Introduction To Computer Network
Introduction To Computer Network
A computer network is a system that connects two or more computing devices for transmitting
and sharing information. Computing devices include everything from a mobile phone to a server.
These devices are connected using physical wires such as fiber optics, but they can also be
wireless.
Resource Sharing: Networks enable multiple users to share resources like files, printers,
and internet connections, which can lead to cost savings and more efficient resource
utilization.
Communication: Networks facilitate communication through email, instant messaging,
video conferencing, and collaborative work, allowing for quick and efficient information
exchange.
Remote Access: Networks allow users to access information and services from remote
locations, making it possible to work from anywhere with an internet connection.
Cost Efficiency: Sharing resources like printers and storage devices reduces costs by
avoiding the need for multiple individual devices.
Centralized Data Management: Networks allow for centralized data storage and
management, making it easier to back up data, apply security measures, and ensure data
consistency.
Improved Communication: Networks enhance communication speed and reliability,
enabling real-time communication and collaboration.
Scalability: Networks can easily be scaled by adding or removing devices and services as
needed, allowing for flexibility and growth.
Network topologies describe the arrangement of various elements (links, nodes, etc.) in a
computer network. They define how different nodes in a network are connected and how data is
transmitted between these nodes. Here’s an overview of four common network topologies: Mesh,
Star, Tree, and Bus.
Types of Topologies:
Star Topology
In a star topology, all nodes are connected to a central hub or switch. The hub acts as a repeater
for data flow. Each node has a dedicated point-to-point connection to the hub.
Advantages:
Easy to install and manage: Simple layout and easy to add or remove nodes.
Centralized management: The hub can manage and control the entire network.
Fault isolation: If one node or its connection fails, it does not affect the rest of the
network.
Disadvantages:
Single point of failure: If the central hub fails, the entire network goes down.
Higher cabling cost compared to bus topology, since each node requires an individual
cable to the hub.
Use Case:
Advantages:
Disadvantages:
Dependent on backbone: If the backbone line breaks, it can affect the entire network.
Complex to configure and maintain compared to simple topologies like star or bus.
Use Case:
Suitable for large networks such as corporate campuses, schools, and large office
buildings.
Bus Topology:
In a bus topology, all nodes are connected to a single central cable, called the bus or backbone.
Data sent from a node travels along the bus in both directions until it reaches its destination.
Advantages:
Disadvantages:
Limited cable length and number of nodes: Performance degrades as more devices are
added.
Difficult to troubleshoot: A fault in the main cable can bring down the entire network.
Collision and congestion: Multiple nodes sending data simultaneously can cause
collisions and network congestion.
Use Case:
Networks are classified based on their size, range, and purpose. Different types of networks
serve different needs and have unique characteristics. They are
Characteristics:
Very limited range: Usually within a range of a few meters (about 10 meters).
Wireless connections: Often utilizes Bluetooth, Infrared, or Near Field Communication
(NFC).
Personal devices: Connects devices such as smartphones, tablets, laptops, wearable
devices, and printers.
Use Case:
A Local Area Network (LAN) is a network that spans a relatively small area, such as a single
building or a campus. It is used to connect computers and other network devices to share
resources and information within a limited area.
Characteristics:
Use Case:
Offices, schools, and homes for sharing files, printers, and internet connections.
CAN (Campus Area Network):
A Campus Area Network (CAN) is a network that connects multiple LANs within a limited
geographic area, such as a university campus or a large industrial complex. It is larger than a
LAN but smaller than a MAN.
Characteristics:
Medium range: Covers a larger area than a single building, typically an entire campus or
business complex.
High-speed connectivity: Provides fast data transfer rates to facilitate communication and
resource sharing among different departments or buildings.
Private network: Owned and operated by a single organization, providing secure and
controlled network access.
Use Case:
Universities, business campuses, and military bases for connecting multiple buildings and
facilitating communication and resource sharing.
A Metropolitan Area Network (MAN) is a network that spans a city or a large campus. It
connects multiple LANs to create a larger network, covering a metropolitan area.
Characteristics:
Use Case:
Municipalities, city-wide Wi-Fi networks, and connecting multiple branch offices within
a city.
A Wide Area Network (WAN) is a network that spans a large geographic area, often a country or
continent. It connects multiple smaller networks, such as LANs and MANs, to enable
communication over long distances.
Characteristics:
Extensive geographic coverage: Can cover entire countries, continents, or even the globe.
Lower data transfer rates: Typically slower than LANs and MANs due to the vast
distances involved.
Public infrastructure: Often relies on public telecommunications infrastructure, such as
leased lines, satellites, and the internet.
Use Case:
Large organizations with offices around the world, the internet as a global WAN, and
connecting branch offices over long distances.
Networking Types
Networking types refer to the different ways in which devices or nodes within a network
communicate and share resources. Here are three primary networking types: Peer-to-Peer (P2P),
Multipoint, and Client/Server.
In a Peer-to-Peer (P2P) network, each computer (or node) functions both as a client and a server.
There is no centralized server; instead, every node can share resources directly with other nodes.
Characteristics:
Decentralized: No central server controls the network. Each node is equal and can initiate
or complete transactions.
Resource Sharing: Nodes share resources such as files, printers, and internet connections
directly with each other.
Scalability: Can easily add new nodes without significantly affecting network
performance.
Advantages:
Easy setup: Simple to configure and maintain, ideal for small networks.
Cost-effective: No need for expensive server hardware or software.
Redundant: No single point of failure since each node can act independently.
Disadvantages:
Security: More vulnerable to security risks since each node has access to others.
Management: Difficult to manage and monitor because there is no central control.
Performance: Can suffer as the number of nodes increases due to the lack of centralized
management.
Use Case:
Small office networks, home networks, and file-sharing applications like BitTorrent.
Multipoint Networking
In a Multipoint network, multiple nodes are connected through a shared medium, such as a single
communication line (e.g., a bus or wireless medium). All nodes can transmit and receive data
over this shared medium.
Characteristics:
Advantages:
Disadvantages:
Collisions: Data collisions can occur if two devices transmit data simultaneously, leading
to network congestion.
Performance: Network performance can degrade as the number of connected devices
increases.
Security: All devices share the same medium, so data can be intercepted more easily.
Use Case:
Traditional Ethernet networks (bus topology), wireless networks where multiple devices
share the same frequency, and industrial control systems.
Client/Server Networking:
In a Client/Server network, there is a central server that provides resources and services to
multiple client devices. The server handles requests from clients, which access and use the
resources and services provided by the server.
Characteristics:
Centralized management: Easier to manage, update, and secure the network from a
central point.
Performance: Efficient resource utilization and better performance due to centralized
control.
Security: Improved security as the server can enforce access controls and policies.
Disadvantages:
Cost: Requires investment in server hardware and software, and potentially more
complex infrastructure.
Single point of failure: If the server fails, clients lose access to resources and services.
Maintenance: Requires skilled personnel to manage and maintain the server.
Use Case:
Corporate networks, websites and web applications, email services, and database
management systems.
Protocols
Network protocols are rules and conventions for communication between network devices. They
ensure that data is transmitted accurately and efficiently. Protocols define the syntax, semantics,
and timing of communication.
1. Syntax:
Definition: Syntax refers to the structure and format of the data. It includes the layout of the data
packet, headers, and the sequence of bits.
Example: In HTTP, the syntax includes the request line (e.g., GET /index.html HTTP/1.1),
headers, and the message body.
2. Semantics:
Definition: Semantics defines the meaning of each section of bits or fields within a protocol
message. It ensures that both the sender and receiver interpret the data correctly.
Example: In TCP/IP, the semantics define what an acknowledgment (ACK) means and how
sequence numbers are used to track the order of packets.
3. Timing:
Example: In Ethernet, timing rules define when a device can send data on the network and how
to handle collisions if two devices transmit simultaneously.
Standards
Standards ensure interoperability and compatibility between different devices and technologies.
They are established by consensus and provide guidelines for the design and implementation of
hardware and software.
1. De facto Standards:
Definition: De facto standards are widely accepted and used, but not formally recognized by an
official standards organization. They become standards through widespread adoption and usage.
Example: The PDF format by Adobe became a de facto standard for document exchange before
being adopted as an open standard.
2. De jure Standards:
Definition: De jure standards are officially recognized and approved by a formal standards
organization. They undergo a rigorous approval process involving consensus from multiple
stakeholders.
Example: The IEEE 802.11 standard for wireless networking (Wi-Fi) is a de jure standard.
Standards Organizations
Several organizations develop and maintain standards to ensure interoperability and consistency
across technologies.
Role: Develops and publishes standards for a wide range of industries, including electrical
and electronics engineering, computer science, and telecommunications.
Role: Develops and promotes voluntary internet standards, particularly those related to the
TCP/IP protocol suite.
Example: The HTTP/1.1 standard (RFC 2616) and IPv6 (RFC 8200).
Role: Develops and publishes international standards for a wide range of industries and
sectors.
Role: A specialized agency of the United Nations that develops international standards for
telecommunications, including radio communications, satellite, and internet technologies.
1. Physical Layer: Deals with the physical connection between devices and the
transmission and reception of raw data bits over a physical medium.
2. Data Link Layer: Responsible for node-to-node data transfer, error detection and
correction, and framing.
3. Network Layer: Manages the routing of data packets between devices across different
networks.
4. Transport Layer: Ensures reliable data transfer, error correction, and flow control
between end systems.
5. Session Layer: Manages sessions or connections between applications, including
establishment, maintenance, and termination.
6. Presentation Layer: Translates, encrypts, and compresses data for the application layer,
ensuring data is in a usable format.
7. Application Layer: Provides network services directly to end-user applications, such as
email, file transfer, and web browsing.
TCP/IP Models and Its Comparison with OSI
TCP/IP model is a set of communication protocols used for the internet and similar networks. It
is derived from the OSI model but is more practical and simplified into four layers. The 4 layers
are:
Network Interface Layer: Combines the functions of OSI’s Physical and Data Link layers,
handling hardware addressing and access to the network medium.
Internet Layer: Corresponds to OSI’s Network layer, responsible for routing packets across
networks using IP.
Transport Layer: Corresponds to OSI’s Transport layer, ensuring reliable data transfer with
protocols like TCP and UDP.
Application Layer: Combines OSI’s Session, Presentation, and Application layers,
providing network services directly to applications.
Comparison with OSI Model:
Similarities: Both models are layered and serve as a framework for understanding network
communication. They facilitate modular design and troubleshooting.
Differences:
OSI is a theoretical model with seven layers, providing a more detailed and comprehensive
understanding of network functions.
TCP/IP is a practical model with four layers, used as the standard for internet communications. It
is more streamlined and widely implemented.
Examples:
Connection-Oriented Services:
Connectionless Services:
UDP (User Datagram Protocol): Sends data without establishing a connection, offering
faster but less reliable communication, suitable for applications like streaming and online
gaming.
Network services can be classified into two main types based on how data transmission is
managed: connectionless and connection-oriented. Each type has distinct mechanisms for
handling data transfer, and they are suited for different types of applications and network
environments.
1. Connection Establishment:
2. Data Transfer:
3. Connection Termination:
Advantages:
Disadvantages:
Overhead: Establishing and maintaining a connection adds overhead, which can reduce
efficiency.
Latency: The initial connection setup can introduce latency, which may not be suitable
for real-time applications.
Example Protocol:
Definition: Connectionless network services send data without establishing a dedicated end-to-
end connection. Each data packet, called a datagram, is sent independently and may take
different paths to reach the destination.
Example: In UDP (User Datagram Protocol), data is encapsulated into datagrams with minimal
header information.
2. Transmission:
There is no guarantee of packet order, delivery, or error checking by the network layer.
3. Reception:
The receiver collects packets as they arrive, which may be out of order or missing.
The application layer is responsible for handling any necessary error checking or data reordering.
Advantages:
Suitable for applications where speed is critical and some data loss is acceptable, such as
streaming media, online gaming, and VoIP (Voice over Internet Protocol).
Disadvantages:
Example Protocol:
UDP (User Datagram Protocol)
Internet:
ISPs are companies that provide individuals and organizations access to the Internet.
ISPs offer various services, including broadband, dial-up, fiber-optic, DSL, and wireless
Internet access.
They manage the infrastructure, provide customer support, and ensure connectivity to the
global Internet.
Backbone Networks
Backbone networks are high-capacity networks that connect various parts of the Internet. They
handle large volumes of data and provide the primary pathways for data traffic between different
networks and ISPs.
1. Bus Backbone:
Description: A single central cable (the bus) connects all nodes in a linear fashion.
Disadvantages: Limited scalability, difficult to troubleshoot, and a single point of failure can
disrupt the entire network.
2. Star Backbone:
Description: A central hub or switch connects multiple nodes in a star configuration. The central
hub acts as a repeater for data traffic.
Advantages: Easy to manage, scalable, and fault-tolerant (if one link fails, it does not affect
others).
Disadvantages: More cabling is required than a bus topology, and the central hub is a single
point of failure.
Connecting remote LANs involves linking multiple Local Area Networks (LANs) that are
geographically dispersed. This can be achieved using various technologies and methods:
1. Leased Lines:
Dedicated lines rented from telecommunications providers to connect remote LANs with
high reliability and speed.
Suitable for permanent, high-traffic connections.
A method for high-performance telecommunications networks that directs data from one
node to the next based on short path labels rather than long network addresses.
Provides a secure, scalable, and high-performance way to connect remote LANs.
4. Wireless Connections:
Using microwave, satellite, or other wireless technologies to connect remote LANs.
Suitable for areas where physical cabling is impractical or too expensive.
Uses software to manage and optimize network resources, providing a cost-effective way
to connect remote LANs using multiple types of connections (e.g., broadband, LTE,
MPLS).
Enhances performance and reliability by dynamically routing traffic based on real-time
conditions.