PROJECT: NETWORK
SYSTEM
Presented by the team:
• Thierno Ibrahima Bâ
• Faty Mbarou Salane
• Eric Joel Manga
• Bassirou Yate
• Abdoul Khadim Gueuye
Coordinator: Mrs. Diaw
CONTENTS
• Introduction to Computer Networks
• Types of Networks
• Network Topologies
• OSI Model
• TCP/IP Model
• Communication Protocols
• Hybrid Model
• IP Addressing
• Advantages and Disadvantages of Network Systems
• Network Security
• Applications and Future Trends
Introduction to Computer
Networks
A computer network refers to a set of interconnected
devices that enable data exchange. These networks
are essential in our connected world, shaping
communication, commerce, and access to
information.
This presentation will cover different types of
networks, their topologies, the OSI model, as well as
protocols and security. It will also discuss current
applications and future trends in the field of
computer networks.
Network Types
Local Area Networks Wide Area Networks Metropolitan Area Personal Area
(LAN) (WAN) Networks (MAN) Networks (PAN)
Connect nearby Interconnect large Cover a city or urban Small networks for
equipment, such as geographical areas, area, often used to communication
in an office or at such as the Internet, provide Internet between personal
home. They offer linking multiple LANs service to multiple devices via
high speeds and across the world. clients in the technologies like
simple management. metropolis. Bluetooth or NFC.
Network Topologies
Bus Topology Star Topology Ring Topology Mesh Topology
A simple, cost- Centralizes Data moves in a High redundancy with
effective setup connections to a hub closed loop from nodes connected to
connecting all devices or switch. Reliable device to device. multiple others,
via one line. A single since failure of one Manages traffic well ensuring reliability.
cable failure disrupts cable doesn't affect but a single node Requires extensive
the entire network, others, easing failure stops cabling and complex
limiting reliability for maintenance. communication. management, ideal for
large systems. critical networks.
OSI Model
The OSI (Open Systems Interconnection) model defines how hardware and software communicate over a network through seven distinct layers.
Each layer has a specific role in transmitting data, ensuring seamless interoperability between systems.
Physical Layer 1
Transmits raw bits over the medium.
2 Data Link Layer
Manages errors and access control.
Network Layer 3
Routes packets across networks.
4 Transport Layer
Ensures reliable data transfer.
Session Layer 5
Controls sessions between applications.
6 Presentation Layer
Handles data formatting and encryption.
Application Layer 7
Interfaces directly with user software.
TCP/IP Model
Definition Layers of the TCP/IP Model
The TCP/IP model is a standard framework • Network Access: physical communication and data
link.
for communication on the internet.
• Internet: packet routing (IP).
It simplifies data transfer with four main
• Transport: reliable transmission with TCP or fast
layers.
with UDP.
• Application: protocols like HTTP, FTP, SMTP for
network services.
Communication
Protocols
TCP/IP HTTP/HTTPS SMTP/POP3/IMAP FTP
The fundamental Protocols ensuring Protocols dedicated Secure file transfer
protocol ensuring secure and efficient to the management protocol between
reliable web browsing. and transfer of computers over a
communication on emails between network.
the Internet. servers and clients.
Hybrid Model
The hybrid model combines the advantages of the OSI model and the TCP/IP model, thus providing a better
approach for the analysis and understanding of network layers.
It facilitates a practical and consistent representation of the essential functions in network communication.
Physical & Link Layer
Management of hardware transmission and
control of access to the communication
medium. Internet Layer
Ensures packet routing and IP addressing.
Transport Layer
Guarantees the reliability of transmissions and
flow management with TCP and UDP. Application Layer
Provides user services such as HTTP, FTP, and
SMTP.
IP Addressing
IPv4 IPv6 Public Addresses Private Addresses
Address encoded in 32 bits, offering Address encoded in 128 bits, Globally accessible addresses, Reserved for internal networks, they
about 4 billion addresses, but now offering an extremely vast address allowing direct communication on provide better security and isolation
largely saturated. space and integrating advanced the Internet. of communications.
features.
Subnets
Organized subdivision of a network
to optimize data management and
routing.
Advantages and Disadvantages of the
Network System
Advantages Disadvantages
• Optimized sharing of resources among users • Exposure to attacks and intrusion attempts
• Dependence on network infrastructure and
• Simplified communication thanks to permanent equipment
connectivity
• Significant initial investment for installation and
• Centralized data management and enhanced maintenance
security
• Increasing complexity as the network expands
• Flexibility and scalability to meet changing needs
Network Security
Common Threats Security Measures
Viruses, malware, and Firewalls, antivirus
distributed denial-of- software, VPNs, and
service (DDoS) attacks enhanced
compromise the authentication
integrity of networks. mechanisms ensure
the protection of
systems.
User Awareness
User training is essential to prevent human errors
that can compromise security.
Future Applications and
Trends Modern Applications
Cloud computing, the Internet of Things (IoT), and
video streaming are radically transforming
1
network usage.
Future Trends
The rise of 5G, network virtualization, and
2
Software Defined Networking (SDN) are
shaping the future of network
infrastructure.
Conclusion
Networks will continue to evolve,
3
offering increased speed, enhanced
flexibility, and improved security.