Skip to main content

HOW CAN SO MANY COMPUTERS CONNECT TOGETHER?

Computers are networked together and sharing of resources is a fame today. Many of you out there are speculating on, how can these so many computers in a home, office, society and even a nation can connect the computers together without any flaw.  There are billions of computer out there working all around the world.  How can this be?

 

THE RATIONAL OF TOPOLOGY

A topology describes how the part of the whole work together.  When studying networking, it is important to understand both the physical topology and the logical topology of a network.

PHYSICAL TOPOLOGY

This refers to a network's hardware & how computers, other devices and cables fit together to form a physical network.

LOGICAL TOPOLOGY

This type of topology approach has a lot to do with software, how access to the network is controlled, including how users and programs initially gain access to the network and how specific resources such as applications and databases are shared on the network.


THE TOPOLOGIES THAT MAKE THINGS HAPPEN

Small workgroup local area networks (LANs) whose computers are connected using a thinnet cable. Trunk cables connecting hubs or switches of departmental LANs to form a larger LAN. Backboning, by joining switches and routers to form campus-wide networks.

Depending on the type of computer network card, a coaxial cable or an RJ-45 network cable is used to connect them together.


RING TOPOLOGY




ring topology is a network configuration where device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.

In a ring network, packets of data travel from one device to the next until they reach their destination. Most ring topologies allow packets to travel only in one direction, called a unidirectional ring network. Others permit data to move in either direction, called bidirectional.

The major disadvantage of a ring topology is that if any individual connection in the ring is broken, the entire network is affected.

Depending on the network card used in each computer of the ring topology, a coaxial cable or an RJ-45 network cable is used to connect computers together.


STAR TOPOLOGY





star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than, but the benefit is that if a cable fails, only one node will be brought down.

Twisted-pair cables with modular plugs are used to connect the computers and other networking devices.  At the center of a star network is either a switch or a hub. This connects the network devices and facilitates the transfer of data.

 A hub is a multiport repeater, meaning the data it receives is broadcast and seen by all devices connected to its ports. 

To minimize unnecessary data traffic and isolate sections of the network, a switch can  be used at the center of a star network. Each networking device, such as a computer, has a hardware or physical address. 




Reference: Computerhope.com





Exclusive e-book by GetResponse and Joanna Wiebe

Comments

Popular posts from this blog

THE OSI MODEL: THE 7 LAYERS IN NETWORKING EXPLAINED

 The Open Systems Interconnection (OSI)  was developed by the International Organization for Standardization in 1984 to enable different types of networks to be linked together.  The model contains seven layers, as shown in the Figure below. These layers describe networking functions from the physical network interface to the software applications interfaces. The intent of the OSI model is to provide a framework for networking that ensures compatibility in the network hardware and software and to accelerate the development of new networking technologies.  Physical layer Provides the electrical and mechanical connection to the network. Examples of technologies working in this layer are Electronic Industries Alliance/Telecommunications Industry Association (EIA/TIA)–related technologies, UTP, fiber, and network interface cards (NICs).  It uses topologies: BUS, STAR, RING, MESH Communication modes: Simplex, Half Duplex, Full Duplex Hardware including networking devices, antennas, c

NETWORKING: PACKET TRACER - IoT

In simple terms the IoT is a connection of :  networked sensors, actuators, and smart devices that collect and share data.   Packet Tracer 7 contains many new features to support the IoT.  This includes the addition of IoT devices that can be configured to react to certain environmental values such as sun, wind, rain, and humidity. These devices can be configured to take actions based on the changing environmental values, such as turning on lights or closing garage doors.  The next parts of learning will include instructions to locate the IoT devices, to connect them to your network, to configure and modify scripts to make them function, and to control these devices remotely. Packet Tracer provides everything you need to create simulated smart homes, smart cities, and smart factories. CONFIGURE IoT DEVICES USING PACKET TRACER Packet Tracer has a wide variety of sensors and smart devices that will allow you to design smart homes, smart cities, smart factories, and smart power grids

HOW CAN CLIENT / SERVER NETWORK MODEL BE A CHANGE FOR YOU??

WHAT IS CLIENT / SERVER?  In the client-server network model (which is sometimes called the client-server architecture or client-server topology), resources are managed by the network operating system through a centralized directory database.  The database can be managed by one or more servers, as long as they have the same network operating system. In the midst of a WINDOWS SERVER   controls network access to a group of computers, this LOGICAL group is known as Windows DOMAIN .  The centralized directory database that keeps user account information & security for the entire group of computers is called AD (Active Directory) .   Each user on the network has his/her own domain level account assigned by the network administrator and kept in Active Directory .   A user can sign on to the network from any computer on the network and get access to the resources that Active Directory allows. The process is managed by AD DS (Active Directory Domain Services) .  A computer makes a re