0% found this document useful (0 votes)
7 views

Fundamentals of Computer Network

The document provides an overview of computer networks, defining them as interconnected systems of computers that facilitate data sharing and communication. It details various types of networks such as LAN, WAN, and VPN, along with essential networking concepts including IP addresses, routers, and switches. Additionally, it discusses network architecture, topology, security measures, load balancing, and content delivery networks.

Uploaded by

deticiomichaela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Fundamentals of Computer Network

The document provides an overview of computer networks, defining them as interconnected systems of computers that facilitate data sharing and communication. It details various types of networks such as LAN, WAN, and VPN, along with essential networking concepts including IP addresses, routers, and switches. Additionally, it discusses network architecture, topology, security measures, load balancing, and content delivery networks.

Uploaded by

deticiomichaela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Networking II: Fundamentals of Computer Network

Networking II
Fundamentals of Computer Network

What is a computer network?


o A computer network comprises two or more computers that are connected either by
cables (wired) or WiFi (wireless) with the purpose of transmitting, exchanging, or
sharing data and resources.
o Computer networks enable communication for every business, entertainment, and
research purpose. The internet, online search, email, audio and video sharing, online
commerce, live-streaming, and social networks all exist because of computer
networks.

You build a computer network using hardware (e.g., routers, switches, access
points, and cables) and software (e.g., operating systems or business
applications).

Geographic location often defines a computer network. For example, a LAN (local area
network) connects computers in a defined physical space, like an office building, whereas a
WAN (wide area network) can connect computers across continents. The internet is the
largest example of a WAN, connecting billions of computers worldwide.

Computer network types


Here are the most common and widely used computer network types:

1. LAN (local area network): A LAN connects computers over a relatively short
distance, allowing them to share data, files, and resources. For example, a LAN may
connect all the computers in an office building, school, or hospital. Typically, LANs
are privately owned and managed.
2. WLAN (wireless local area network): A WLAN is just like a LAN but connections
between devices on the network are made wirelessly.
3. WAN (wide area network): As the name implies, a WAN connects computers over a
wide area, such as from region to region or even continent to continent. The internet is
the largest WAN, connecting billions of computers worldwide.
4. MAN (metropolitan area network): MANs are typically larger than LANs but
smaller than WANs. Cities and government entities typically own and manage
MANs.
5. PAN (personal area network): A PAN serves one person. For example, if you have
an iPhone and a Mac, it’s very likely you’ve set up a PAN that shares and syncs
content—text messages, emails, photos, and more across both devices.
6. SAN (storage area network): A SAN is a specialized network that provides access to
block-level storage—shared network or cloud storage that, to the user, looks and
works like a storage drive that’s physically attached to a computer.
7. CAN (campus area network): A CAN is also known as a corporate area network. A
CAN is larger than a LAN but smaller than a WAN. CANs serve sites such as
colleges, universities, and business campuses.
ENGR. RUEL G. GRAFIA, MSIT 1
Networking II: Fundamentals of Computer Network

8. VPN (virtual private network): A VPN is a secure, point-to-point connection


between two network end points. A VPN establishes an encrypted channel that keeps
a user’s identity and access credentials, as well as any data transferred, inaccessible to
hackers.

Important terms and concepts


The following are some common terms to know when discussing computer networking:

§ IP address: An IP address is a unique number assigned to every device connected to


a network that uses the Internet Protocol for communication. Each IP address
identifies the device’s host network and the location of the device on the host
network. When one device sends data to another, the data includes a ‘header’ that
includes the IP address of the sending device and the IP address of the destination
device.
§ Nodes: A node is a connection point inside a network that can receive, send, create, or
store data. Each node requires you to provide some form of identification to receive
access, like an IP address. A few examples of nodes include computers, printers,
modems, bridges, and switches.
§ Routers: A router is a physical or virtual device that sends information contained in
data packets between networks.
o Routers analyze data within the packets to determine the best way for the
information to reach its ultimate destination.
o Routers forward data packets until they reach their destination node.

§ Switches: A switch is a device that connects other devices and manages node-to-node
communication within a network, ensuring data packets reach their ultimate
destination. While a router sends information between networks, a switch sends
information between nodes in a single network.
§ Ports: A port identifies a specific connection between network devices. Each port is
identified by a number. Computers use port numbers to determine which application,
service, or process should receive specific messages.
§ Network cable types: The most common network cable types are Ethernet twisted
pair, coaxial, and fiber optic. The choice of cable type depends on the size of the
network, the arrangement of network elements, and the physical distance between
devices.

Examples of computer networks


o The wired or wireless connection of two or more computers for the purpose of sharing
data and resources form a computer network. Today, nearly every digital device
belongs to a computer network.
o In an office setting, you and your colleagues may share access to a printer or to a
group messaging system. The computing network that allows this is likely a LAN or
local area network that permits your department to share resources.
o A city government might manage a city-wide network of surveillance cameras that
monitor traffic flow and incidents. This network would be part of a MAN or
metropolitan area network that allows city emergency personnel to respond to traffic
accidents, advise drivers of alternate travel routes, and even send traffic tickets to
drivers who run red lights.
ENGR. RUEL G. GRAFIA, MSIT 2
Networking II: Fundamentals of Computer Network

Computer networks and the internet


o The internet is actually a network of networks that connects billions of digital devices
worldwide. Standard protocols allow communication between these devices. Those
protocols include hypertext transfer protocol (the ‘http’ in front of all website
addresses). Internet protocol (or IP addresses) are the unique identifying numbers
required of every device that accesses the internet. IP addresses are comparable to
your mailing address, providing unique location information so that information can
be delivered correctly.

o Internet Service Providers (ISPs) and Network Service Providers (NSPs) provide
the infrastructure that allows the transmission of packets of data or information over
the internet. Every bit of information sent over the internet doesn’t go to every device
connected to the internet. It’s the combination of protocols and infrastructure that tells
information exactly where to go.

How do they work?


§ Computer networks connect nodes like computers, routers, and switches using cables,
fiber optics, or wireless signals. These connections allow devices in a network to
communicate and share information and resources.
§ Networks follow protocols, which define how communications are sent and received.
These protocols allow devices to communicate. Each device on a network uses an
Internet Protocol or IP address, a string of numbers that uniquely identifies a device
and allows other devices to recognize it.
§ Routers are virtual or physical devices that facilitate communications between
different networks. Routers analyze information to determine the best way for data to
reach its ultimate destination. Switches connect devices and manage node-to-node
communication inside a network, ensuring that bundles of information traveling
across the network reach their ultimate destination.

Architecture
§ Computer network architecture defines the physical and logical framework of a
computer network. It outlines how computers are organized in the network and what
tasks are assigned to those computers. Network architecture components include
hardware, software, transmission media (wired or wireless), network topology, and
communications protocols.

Main types of network architecture


There are two types of network architecture:
1. peer-to-peer (P2P) and
2. client/server

In P2P architecture, two or more computers are connected as “peers,” meaning they have
equal power and privileges on the network.

ENGR. RUEL G. GRAFIA, MSIT 3


Networking II: Fundamentals of Computer Network

A P2P network does not require a central server for coordination. Instead, each computer on
the network acts as both a client (a computer that needs to access a service) and a server (a
computer that serves the needs of the client accessing a service). Each peer makes some of its
resources available to the network, sharing storage, memory, bandwidth, and processing
power.

In a client/server network, a central server or group of servers manage resources and deliver
services to client devices in the network. The clients in the network communicate with other
clients through the server. Unlike the P2P model, clients in a client/server architecture don’t
share their resources. This architecture type is sometimes called a tiered model because it's
designed with multiple levels or tiers.

Network topology
Network topology refers to how the nodes and links in a network are arranged. A network
node is a device that can send, receive, store, or forward data. A network link connects
nodes and may be either cabled or wireless links.

Physical topology is the physical layout of the devices and cabling.

There are a number of topologies but the most common are bus, ring, star, and mesh:

§ A bus network topology is when every network node is directly connected to a main
cable.
§ In a ring topology, nodes are connected in a loop, so each device has exactly two
neighbors. Adjacent pairs are connected directly; non-adjacent pairs are connected
indirectly through multiple nodes.
§ In a star network topology, all nodes are connected to a single, central hub and each
node is indirectly connected through that hub.
§ A mesh topology is defined by overlapping connections between nodes. You can
create a full mesh topology, where every node in the network is connected to every
other node. You can also create partial mesh topology in which only some nodes are
connected to each other and some are connected to the nodes with which they
exchange the most data. Full mesh topology can be expensive and time-consuming to
execute, which is why it's often reserved for networks that require high redundancy.
Partial mesh provides less redundancy but is more cost effective and simpler to
execute.

Security

ENGR. RUEL G. GRAFIA, MSIT 4


Networking II: Fundamentals of Computer Network

Computer network security protects the integrity of information contained by a network and
controls who access that information. Network security policies balance the need to provide
service to users with the need to control access to information.

There are many entry points to a network. These entry points include the hardware and
software that comprise the network itself as well as the devices used to access the network,
like computers, smartphones, and tablets. Because of these entry points, network security
requires using several defense methods. Defenses may include firewalls, is a devices that
monitor network traffic and prevent access to parts of the network based on security rules.
Processes for authenticating users with user IDs and passwords provide another layer of
security. Security includes isolating network data so that proprietary or personal information
is harder to access than less critical information. Other network security measures include
ensuring hardware and software updates and patches are performed regularly, educating
network users about their role in security processes, and staying aware of external threats
executed by hackers and other malicious actors. Network threats constantly evolve, which
makes network security a never-ending process.

Load balancers and networks


o Load balancers efficiently distribute tasks, workloads, and network traffic across
available servers. Think of load balancers like air traffic control at an airport. The
load balancer observes all traffic coming into a network and directs it toward the
router or server best equipped to manage it. The objectives of load balancing are to
avoid resource overload, optimize available resources, improve response times, and
maximize throughput.

Content delivery networks


o A content delivery network (CDN) is a distributed server network that delivers
temporarily stored, or cached, copies of website content to users based on the user’s
geographic location.
o A CDN stores this content in distributed locations and serves it to users as a way to
reduce the distance between your website visitors and your website server. Having
cached content closer to your end users allows you to serve content faster and helps
websites better reach a global audience.
o CDNs protect against traffic surges, reduce latency, decrease bandwidth consumption,
accelerate load times, and lessen the impact of hacks and attacks by introducing a
layer between the end user and your website infrastructure.
o Live-streaming media, on-demand media, gaming companies, application creators, e-
commerce sites—as digital consumption increases, more content owners turn to
CDNs to better serve content consumers.

ENGR. RUEL G. GRAFIA, MSIT 5

You might also like