




























































































Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An introduction to computer networks, discussing the concepts of network connections, categories of networks, network topologies, network configurations, expanding networks, network segmentation, and network performance parameters. It also covers special types of networks and network devices.
What you will learn
Typology: Lecture notes
1 / 113
This page cannot be seen from the preview
Don't miss anything!
In centralized computing there is a computer with single powerful CPU and a number of terminals are connected to it as shown in the figure on slide 6. All processing is performed within the boundaries of the same physical computer. User terminals are typically dumb ones, incapable of functioning on their own. They are cabled to the central computer. Sometimes these terminals have very little processing power and memory of their own and are called intelli- gent terminals.
This architecture places the tremendous burden on the central computer. In recent years, there have been significant advances in the development of high performance personal comput- ers and networks. There is now an identifiable trend in industry towards downsizing, i.e. replacing expensive mainframe com- puters with more cost effective networks of personal computers that achieve the same or even better results.
Sharing Resources I Resource sharing means sharing H/W and S/W. Hardware Resource Sharing: Networked Computers can share:
Software Resource Sharing:
Preserving Information Besides, information and resource sharing a network al- lows information to be backed up to a central location. Important information can be lost by mistake or acci- dentally when a stand alone computer has no backup means. It is also difficult to maintain regular backups on a num- ber of stand alone computers. In a networked environment when we take backup at a central location from all computers, we have one place to preserve it.
Protecting Information With stand alone computer, access to the computer means access to the information on that computer. Networks provide an additional layer of security by means of passwords. We can give each network user a different account name and password, allowing the network server to distinguish among those who need access to have it and protecting the information from tampering by those who do not.
Components of a Data Communication System II (^4) Transmission Medium: The transmission medium is the physical path by which a message travels from sender to receiver. Some examples of transmission media include twisted-pair wire, coaxial cable, fiber-optic cable, and radio waves
Components of a Data Communication System III (^5) Protocol: A protocol is a set of rules that govern data communications. It represents an agreement between the communicating devices. Without a protocol, two devices may be connected but not communicating, just as a person speaking French cannot be understood by a person who speaks only Japanese.
Transmission Modes II
Transmission Modes III
Broadcast Networks I
Broadcast Networks II