0% found this document useful (0 votes)
34 views

Lecture 1

The document provides an introduction to computer networks including definitions of key terms, the history of networks, and different types of networks and networking devices. It discusses criteria for evaluating networks such as performance, reliability, and security. It also covers topics like modes of communication and standards for wireless networking.

Uploaded by

eesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

Lecture 1

The document provides an introduction to computer networks including definitions of key terms, the history of networks, and different types of networks and networking devices. It discusses criteria for evaluating networks such as performance, reliability, and security. It also covers topics like modes of communication and standards for wireless networking.

Uploaded by

eesha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

Introduction to Networking

CIS 192
• Computer Network- Definition and example
• History of the computers and Network.
• Modes of communication
Objective • Types of Network
• Types of Networking Device
A network is a set of devices (often
referred to as nodes) connected by
communication links.

Networks –
Definition A node can be a computer, printer,
or any other device capable of
sending and/or receiving data
generated by other nodes on the
network.
Network

A network is two or more


devices connected
through links.
A link is a communications
pathway that transfers
data from one device to
another
A network must be able to meet a certain
number of criteria. The most important of
Network these are
1. Performance
Criteria
2. Reliability
3. Security
Performance can be measured in many ways, including
transit time and response time.
Transit time is the amount of time required for a
message to travel from one device to another.
Response time is the elapsed time between an inquiry and
a response.
Performance The performance of a network depends on a number of
factors
• the number of users
• the type of transmission medium
• the capabilities of the connected hardware
• the efficiency of the software.
Performance is often evaluated by two networking metrics
throughput and delay
In addition to accuracy of delivery, network
reliability is measured by the frequency of
failure.
Reliability The time it takes a link to recover from a
failure, and the network's robustness in a
catastrophe.
Network security issues include
• protecting data from unauthorized access
• protecting data from damage and
Security development
• Implementing policies and procedures for
recovery from breaches and data losses.
History of Computer Networks
1969 Although In 1966, the
development of ARPANET began,
1969 To provide and define
1961 In this year, Leonard Kleinrock 1965 In 1965, Donald Davies coined officially started ARPANET in 1969. It
information about network protocols,
proposed the earliest computer the term "packet" to describe how to was considered one of the first
procedures, and computer
networks, which was the idea of send data between computers on a computer networks in which first
communications, the first RFC surfaced
ARPANET. network. two nodes, UCLA and SRI (Stanford
as a document in April.
Research Institute) were connected, and
to use packet switching.

1973 While working at Xerox PARC,


1969 On 29 August 1969, the first
1970 NCP, stands for NetWare Core 1971 In 1971, the first e-mail was Robert Metcalfe developed the Ethernet
IMP and network switch were sent to
Protocol, released by Steve Crocker and sent to across a network to other users in 1973. In the same year, ARPA
UCLA. On ARPANET, the first data
a team at UCLA for use with NetWare. by Ray Tomlinson. deployed the first international network
transmission was sent by using it.
connection, known as SATNET.

In 1973, VoIP technology and


1978 In 1978, the TCP/IP protocol
capabilities were officially introduced, 1974 In this year, the use of first 1976 Originally called a gateway,
was developed and invented by Bob
which made a VoIP call. However, until router was began, but they were not Ginny Strazisar develop the first true IP
Kahn for networks; it was developed
1995, the software was not available for considered true IP routers. router.
with help from Vint Cerf.
users that could make VoIP calls.
1981 In the United States, between IBM mainframe systems, BITNET was created in 1981 as a network. The U.S. National Science Foundation developed the CSNET
(Computer Science Network) in the same year 1981.

1983 For using TCP/IP, ARPANET finished the transition. The first DNS implement by Jon Postel and Paul Mockapetris in 1983.

1986 This is the year in which a backbone for ARPANET, the National Science Foundation Network was came online, which finally took the place of ARPANET in
1990s. In the same year, with the original BITNET, BITNET II was introduced to deal with bandwidth issues.

1988 In 1988, the first T1 backbone was included with ARPANET. AT&T, Lucent, and NCR introduced the WaveLAN network technology in 1988.

In 1988, for the first time, the explanation of network firewall technology was published. In the same year, Digital Equipment Corporation developed it. This paper had
the detail about the first firewall, known as a packet filter firewall.

1990 The first network switch was developed and introduced by a U.S. network hardware company named Kalpana in 1990.

1996 In 1996, an IPv6 was introduced as an improvement over IPv4, as well as embedded encryption, improved routing.

1997 In June 1997, the 802.11 standards, containing transmission speeds up to 2 Mbps, for Wi-Fi were introduced.

1999 The 802.11a standard, containing transmission speeds up to 25 Mbps to use the 5 GHz band, was officially made in 1999. Another standard 802.11b was
available to use for the public in mid-1999, which offered transmission speeds up to 11 Mbps. In September 1999, for use with 802.11b, the WEP encryption protocol
was released.
802.11g devices, contained transmission
speeds up to 20 Mbps, were available to the The 802.11n standard can operate on the
public in January 2003. In the same year, for 2.4 GHz and 5 GHz bandwidths and offers
use with 802.11g, the WPA encryption higher transfer speeds over 802.11a and
protocol is released. 802.11g. Officially, it was made in 2009.

2003 2009

2004 2018

In 2004, as a replacement for WPA, the In January 2018, WPA3 encryption was
WPA2 encryption protocol was introduced. released by the Wi-Fi Alliance, which
By 2006, WPA2 certification was comprises security enhancements over
compulsory for all Wi-Fi devices. WPA2.
Modes of Connection
Point to Point-
• A point-to-point connection provides a dedicated link between two
devices.
• The entire capacity of the link is reserved for transmission between
those two devices.
• Most point-to-point connections use an actual length of wire or cable
to connect the two ends, but other options, such as microwave or
satellite links, are also possible
Dedicated (Simplex, half duplex, full duplex)

1. Simplex-In simplex mode, the communication is


unidirectional, as on a one-way street. Only one of the two
devices on a link can transmit; the other can only receive
• Keyboards and traditional monitors are examples of simplex
devices.
• The keyboard can only introduce input; the monitor can
only accept output.
• The simplex mode can use the entire capacity of the channel
to send data in one direction.
Half Duplex
• In half-duplex mode, each station can both
transmit and receive, but not at the same time.
• When one device is sending, the other can only
receive, and vice versa.
• The half-duplex mode is like a one-lane road with
traffic allowed in both directions
• In a half-duplex transmission, the entire capacity
of a channel is taken over by whichever of the two
devices is transmitting at the time.
• Example- Walkie-talkies
• The half-duplex mode is used in cases where there
is no need for communication in both directions at
the same time.
• the entire capacity of the channel can be utilized
for each direction.
Full Duplex
• In full-duplex both stations can transmit and receive simultaneously.
• The full-duplex mode is like a two-way street with traffic flowing in
both directions at the same time.
• One common example of full-duplex communication is the telephone
network.
• The full-duplex mode is used when communication in both directions
is required all the time.
• The capacity of the channel, however, must be divided between the
two directions.
Multipoint Communication means the channel is shared
among multiple devices or nodes

In this communication, link is provided at all times for


sharing the connection among nodes.

Multipoint In this communication, the entire capacity isn’t reserved by


any two nodes and the network bandwidth is maximum
Connection utilized.
In this communication, there is one transmitter and many
receivers.

Broadcasting and Multicasting are its two type.


Personal Area Network (PAN)
Local Area Network (LAN)
Campus Area Network (CAN)
Metropolitan Area Network (MAN)
Types of Wide Area Network (WAN)
Network Storage-Area Network (SAN)
Virtual Private Network (VPN)
Client Server Network
Peer to Peer Network (P2P)
1. Personal Area Network
1. Personal Area Network (PAN) is a
computer network used for data
transmission amongst devices such
as computers, telephones, tablets
and personal digital assistants.
2. Also Known as HAN (Home Area
Network)
3. PANs can be used for
communication amongst the
personal devices themselves
(interpersonal communication), or
for connecting to a higher level
network and the Internet (an uplink)
where one "master" device takes up
the role as internet router.
2. Local Area Network
➢ Xerox Corporation worked in
collaboration with DEC and Intel
to create Ethernet, which is the
most pervasive LAN
architecture used today.
➢ Ethernet has evolved and has
seen significant improvements
in regard to speed and
efficiency.

➢ An upside of a LAN is fast data transfer with data speed that can reach
up to 10Gbps.
➢ Other significant LAN technologies are Fiber Distributed Data Interface
(FDDI) and token ring.
3. Campus Area Network
➢ Larger than LANs, but smaller
than metropolitan area networks
these types of networks are
typically seen in universities,
large K-12 school districts or
small businesses.
➢ They can be spread across
several buildings that are fairly
close to each other so users can
share resources
4. Metropolitan Area Network

1. A MAN is larger than a LAN but smaller than or equal in size to a WAN.
2. The size range anywhere from 5 to 50km in diameter.
3. MANs are typically owned and managed by a single entity.
4. This could be an ISP or telecommunications company that sells its services
to end-users in that metropolitan area.
5. For all intents and purposes, a MAN has the same characteristics as a WAN
with distance constraints.
5. Wide Area Network

• A Wide Area Network exist over a large area


• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network in the Internet
6. Storage Area Network
➢ SAN may be referred to as a Sub network or special purpose network.
➢ Its special purpose is to allow users on a larger network to connect
various data storage devices with clusters of data servers.
➢ SANs can be accessed in the same fashion as a drive attached to a
server.
7. Virtual Private Network
➢ VPN is a private network that can
access public networks remotely. VPN
uses encryption and security protocols
to retain privacy while it accesses
outside resources.
➢ When employed on a network, VPN
enables an end user to create a virtual
tunnel to a remote location. Typically,
telecommuters use VPN to log in to
their company networks from home.

➢ Authentication is provided to validate the identities of the two peers.


➢ Confidentiality provides encryption of the data to keep it private from
prying eyes.
➢ Integrity is used to ensure that the data sent between the two devices or
sites has not been tampered with.
8. Client/Server Network
➢In a client/server arrangement,
network services are located on a
dedicated computer called a server.
➢ The server responds to the requests
of clients.
➢The server is a central computer that
is continuously available to respond
to requests from clients for file, print,
application, and other services.
➢ Most network operating systems adopt the form of a client/server
relationship.
➢ Typically, desktop computers function as clients, and one or more
computers with additional processing power, memory, and specialized
software function as servers.
9. Peer to Peer Network

➢ Usually very small networks


➢ Each workstation has equivalent capabilities and responsibilities
➢ Does not require a switch or a hub.
➢ These types of networks do not perform well under heavy data
loads.
The Networking Devices(Nodes)
1. NIC Card
2. Repeater
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Firewall
1. Network Interface Card
➢ NIC is used to physically
connect host devices to the
network media.
➢ A NIC is a printed circuit board
that fits into the expansion slot of
a bus on a computer
motherboard.
➢ It can also be a peripheral
device. NICs are sometimes
called network adapters.
➢ Each NIC is identified by a
unique code called a Media
Access Control (MAC) address.
➢ This address is used to control
data communication for the host
on the network.
2. Repeaters
➢ A repeater is a network device used to
regenerate a signal.
➢ Repeaters regenerate analog or digital
signals that are distorted by transmission
loss due to attenuation.
➢ A repeater does not make an intelligent
decision concerning forwarding packets
3. Hubs
➢ Hubs concentrate on connections.
➢ In other words, they take a group of
hosts and allow the network to see
them as a single unit. This is done
passively, without any other effect
on the data transmission.
➢ Active hubs concentrate hosts and
also regenerate signals.
4. Bridges
➢ Bridges convert network data
formats and perform basic data
transmission management.
➢ Bridges provide connections
between LANs.
➢ They also check data to
determine if it should cross the
bridge. This makes each part of
the network more efficient
5. Switches
➢ Switches add more intelligence to data transfer management.
➢ They can determine if data should remain on a LAN and
transfer data only to the connection that needs it.
➢ Another difference between a bridge and switch is that a
switch does not convert data transmission formats
6. Routers
➢ Routers can regenerate signals,
concentrate multiple connections, convert
data transmission formats, and manage
data transfers.
➢ They can also connect to a WAN, which
allows them to connect LANs that are
separated by great distances.
7. Gateway
➢ A gateway is a piece of networking
hardware used in
telecommunications for
telecommunications networks that
allows data to flow from one discrete
network to another.
➢ Gateways are distinct from routers or
switches in that they communicate
using more than one protocol to
connect a bunch of networks
8. Firewall
➢ A firewall is a network device or
software for controlling network
security and access rules.
➢ Firewalls are inserted in connections
between secure internal networks and
potentially insecure external networks
such as the Internet.
➢ Firewalls are typically configured to
reject access requests from
unrecognized sources while allowing
actions from recognized ones.
➢ The vital role firewalls play in network
security grows in parallel with the
constant increase in cyber attacks.
Thank
You

You might also like