRODUCTION TO DATA COMM COMPUTER NETWORKs
PAUL’S UNIVERSITY
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 1
CHAPTER ONE;
Voice over IP (VoIP): Voice over Internet Protocol (IP) is a revolutionary change in
telecommunication which allows to send telephone calls (voice data) using standard Internet
Protocol (IP) rather than by traditional PSTN.
NB:
A network must be able to meet certain criterias, these are mentioned below:
1. Performance
2. Reliability
3. Scalability
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 3
1.3 Basic Hardware components of a network:
Network Cables
Network cables are the transmission media to transfer data from one device to another. A
commonly used network cable is category 5 cable with RJ – 45 connector, as shown in the image
below:
Servers - Servers are computers that hold shared files, programs, and the network operating
system. Servers provide access to network resources to all the users of the network. There are
many different kinds of servers, and one server can provide several functions. For example, there
are file servers, print servers, mail servers, communication servers, database servers, fax servers
and web servers, to name a few.
Clients - Clients are computers that access and use the network and shared network resources.
Client computers are basically the customers(users) of the network, as they request and receive
services from the servers.
Routers
A router is a connecting device that transfers data packets between different computer networks.
Typically, they are used to connect a PC or an organization’s LAN to a broadband internet
connection. They contain RJ-45 ports so that computers and other devices can connect with them
using network cables.
A repeater receives a signal and regenerates it before re-transmitting so that it can travel longer
distances.
A hub is a multiport repeater having several input/output ports, so that input at any port is
available at every other port.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 4
Hub - Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer requests information from a network or a specific computer,
it sends the request to the hub through a cable. The hub will receive the request and transmit it to
the entire network. Each computer in the network should then figure out whether the broadcast
data is for them or not.
A switch receives data from a port, uses packet switching to resolve the destination device and
then forwards the data to the particular destination, rather than broadcasting it as a hub.
Unlike a hub, switch doesn't broadcast the received message to entire network, rather before
sending it checks to which system or port should the message be sent. In other words, switch
connects the source and destination directly which increases the speed of the network. Both
switch and hub have common features: Multiple RJ-45 ports, power supply and connection lights.
Bridges
A bridge connects two separate Ethernet network segments. It forwards packets from the source
network to the destined network.
Gateways
A gateway connects entirely different networks that work upon different protocols. It is the entry
and the exit point of a network and controls access to other networks.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 5
1.4 NETWORK CLASSIFICATION
a) LOCAL AREA NETWORK (LAN)
It is also called LAN and designed for small physical areas such as an office, group of buildings
or a factory. LANs are used widely as it is easy to design and to troubleshoot. Personal computers
and workstations are connected to each other through LANs. We can use different types of
topologies through LAN, these are Star, Ring, Bus, Tree etc.
LAN can be a simple network like connecting two computers, to share files and network among
each other while it can also be as complex as interconnecting an entire building.
LAN networks are also widely used to share resources like printers, shared hard-drive etc.
Characteristics of LAN
LAN's are private networks, not subject to tariffs or other regulatory controls.
LAN's operate at relatively high speed when compared to the typical WAN.
There are different types of Media Access Control methods in a LAN, the prominent ones
are Ethernet, Token ring.
It connects computers in a single building, block or campus, i.e. they work in a restricted
geographical area.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 6
Applications of LAN
One of the computer in a network can become a server serving all the remaining
computers called clients. Software can be stored on the server and it can be used by the
remaining clients.
Connecting Locally all the workstations in a building to let them communicate with each
other locally without any internet access.
Sharing common resources like printers etc are some common applications of LAN.
Advantages of LAN
Resource Sharing: Computer resources like printers, modems, DVD-ROM drives and
hard disks can be shared with the help of local area networks. This reduces cost and
hardware purchases.
Software Applications Sharing: It is cheaper to use same software over network instead
of purchasing separate licensed software for each client a network.
Easy and Cheap Communication: Data and messages can easily be transferred over
networked computers.
Centralized Data: The data of all network users can be saved on hard disk of the server
computer. This will help users to use any workstation in a network to access their data.
Because data is not stored on workstations locally.
Data Security: Since, data is stored on server computer centrally, it will be easy to
manage data at only one place and the data will be more secure too.
Internet Sharing: Local Area Network provides the facility to share a single internet
connection among all the LAN users. In Net Cafes, single internet connection sharing
system keeps the internet expenses cheaper.
Disadvantages of LAN
High Setup Cost: Although the LAN will save cost over time due to shared computer
resources, but the initial setup costs of installing Local Area Networks is high.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 7
Privacy Violations: The LAN administrator has the rights to check personal data files of
each and every LAN user. Moreover he can check the internet history and computer use
history of the LAN user.
Data Security Threat: Unauthorised users can access important data of an organization if
centralized data repository is not secured properly by the LAN administrator.
LAN Maintenance Job: Local Area Network requires a LAN Administrator because,
there are problems of software installations or hardware failures or cable disturbances in
Local Area Network. A LAN Administrator is needed at this full time job.
Covers Limited Area: Local Area Network covers a small area like one office, one
building or a group of nearby buildings.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 8
Characteristics of MAN
Advantages of MAN
Extremely efficient and provide fast communication via high-speed carriers, such as fibre
optic cables.
It provides a good back bone for large network and provides greater access to WANs.
The dual bus used in MAN helps the transmission of data in both directions
simultaneously.
A MAN usually encompasses several blocks of a city or an entire city.
Disadvantages of MAN
More cable required for a MAN connection from one place to another.
It is difficult to make the system secure from hackers and industrial espionage(spying)
graphical regions.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 9
Characteristics of WAN
Advantages of WAN
Covers a large geographical area so long distance business can connect on the one
network.
Shares software and resources with connecting workstations.
Messages can be sent very quickly to anyone else on the network. These messages can
have picture, sounds or data included with them(called attachments).
Expensive things(such as printers or phone lines to the internet) can be shared by all the
computers on the network without having to buy a different peripheral for each computer.
Everyone on the network can use the same data. This avoids problems where some users
may have older information than others.
Disadvantages of WAN
Need a good firewall to restrict outsiders from entering and disrupting the network.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 10
Setting up a network can be an expensive, slow and complicated. The bigger the network
the more expensive it is.
Once set up, maintaining a network is a full-time job which requires network supervisors
and technicians to be employed.
Security is a real issue when many different people have the ability to use information
from other computers. Protection against hackers and viruses adds more complexity and
expense.
Peer-To-Peer network
Client/Server network
Peer-To-Peer network
Peer-To-Peer network is a network in which all the computers are linked together with
equal privilege and responsibilities for processing the data.
Peer-To-Peer network is useful for small environments, usually up to 10 computers.
Peer-To-Peer network has no dedicated server.
Special permissions are assigned to each computer for sharing the resources, but this can
lead to a problem if the computer with the resource is down.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 11
Advantages Of Peer-To-Peer Network:
In the case of Peer-To-Peer network, it does not contain the centralized system .
Therefore, it cannot back up the data as the data is different in different locations.
It has a security issue as the device is managed itself.
Client/Server Network
Client/Server network is a network model designed for the end users called clients, to
access the resources such as songs, video, etc. from a central computer known as Server.
The central controller is known as a server while all other computers in the network are
called clients.
A server performs all the major operations such as security and network management.
A server is responsible for managing all the resources such as files, directories, printer,
etc.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 12
All the clients communicate with each other through a server. For example, if client1
wants to send some data to client 2, then it first sends the request to the server for the
permission. The server sends the response to the client 1 to initiate its communication with
the client 2.
A Client/Server network contains the centralized system. Therefore we can back up the
data easily.
A Client/Server network has a dedicated server that improves the overall performance of
the whole system.
Security is better in Client/Server network as a single server administers the shared
resources.
It also increases the speed of the sharing resources.
Source
Data to be transmitted is generated by this device, example: telephones, personal computers etc.
Transmitter
The data generated by the source system is not directly transmitted in the form its generated. The
transmitter transforms and encodes the data in such a form to produce electromagnetic waves or
signals.
Transmission System
A transmission system can be a single transmission line or a complex network connecting source
and destination.
Receiver
Receiver accepts the signal from the transmission system and converts it into a form which is
easily managed by the destination device.
Destination
Destination receives the incoming data from the receiver.s
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 14
5. Protocol: These are some set of rules which govern data communication.
DISADVANTAGES:
a) It lacks independence.
Computer networking involves a process that is operated using computers, so people will be
relying more of computer work, instead of exerting an effort for their tasks at hand. Aside
from this, they will be dependent on the main file server, which means that, if it breaks down,
the system would become useless, making users idle.
b) It poses security difficulties.
Because there would be a huge number of people who would be using a computer network to
get and share some of their files and resources, a certain user’s security would be always at
risk. There might even be illegal activities that would occur, which you need to be careful
about and aware of.
c) It lacks robustness.
As previously stated, if a computer network’s main server breaks down, the entire system
would become useless. Also, if it has a bridging device or a central linking server that fails,
the entire network would also come to a standstill. To deal with these problems, huge
networks should have a powerful computer to serve as file server to make setting up and
maintaining the network easier.
d) It allows for more presence of computer viruses and malware.
There would be instances that stored files are corrupt due to computer viruses. Thus, network
administrators should conduct regular check-ups on the system, and the stored files at the
same time.
e) Its light policing usage promotes negative acts.
It has been observed that providing users with internet connectivity has fostered undesirable
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 16
behavior among them. Considering that the web is a minefield of distractions—online games,
humor sites and even porn sites—workers could be tempted during their work hours. The
huge network of machines could also encourage them to engage in illicit practices, such as
instant messaging and file sharing, instead of working on work-related matters. While many
organizations draw up certain policies on this, they have proven difficult to enforce and even
engendered resentment from employees.
f) It requires an efficient handler.
For a computer network to work efficiently and optimally, it requires high technical skills
and know-how of its operations and administration. A person just having basic skills cannot
do this job. Take note that the responsibility to handle such a system is high, as allotting
permissions and passwords can be daunting. Similarly, network configuration and connection
is very tedious and cannot be done by an average technician who does not have advanced
knowledge.
g) It requires an expensive set-up.
Though computer networks are said to be an inexpensive system when it is already running,
its initial set up cost can still be high depending on the number of computers to be connected.
Expensive devices, such as routers, switches, hubs, etc., can add up to the cost. Aside from
these, it would also need network interface cards (NICs) for workstations in case they are not
built in.
BY: MR. KEVIN NJAGI (LECTURER – ST. PAUL’S UNIVERSITY) @JAN - APRIL 2024 17