CN - Chapter-1 Part-1
CN - Chapter-1 Part-1
Chapter – 1
The history and development of computer networks can be traced back to the mid-20th
century when the concept of connecting computers to share resources and information began
to take shape. Here's an overview of the key milestones and developments in the history of
computer networks:
Early Computer Networks (1950s-1960s): The earliest computer networks were developed
for specific purposes, such as military and scientific research. One of the first significant
networks was the SAGE (Semi-Automatic Ground Environment) system in the United States,
designed for air defence during the Cold War. Another notable early network was the
ARPANET, created by the U.S. Department of Defence’s Advanced Research Projects
Agency (ARPA), which laid the foundation for the modern internet.
Packet Switching (Late 1960s): In the late 1960s, researchers like Paul Baran and Donald
Davies developed the concept of packet switching, which involved breaking data into small
packets for efficient transmission over a network. This laid the groundwork for the robust and
decentralized nature of the modern internet.
TCP/IP (1970s): The development of the Transmission Control Protocol (TCP) and Internet
Protocol (IP) by Vinton Cerf and Robert Kahn in the 1970s was a pivotal moment in the
history of computer networks. TCP/IP became the standard communication protocol for
ARPANET and later the internet, allowing diverse networks to interconnect and
communicate.
Ethernet (1970s): Ethernet, developed by Bob Metcalfe at Xerox PARC in the 1970s,
revolutionized local area networks (LANs). Ethernet's standardized communication rules
made it possible for multiple devices to share a common communication medium, enabling
the rapid growth of LANs.
The Internet Emerges (1980s): Throughout the 1980s, ARPANET evolved into what we now
know as the internet. It became accessible to universities, research institutions, and eventually
the public. The development of domain names and the World Wide Web (WWW) by Tim
Berners-Lee in 1989 further accelerated the internet's expansion.
Commercialization (1990s): The 1990s saw the commercialization of the internet, with the
advent of Internet Service Providers (ISPs) and the proliferation of online services and e-
commerce. The introduction of high-speed connections like DSL and cable internet made the
internet more accessible to households.
Wireless Networks (2000s): The 2000s saw the widespread adoption of wireless
technologies, including Wi-Fi and cellular networks. This enabled mobile computing and the
proliferation of smartphones and other wireless devices.
IoT and 5G (2010s-present): The Internet of Things (IoT) has connected billions of devices
and sensors to the internet, from smart thermostats to industrial machinery. The rollout of 5G
networks promises even faster and more reliable wireless communication.
Cyber security and Privacy Concerns: As computer networks have grown in importance and
complexity, cyber security has become a critical concern. Protecting data, privacy, and
network infrastructure from cyber threats remains a constant challenge.
Future Developments: The development of quantum computing, edge computing, and further
advancements in network technology continue to shape the future of computer networks.
Additionally, efforts are ongoing to expand internet access to underserved regions of the
world.
In summary, computer networks have evolved significantly since their inception, from the
early days of ARPANET to the vast and interconnected global network that we know today.
These developments have transformed the way we communicate, work, and live, and they
continue to drive technological innovation in various domains.
2. Network Topologies:
Network topology refers to the physical or logical arrangement of devices and connections in
a computer network. It defines how devices are connected to each other and how data is
transmitted in the network. There are several common network topologies, each with its own
advantages and disadvantages. Here are some of the most commonly used network
topologies:
2.1.Star Topology:
➢ In a star topology, all devices are connected to a central hub or switch.
➢ Data is transmitted through the hub/switch, which relays it to the appropriate device.
➢ Pros: Easy to install and manage, if one cable or device fails, it doesn't affect the
entire network.
➢ Cons: Requires more cabling than a bus topology, and the hub/switch can become a
single point of failure.
2.2.Ring Topology:
➢ In a ring topology, each device is connected to exactly two other devices, forming a
closed loop.
➢ Data circulates around the ring in one direction until it reaches its destination.
➢ Pros: Equal access to the network for all devices, no collisions.
➢ Cons: If one device or cable in the ring fails, the entire network can be disrupted.
2.3.Mesh Topology:
➢ In a full mesh topology, every device is connected to every other device.
➢ In a partial mesh, only some devices have multiple connections.
➢ Pros: Extremely robust and fault-tolerant; multiple paths for data to travel.
➢ Cons: Requires a lot of cabling and can be expensive to implement and manage.
The choice of network topology depends on factors such as the network's size, scalability
requirements, fault tolerance, cost constraints, and the intended purpose of the network.
Different topologies are suitable for different situations, and network administrators must
carefully consider their network's needs when selecting a topology.
3. Types of Networks
Computer networks can be categorized into various types based on their size, purpose, and
geographical coverage. Here are some common types of networks:
Client-Server Network:
➢ In a P2P network, devices (peers) communicate directly with each other without a
central server.
➢ P2P networks are often used for file sharing, voice over IP (VoIP), and distributed
computing.
4. Network Software
Network software, also known as network applications or network protocols, plays a crucial
role in enabling communication and data transfer within computer networks. These software
components facilitate the management, security, and optimization of network resources.
➢ Network operating systems are specialized operating systems designed for managing
and administering network resources.
➢ Examples include Microsoft Windows Server, Linux distributions with networking
features, and Novell NetWare (historical).
➢ These tools automate the process of configuring and updating network devices such as
routers, switches, and firewalls.
➢ Cisco Prime Infrastructure and Solar Winds Network Configuration Manager are
examples.
➢ Routing and switching software controls the flow of data packets within a network.
➢ Cisco IOS, Juniper Junos, and Cumulus Linux are examples of software used in
routers and switches.
➢ These software types serve web content and execute web applications.
➢ Apache HTTP Server, Nginx, and Microsoft Internet Information Services (IIS) are
common web server software.
Email Servers:
➢ Email server software manages the sending, receiving, and storage of email messages.
➢ Examples include Microsoft Exchange Server, Postfix, and Send mail.
File Servers:
➢ File server software facilitates file sharing and storage management within a network.
➢ Windows Server with the File Server role, Samba, and NFS (Network File System)
are examples.
Network software is essential for managing, securing, and optimizing the operation of
computer networks, regardless of their size or purpose. The choice of specific software
depends on the network's requirements and objectives.
➢ The Application Layer is the topmost layer and is closest to the end-user or
application.
➢ It provides network services directly to user applications and end-users.
➢ Common application layer protocols include HTTP, SMTP (Simple Mail Transfer
Protocol), and FTP (File Transfer Protocol).
➢ The Network Layer is responsible for routing packets from the source to the
destination across multiple network segments.
➢ It uses logical addressing (such as IP addresses) to identify devices and routers.
➢ Routers operate at this layer, making decisions on how to forward packets based on
their destination IP addresses.
Data Link Layer (Layer 6):
➢ The Data Link Layer is responsible for creating a reliable link between two directly
connected nodes.
➢ It frames raw bits into frames and provides error detection and correction
mechanisms.
➢ Ethernet switches and network interface cards operate at this layer.
➢ The Physical Layer deals with the physical medium and transmission of raw binary
data over a physical connection.
➢ It defines characteristics like voltage levels, cable types, connectors, and the physical
topology of the network.
➢ Examples of devices at this layer include network cables, hubs, and network interface
cards (NICs).
The OSI model is a conceptual framework that helps network professionals understand how
various networking protocols and technologies interact. While the OSI model is useful for
educational and conceptual purposes, in practice, the TCP/IP model, which combines the
functions of the OSI model into fewer layers, is more commonly used for designing and
troubleshooting modern computer networks.
6. TCP/IP model
The TCP/IP model is commonly described as having four layers: Application, Transport,
Internet, and Link. However, some references and discussions might include a fifth layer
called the Physical layer, which encompasses the physical transmission medium and the
electrical and mechanical characteristics of network devices. It's worth noting that this five-
layer model is not as widely recognized or standardized as the four-layer TCP/IP model, but
it can provide a more comprehensive view of network communication. Here's a breakdown of
the five-layer TCP/IP model:
Application Layer:
➢ The Application Layer is the topmost layer and is closest to the end-users and
applications.
➢ It deals with high-level protocols and user interfaces, enabling communication
between software applications on different devices.
➢ Examples of protocols at this layer include HTTP (for web browsing), FTP (for file
transfer), SMTP (for email), and DNS (for domain name resolution).
Transport Layer:
➢ The Transport Layer is responsible for end-to-end communication and data ensures
transfer reliability.
➢ It handles data segmentation, flow control, error detection, and error correction.
➢ Key protocols at this layer are TCP (Transmission Control Protocol), which ensures
reliable data delivery, and UDP (User Datagram Protocol), which provides a
connectionless and less reliable communication method.
Internet Layer:
➢ The Internet Layer is responsible for routing packets between devices across different
networks.
➢ It uses logical addressing (typically IP addresses) to identify devices and determine
the best path for data transmission.
➢ The Internet Protocol (IP) is the core protocol of this layer, with IPv4 and IPv6 being
the most commonly used versions.
➢ The Link Layer, also known as the Network Interface Layer or Data Link Layer, is
responsible for framing data into frames, addressing within a local network, and
providing error detection and correction at the link level.
➢ It defines how data is physically transmitted over the network medium, including the
use of MAC (Media Access Control) addresses.
➢ IEEE 802.3 (Ethernet) and IEEE 802.11 (Wi-Fi) are examples of technologies used at
this layer.
Physical Layer:
➢ This layer deals with the physical medium used for data transmission, including
cables, connectors, switches, and the electrical and mechanical aspects of network
devices.
➢ It specifies the physical characteristics of the transmission medium, such as voltage
levels, signal encoding, and data transmission rates.
➢ While the physical layer is crucial for defining how data is transmitted, it is often not
explicitly mentioned when discussing the TCP/IP model because it focuses more on
the higher-level protocols.
It's important to note that the TCP/IP model is often compared and contrasted with the OSI
(Open Systems Interconnection) model. While the OSI model has seven layers and provides a
more detailed breakdown of network functions, the TCP/IP model, with its four layers, is
more closely aligned with the actual protocol stack used on the internet and is widely adopted
for networking. While the five-layer model is often used for educational purposes to provide
a more comprehensive view of networking concepts.
7. Example Networks
ARPANET: Short for the Advanced Research Projects Agency Network, was one of the
earliest and most influential computer networks in history. Developed by the U.S.
Department of Defence’s Advanced Research Projects Agency (ARPA, now known as
DARPA) in the late 1960s, ARPANET laid the foundation for what would eventually become
the modern internet. Here are some key points about ARPANET:
ARPANET was a visionary project that transformed the way people communicate and share
information. Its development and success played a pivotal role in shaping the digital age and
the interconnected world we live in today.
Internet: The internet, short for "interconnected networks," is a global network of computer
networks that allows information and data to be shared and transmitted across the globe. It is
one of the most significant inventions of the 20th century and has revolutionized the way
people communicate, access information, conduct business, and more. Here are some key
aspects of the internet:
The internet has become an integral part of modern society, transforming how people
work, communicate, access information, and conduct business on a global scale. Its
continued evolution and impact on society are subjects of ongoing study and
development.