0 ratings 0% found this document useful (0 votes) 14 views 20 pages COMPUTER NETWORKING - Phoenix
The document provides an overview of computer networking, including definitions, network models (peer-to-peer and client/server), types of networks (LAN, WAN, etc.), and network topologies (bus, ring, star, tree, and mesh). It also covers network mediums, IP addressing, protocols, and the OSI model, as well as basic instructions for using Corel Draw and database management concepts. The information is structured to educate readers on the fundamental aspects of networking and related technologies.
AI-enhanced title and description
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here .
Available Formats
Download as PDF or read online on Scribd
Go to previous items Go to next items
Save COMPUTER NETWORKING_Phoenix For Later _l L
COMPUTER NETWORKING
Networking:ls the linking or connecting of two or more computers or computing
devices to communicate and share resources. Or the interfacing of two or more
computing devices with each other for the purpose of sharing resources. Oris a
collection of various computing devices that are connected in various ways in or
der to communicate and share resources. The connection is done using wires 0
r cable or wireless devices
NETWORK MODELS OR DESIGN /ARCHITECTURE
The two main models or design of networking are
(a)Peer to peer
(b) Client/Server
PEER TO PEER
Peer to peer network model is a type of model or design where all the workstati
‘ons, nodes, computers has equal access, equal capabilities and responsibilities.
The resources are distributed between the various clients that made up networ
k. Democratic process is followed in peer to peer model. Peer to peer network i
s easy to connect andis generally used in homes and small offices. Computers
in such network connect to each others directly.
CLIENT/SERVER MODEL
Is the type of network model which has a centralized device/computer called se
tver that control, monitor the communication and the sharing of resources. In cli
ent/server network is only authorized users can gain access to the network and
the resources. |t requires the installation of software that assist in the controllin
g and monitoring of the network. This type of network is dictatorship in nature s
ince the server only can permit access
Server: Is the computer that monitor, control access and resources sharing ont
he network.Client: Is the computer that accessresource from server.
DIFFERENCES BETWEEN PEER TO PEER AND CLIENT/SERVER MODEL/DESIGN
PEER TO PEER
1.Each work station node has equal access tot
he network and the resources
CLIENT/SERVER
One computer act as the network controll
er and the resources.
2.Easy to connect
More complex to connect
3.Not secured
Secured
4. Can be slow
5.Can operate on the basic peer to peer operat
ing system
Remained faster
A special operating system is required ie
window server, window NT Netware e.t.c.
Network not centralized
Network centralized.
7. Computers on the network are independent.
One PC controls access the network reso
urces
TYPES OF NETWORK
1. LAN = Local Area Network
2. CAN= Campus Area Network
3. MAN= Metropolitan Area Network
4. PAN = Personal Area Network
5. VPN= Victual Personal Network
6.WAN= Wide Area NetworkI L
NETWORK TOPOLOGY:
Topology is the way computers are arranged on a network. Or is the physical arr
angement of the computers on a network. Is the way the cables and networkin
g equipment are arranged.
TYPES OF TOPOLOGY
1. BUS TOPOLOGY: In bus topology workstations, nodes are connected toa mai
n cable called backbone cable.
Advantages
1.Easy to connect and configure
2. Less expensive
3. Require less cable
Disadvantages
1. Entire network shuts down if there is a break in the main Cable.
2. Difficult to identify faults (problems)
3. Terminators are required at both ends of the backbone cable.
4, Not meant to be used as stand-alone solution in a large building
A [ B c
2. RING TOPOLOGY
Aring topology is a network topology where nodes or work stations are arrange
dina ting form.
as &]
ty ST :Advantages
1. Easy to connect
2. Less expensive
Disadvantages
1. One malfunctioning node can throw away the entire network.
2. Moves, addition, changes of devices can affect the entire network.
3. it's slower.
3. STAR TOPOLOGY
Is the most commonly used topology in LAN, all the computers (Nodes) are con
nected to a central device or devices like hub, switch etc.
Node 2
[Node switch } Node 3
Node § Node4
Advantages
1. Easy to install and wire
2. No disruptions to network when connecting or removing devices.
3. Easy to detect faults and remove parts
Disadvantages
1. More expensive.
2. If the hub/switch fails, nodes attached are disabled.I L
3. Require more cables.
4. TREE TOPOLOGY
Tree topologies comprised of the multiple star topology on a bus. Tree topologi
es integrate multiples star topologies onto a bus
A
A
Hub
Switch 8
c
c
Advantages
1. Supported by several hard wares
2. Point to point winning for individuals/segments
Disadvantages
1. Expensive to set up.
2. Difficult to configure and wired.
3. If the backbone breaks, the entire segment goes down
5. MESH TOPOLOGY
Mesh topology uses a lot of cables to connect every node with every other n
ode. It is very expensive to set up. If any cable fails there are many other wa
ys for two nodes to communicate. WANS-like internet employ mesh routing,INTRANET AND EXTRANET
An intranet is a network closed to internet which can only be accessed by autho
rized members of an organization; they are used to share information within the
company or other organization. An intranet uses internet technologies to allow
users to access company documents
An extranet is an internet which is partially accessible to authorized outsiders. It
also allow authorized insiders. Outsiders with password can access the extrane
t
Intranet is open to an insider who has been authorized, while the extranet permi
tboth insiders and outsiders to access the network based on the permission by
the authority concerned.
NETWORK MEDIUM
The medium used to transmit information from one place to another.
A. CABLE: Is the medium through which information usually moves from
one network device to another.
The following are the common cables.
1. Unshielded Twisted pair (UTP) cable
2. Shielded Twisted pair (STP) cable
3. Coaxial cable
4, Fiber optic cable
B. WIRELESS MEDIA1. Radio — use to transmit signals
2. Infrared
3. Blue tooth
4, Flash share
5. Switch - is a device use to expand network
6. Router is an intelligent device used to connect different network.
7. Access point.
CABLING
Types of Ethernet cables available
a. Straight through cable
b, Crossover cable
G, Rolled over.
Straight through cable are used to connect different devices on a network e.
g computer to switch or hub.
FORMULA FOR CONSTRUCTING STRAIGHT THROUGH CABLE.
Side A Side B
ow ow
0 oO
GW GW
B B
BW BW
G G
BRW BRWI L
BR BR
CROSS OVER CABLE: Are used to connect liked devices
1. Switch to Switch.
2. Router to router
3. Computer to Computer
4. Hub to Hub
FORMULA FOR CROSSOVER CABLE
Side A Side B
ow GW
Q G
cw ow
B B
Bw BW
G oO
BRW BWN
BR BR
IP (INTERNET PROTOCOL)
An IP is 32 bits divided by 4 octal and each separated by a dot. An IP address is
a numeric identifier assigned to each machine on a IP network255 255 255 255
CLASSES OF IP
CLASS SUBNET
[CLASS A= 0-127 | 255.0.0.0
CLASS B= 128-191 | 255.255.0.0
CLASS C= 192-223 | 255.255.255.0
CLASS D 24-239 | MULTICAST
(CLASS E= 240-25 | RESERVED
5
A Subnet tell us how many computers (nodes) can be on the network.
Given the following IP's from an|ISP. Deduce the number of host and special sub
nets
1.IP = 212.165. 132.8
SM= 255.255.255.248
Gateway = 212:165.132.17
DNS: 217.10.162.8
Solution
Convert 248 to binary = 11111000
Using the formula 2*- 2 for subnets where x = number of 1's
Using the formula 2x for Host
Where x = numbers of 0's
1. IP =192.168.1.16SM = 255.255.255.240
Gate way = 171.18.3.4
DNS = 217.10.16.15
VERSIONS OF IP
IP V4 (192.168.1.1) = 282
IP V6 (FE80:0000:0000:0202:B3FF: FEIE: 8329) = 2128
METHOD OF IP ADDRESSING
1. Static= 1s the manual method of assigning IP to node on a network.
2. DHCP - Is the automatic method of assigning IPto anode on a network.
PROTOCOLS
1. TCP/IP = Transmission Control Protocol
2. UDP = User Datagram Protocol
3. HTTP= (Hypertext Transfer Protocol is the language used to communicate b
etween the browsers and web server.
4. POP = (Postal Office Protocol)
5. SMTP = (Simple Mail transfer Transfer Protocol)
6. FTP= (File Transfer Protocol)
7. IP = (Internet Protocol) is a unique address or identifier of each computer or c
ommunication device on the network and internet.
8. DHCP = Dynamic Host Configuration Protocol
9. DNS = Domain Name Server is used to convert the host address name into n
umeric IP (Address)L
OPEN SYSTEM INTERCONNECTION (OSI)-
Defines a network framework for implementing protocol in screen layers. Contr
olis passed from one layer to the next.
7. Application Layer:Provides Services to the software through which the user r
equests network services,.e. Browser, FTP and mail client.
-Serves as the windows for users and application process to access the networ
k services.
6. Presentation: Is concerned with data representation and code formation.
—Formats the data to be presented to the application layer. It's a translator for t
he network.
5. Session: Establish, maintain and manage the communication between the c
computers.
- Allows sessionestablishmentbetweenprocesses running on different stations.
4. Transport: provide for reliable transmission of data segment as well as the d
isassembly and assembly of the data before and after transmission.
-Ensure that the messages are delivered error free, in sequence and with nolos
ses or duplication.
3. Network: This is the layer on which routing takes place. It defines the proces
ses used to route data across the network and the structure and used of logical
addressing.
- Controls the operations of the subnet, deciding which physical path the data ta
kes.
2. Data layer- This layer is concerned with the linkages and mechanisms used t
© move data about the network. Deals with the ways in which data is reliable tr
ansmitted.
- Provide error free transfer of data frames from one node to another.
1. Physical Layer: This layer defines the electrical and physical specifications fo
the networking media that carry the data bits across the network._l
Layers 5-7 are referred to as the upper layers which layer 1-4 referred to as law
er layers.
COREL DRAW
Definition: Is a desktop publishing package that enables us design and create g
raphics.
To Start Coreldraw
» Click start
% Point to all programs
Search for CorelDraw suit 9, 12,13,14,15, e.t.c.
» Click on the CorelDraw
TOOLS BARS
This is a very important bar in CorelDraw. The property bar displays the function
of a page, animage, shape or reveals the function options of a selected tool.
USING RULER FOR MEASUREMENT_l L
3 Move your pointer to the left axis of the ruler.
Click on the pointer, hold and drag
» Keep dragging until the line align to the vertical and the horizontal edg
es of the paper
» Leave the mouse.
TO UNDO AND REDO
Click edit on the menu bar
» Click Undo or Redo
The Text Tool
To add Artistic Text
Click on the text tool
Click on anywhere in the drawing window using the text tool and type
Click on pick tool, highlighted to make changes
To add paragraph Text
» Click on the text tool
% Click tool and drag in drawing window to draw the paragraph text fram
e or text box. The pointer appears in the text frame. Start tying
To select an entire text object
Click the text object using pick tool
To select specific character
% Click hold and drag across the text using the text tool (highlight the por
tion).
USING COLOR TOOLS
To view and remove color
» Click window on the menu bar
Point to color palette
» Click on default CMYK palette_l L
% Do same to remove
To choose a fill color for an object
» Select the object
Click the color swatch using the left mouse button.
To choose an outline color
Select the object.
Right click a color swatch.
To choose from different
shades of a color
» Select the object
% Click and hold a color swatch to display a pop =up color picker and clic
k a color.
To apply interactive fill
% Select the object
» Open the interactive fill toll layout. Select the interactive fill tool.
i Select the fill type
» Click ok
To copy object
& Select the object
» Click edit
% Click copy or cut
To duplicate object
& Select the object
» Click edit
% Click duplicate/click, hold and drag to move the duplicate) or Cltr + d
To paste an object into a
drawing» Click edit
Click delete/click on the object, click delete
To Change order of objects
& Select the objects
Click arrange
» Click order
& Select the type of order to be applied ie. (to front, behind, etc)
Toreverse the order of multiple
objects
» Select the objects
% Click arrange
» Click other
» Click Reverse order
To group objects
% Select the objects
3 Click arrange
% Click group
To ungroup objects
& Select the objects
» Click arrange
% Click ungroup
Working with bitmaps
Bitmaps are used to
Representa graphic image in
the computer
Toconvert a vector graphic to a
bitmap% Select the object
& Click bitmap
» Click convert to bitmap
Choose color
%& Choose resolution
» Enable the boxes
Click ok.
To set the page size and
orientation
» Choose present page size
% Click layout
& Click page setup
» Select the desired size and orientation
To add, Rename and delete
pages
To add pages
% Click layout
& Click insert page
% Type the number of pages in the box provided
» Enable BEFORE OR AFTER and type the page number
» Click ok
Click on the page lab to swap between pages or click GO TO PAGE int
he layout.
To rename a page
& Click layout
Click rename page
» Type the page name» Click ok
To delete a page
Click layout
% Click delete page
i Type the number of page to delete
» Click delete
To import files
» Click file
Click import
» Select the location of the object
%& Choose the file type
» Click filename
& Click import
%& Maintain original file size.
% Click, hold and drag on the drawing page
3 Click enter key
To preview a print job
» Click file
Click print preview
To magnify the preview page
» Click file
» Click view
& Click icon
% Select the percent option
» Click ok
Printing color separation
To preview color separation» Click file
& Click print
» Click separation
% Enable print color separation in color
Click print preview
Click on each pages to view different color separations.
To print the color separation
Close the preview or the file menu
» Click apply
& Click print
DATABASE MANAGEMENT
A DATABASE Is a structural collection of data or records that is storedin a com
putersystem. A database relies upon software to organize the storage of data a
nd to enablehe person or program to extractdesired information
A database is defined as an organizedcollection of data (information) in raw for
m, a sheet of paper divided into columns androws or a table in Microsoft word p
reviously have been considered a single database. Single table databases are v
ery limited in their uses and wouldand would not be considereda database solut
ion
What is Relational database?
A relational database is a database_l L
‘That isable to store and manipulate data acrossmultiples tables. By using multi
ple tables, a relationaldatabase reduces unnecessary duplication of data.
What is a table?
Tables are used to store the data in a structures and organized format. As previ
ously mentioned tables are similar to those of word, excel in that they contain r
ows (records) and columns (fields).
What is record? (Rows)
Artecord applies to data entered into a single row of a table. All data in the row
would belong to an individual or item. A record would normally include a unique
1D number, Name, Description, plus other relevant information with each new re
cord, a new row is created.
What is a field? (Column)
Each column (previously known as a field) is used to define what specific infor
mation is to be entered into that particular column. A column titled “sheet” for e
xample would signify this to be the point in a record to enter in the sheet name
when creating each new record.
What is Data?
Is the information entered into tables within the database. Data entered will pre
viously to be alphabetical (names/addresses) or numerical (dates/currency), ho
wever Access is also able to store other form of data, such a links to websites,
documents created in other pages (OLE) as well as file attachments (files and i
mages).
PRIMARY KEY
A primary key is used as a unique identifier for each record in a database table
and is essential when working with relational tables.
To be effective, a primary key cannot have duplicate entries and must be set on
a field generating a unique identifier. When creating a new tables. Access auto
19_l L
matically adds the ID field with an AutoNumber data type. By default the ID fiel
dis also the primary key.
What are queries?
Using a query is similar to filtering and sorting tables but much more powerful.
Unlike filters, multiple
Criteria can be used in one more fields to be highly specific about the informati
on you wish to extract from a table
What is Report?
In access, a report is a summary generated from information in a table or quer
y. Access provides you with a number of tools that help you to quickly build repo
rts that present the data in an organized, meaningful and easy to-read layout.
Examples of database management software are Dbases Ill, MS Access, Pinna
cle, MYSQL, etc.
What is Database Management?
Database Management involves the process of Creating. Monitoring, Administr
ation and Maintenance of the databases and database groups in an organizatio
n.
Database Management entails managing the speed and efficiency with which a
database supply answer to end-user queries.
Database Management tool can help database administrator maintain smooth,
rapid uninterrupted access to shared databases
Database Management tools can help database administrator-keep vital busine
ss data protected and available to end users and application
What is Database?
Adatabase is a collection of information that is organized so that it can easily b
@ accessed, managed and updated.