Computer Network
Computing applications
Group 1
Saba Talib 234497
Amna Nisar 234499
Attia Nahid 234486
What is a network?
• A network consists of two or more computers that are
linked in order to share resources, exchange files, or
allow electronic communications.
• The computers on a network may be linked through
cables, telephone lines, radio waves, satellites, or
infrared light beams.
Network
Definition of computer network
• A computer network is a set of computers sharing
resources located on or provided by network nodes.
• Computers use common communication protocols over
digital interconnections to communicate with each other.
• Computer Networks Allow Resources to Be Shared.
• Networking computers together improves
communication, resource sharing, and productivity,
enabling businesses to streamline operations and
facilitate collaboration
Computer network
Types of network topology
Types of computer network
• PAN (Personal Area Network)
• LAN (Local Area Network)
• CAN (Campus Area Network)
• MAN (Metropolitan Area Network)
• WAN (Wide Area Network)
PAN (Personal Area Network)
• A personal area network (PAN) connects electronic
devices within a user's immediate area.
• The size of a PAN ranges from a few centimeters to a few
meters.
• One of the most common real-world examples of a PAN
is the connection between a Bluetooth earpiece and a
smartphone.
A personal area network (PAN)
LAN (Local Area Network)
• A local area network (LAN) is a computer network that
interconnects computers within a single physical
location, which could range from a home network with
one user to a large network at a school or office
building.
• A LAN can be small or large, ranging from a home
network with one user to an enterprise network with
thousands of users and devices in an office or school.
Local Area Network (LAN)
CAN ( Campus Area Network)
• A campus area network (CAN) is a computer network that
spans a limited geographic area.
• CANs interconnect multiple local area networks (LAN)
within an educational or corporate campus.
• Much like a university campus network, a corporate
campus network serves to connect buildings.
• Examples of such are the networks at Googleplex and
Microsoft's campus.
Campus Area Network(CAN)
MAN (Metropolitan Area Network)
• A metropolitan area network (MAN) is a computer
network that connects computers within a metropolitan
area.
• Which could be a single large city, multiple cities and
towns, or any given large area with multiple buildings.
• A MAN is larger than a local area network (LAN) but
smaller than a wide area network (WAN).
Metropolitan area network (MAN)
WAN (Wide Area Network)
• A wide-area network is the technology that connects your
offices, data centers, cloud applications, and cloud
storage together.
• It is called a wide-area network because it spans beyond
a single building or large campus to include multiple
locations spread across a specific geographic area, or
even the world.
Wide Area Network (WAN)
Network topology
Network topology is the arrangement of the elements (links, nodes etc.) of a
communication network. Network topology can be used to define or describe the
arrangement of various types of telecommunication networks, including command and
control radio networks, industrial fieldbusses and computer networks.
Example:
Examples of network topologies are found in local area networks (LAN), a
common computer network installation.
Catagorey:
There are two category of network topology.
1. Physical topology
2. Logical topology
physical topology:
Physical Topology refers to the arrangement of devices and cables in a computer network. It
describes how the devices are connected physically, such as in a bus, ring, or star shape.
Logical topology:
Logical Topology refers to the way data is transmitted from one node to another on a network,
such as in a broadcast (bus) or sequential (ring) manner. It defines how devices communicate
logically on a network regardless of the physical layout.
Logical topology refers to the abstract representation of how data flows and is transmitted within
a network, independent of its physical layout.
Types of Physical Topology:
The arrangement of a network that comprises nodes and connecting lines via sender and
receiver is referred to as network topology . On the basis of arrangements, Physical Topology has
several types:
Types:
1. Point to point topology
2. Bus topology.
3. Ring topology.
4. Star topology.
5. Tree topology.
6. Mesh topology.
7. Hybrid topology.
point to point topology:
Point to point is a simple topology that directly links two nodes and reserves the entire
bandwidth of the connection for them to communicate with one another. Physically, point-to-
point connections rely on a cable or wire that connects the two endpoints.
Bus topology:
Bus topology is a type of network topology in which all devices are connected to a
single cable called a bus. A bus network is a network topology in which nodes are
directly connected to a common half-duplex link called a bus.
A host on a bus network is called a station. In a bus network, every station will receive
all network traffic, and the traffic generated by each station has equal transmission
priority. A bus network forms a single network segment and collision domain. In order
for nodes to share the bus, they use a medium access control technology such
as carrier-sense multiple access (CSMA) or a bus master.
Ring topology:
Ring topology is a type of network configuration where devices are connected in a
circular manner, forming a closed loop. In this setup, each device is connected to
exactly two other devices, creating a continuous pathway for data transmission.
The Ring Network diagram is designed like a circle. Meaning the connection
between devices is formed like a ring, thus making the connection to another
computer. In this model, the last node is combined with the first one. This ring
topology uses tokens to pass information from one computer to another.
Star topology:
A star topology, sometimes known as a star network, is a network topology in which
each device is connected to a central hub.
Star topologies are commonly used in modern computer networks, as they allow for
reliable, efficient connections between multiple machines.
Tree topology:
In computer networking, tree topology is a type of network topology that
resembles a tree. In a tree topology, there is one central node (the “trunk”), and
each node is connected to the central node through a single path. Nodes can be
thought of as branches coming off of the trunk.
Mesh topology:
A mesh topology is a network setup where each computer and network device is interconnected with one
another.
type of computer network in which each node (computer or other device) is connected to every other node in the
network. This type of network is often used in large organisations or companies because it can handle a large
amount of data traffic and can be easily expanded.
Hybird topology:
Hybrid topology is a network structure that combines two or more different types of topologies, such as star, ring,
bus, or mesh. It's designed to leverage the strengths and minimize the weaknesses of the individual topologies it
incorporates.
Network devices
Network devices are physical devices that allow hardware on a computer network to
communicate and interact with each other.
• Router
• Switch
• Hub
• Network interface card (NIC)
• Brouter
They ensure efficient communication between connected devices by controlling data transfer,
boosting signals, and linking different networks. Each device serves a specific role, from simple
data forwarding to complex routing between networks.
Router:
A router is a switching device for networks, which is able to route network packets, based on
their addresses, to other networks or devices. Among other things, they are used for Internet
access, for coupling networks or for connecting branch offices to a central office via VPN (Virtual
Private Network).
Switch:
A network switch connects network devices (printers, computers, and wireless devices/access
points, and enables users to exchange data packets. Switches may be both hardware and
software-based virtual devices that govern physical systems.
Switches are key building blocks for any network. They connect multiple devices, such as
computers, wireless access points, printers, and servers; on the same network within a building
or campus. A switch enables connected devices to share information and talk to each other.
Hub network device:
In networking, a hub is a device that links multiple computers and devices together. Hubs can
also be referred to as repeaters or concentrators, and they serve as the center of a local area
network (LAN). In a hub, each connected device is on the same subnet and receives all data sent
to the hub.
Its primary function is to receive data signals from connected devices and broadcast them to all
other connected devices, regardless of the intended recipient.
Network interface card:
A network interface card is a piece of hardware that allows computers to communicate with
other devices on a network. It can also be called an Ethernet card, LAN card, or network adaptor.
A NIC provides a dedicated connection to a network.
Whether you are using wireless, wired or fiber optic, the NIC allows for communication between
the computer and the network, and networked devices, including, eventually connecting to the
Internet.
Brouter:
A bridge router or brouter is a network device that works as a bridge and as a router. The brouter
routes packets for known protocols and simply forwards all other packets as a bridge would.
Brouters operate at both the network layer for routable protocols and at the data link layer for
non-routable protocols.
Computer Network Security
It is the use of technologies , policies and procedures to protect a
network from unauthorized access , cyberattacks and data loss.
Tools use for network security:
IPS
VPN
Firewall
Encryption
Authentication
Access control
Tools use for network security:
1. IPS:
Intrusive Prevention System monitor network activity for malicious
activity and take action to prevent it.
It can be a software or a hardware device.
2. VPN:
Virtual Private Network is used to establish a secure and reliable
connection over unsecure network.
It will encrypt the user’s data and mask their IP address and
location.
This allow users to securely access corporate network, even
through public Wi-Fi.
3. Firewall:
It monitors and control incoming and outgoing traffic based on
predefined rules.
It act as a barrier between a trusted internal network and an
untrusted external network.
It can block IP address , full network and a service.
4. Encryption:
The process of converting plaintext data into unreadable ciphertext
to protect it from unauthorized access.
It uses encryption key generated by
an algorithm.
It is used to prevent unauthorized parties from reading it.
5. Authentication:
The process of verifying the identity of devices or users on a
network.
It is used by a server when the server needs to know exactly who is
accessing their information or site.
6. Access Control:
It is used for limiting users to access to network resources. It may be
physical or logical.
PHYSICAL: Access to computer , building and rooms.
LOGICAL: Access to connection to computer network, system files and
data.
Computer Network Applications
1. Communicating Applications:
Software program that enables users to communicate with each
other over a computer network.
Example: E-mail, instant messaging apps(WhatsApp , skype) , Video
conferencing tools (zoom , Google meet) , social media platform
(facebook ,twitter).
2. File Transfer Application:
File transfer are software program that enables users to transfer files
between devices over a computer network.
Example: File transfer protocol (FileZilla), peer to peer file sharing
programs(BitTorrent) , cloud storage devices(Google Drive).
3.Remote Access Application:
Remote access application are software programs that enables users to
access and control remote computer, devices, or network over the
internet or other network.
Example: Remote desktop protocol, Virtual private network.
4.Online Collaboration Application:
These are software programs that enables teams to work together on
projects ,share files and communicate with each other over the internet.
Example: Project management tools (Asana), Collaborative document
editing software (Microsoft Teams), Online learning platforms (Moodle).
5. Gaming Application:
These are software programs that enables users to play video games on
various devices ,such as PCs and mobile devices.
Example: Online multiplayer games (fortnite) ,Cloud gaming services
(Google Stadia).