Computer Network Document
Computer Network Document
CERTIFICATE
By
1
GUIDE HEAD OF THE
DEPARTMENT
INDEX
1. Introduction......................................................................................................3
2. Definitions of Computer Networks....................................................................4
3. History of Computer Networks...........................................................................4
4. Fundamentals of Computer Networks..............................................................9
4.1 Basics of Computer Network
4.2 Characteristics of Computer Network
4.3 Types of Computer Networks
4.4 Types of Network Architecture
5. Network Models.............................................................................................14
6. Types of Computer Networks........................................................................17
7. Network Topologies.......................................................................................20
8. Network Protocols..........................................................................................23
9. Network Securitys..........................................................................................15
10. Features of Computer Networks....................................................................27
11. Tools & Software...........................................................................................29
12. Summary........................................................................................................30
References..............................................................................................................31
2
1.Introduction
Computer networking refers to interconnected computing devices that can exchange data and
share resources with each other. These networked devices use a system of rules, called
communications protocols, to transmit information over physical or wireless technologies.
Computer networking is like having a group of friends who all have phones and can call or text
each other. In computer networking, instead of phones, we have computers and instead of phone
lines, we use cables, Wi-Fi, or other methods to connect them. When computers are connected to
a network, they can share information and resources, like files, printers, and internet connections.
This allows them to communicate with each other quickly and easily, just like friends talking on
their phones. A computer network consists of various kinds of nodes. Servers, networking
hardware, personal computers, and other specialized or general-purpose hosts can all be nodes in
a computer network. Hostnames and network addresses are used to identify them. In this article,
we are going to discuss computer networking in detail.
Basics building blocks of a Computer network are Nodes and Links. A Network Node can be
illustrated as Equipment for Data Communication like a Modem, Router, etc., or Equipment of a
Data Terminal like connecting two computers or more. Link in Computer Networks can be defined
as wires or cables or free space of wireless networks.
The working of Computer Networks can be simply defined as rules or protocols which help in
sending and receiving data via the links which allow Computer networks to communicate. Each
device has an IP Address, that helps in identifying a device.
Computer networks first developed in 1950 for military and defence purpose. At that time they
are mainly used to send data through telephone lines and had limited use in business or science.
Today computer networks are essential for businesses also. Modern networks offer more than just
connecting devices. They play a key role in helping businesses adapt to the digital world and
succeed. These networks have become more flexible, automated, and secure, making them even
more important in today’s business environment.
Computer networks are an important part of our daily lives. They allow devices like computers,
smartphones, and tablets to connect and communicate with each other. Whether you’re browsing
the internet, sending an email, or streaming a video, it all happens because of computer networks.
3
either cables or wireless media.
1990s World Wide Web (WWW) Made the internet accessible to the general
public with the creation of the web browser
Mosaic.
2000s Mobile Computing & Social Media Increased internet access through mobile
devices and the rise of social networking
platforms.
4
4. Fundamentals of Computer Network
Computer networks allow multiple devices to connect and share resources like files,
printers, and internet access. Key characteristics include the network’s size (like local or wide
area), the way data is transferred (wired or wireless), and the network’s layout (such as star or
mesh). These features help determine how well the network performs and meets the needs of
its users.
Computer networks are a system of interconnected computers and other devices that
allow for the sharing of information and resources. They can range in size from a few
connected devices in a small office to millions of devices spread out across the globe. In this
article, we are going to discuss some basic characteristics of Computer Networks.
1. Security
Security is one of the most important characteristics of a computer network. Most businesses
5
nowadays depend on computers, which are accessed by using network.
2. Reliability
Computer networks must be reliable to ensure that data and resources are always available
when needed. Redundancy and backup systems can help to ensure that the network remains
operational in the event of a failure.
3. Scalability
Scalability means a network can grow and handle more users or devices without losing
performance. The internet is a great example of this: even as millions of new users connect
and communicate with other devices, the network continues to work well.
4. Flow of Data
Computer networks let users access and share data like files and documents between devices.
This feature is essential because it enables data to move smoothly from one device to another.
5. High Performance
Performance is measured by how quickly a command is executed. If data transfers fast and
responses are quick, it benefits users by making data sharing and resource usage more
efficient. Using multiple processors can further enhance performance.
6. Fault Tolerance
Fault Tolerance is a valuable feature of computer networks. For example, if two devices are
connected by both wired and wireless means, and the wireless connection fails, the data can
still be sent through the wired connection. This ensures that communication continues
smoothly even if part of the network is down or damaged.
7. Quality of Service (QoS)
It means people can choose what data gets sent first and how it’s sent, making sure it goes
fast. If some data doesn’t make it through, the system can handle that too. This makes sure
users get a good experience when using the network.
8. Compatible With Hardware and Software Components
Another important characteristics of computer network is that it lets lots of devices use the
same software. This means you can use the same program on different hardware. This makes
things work better together and makes software easier to use. Plus, it helps make the most out
of the stuff you have.
Computer networks can be classified by geographical scope, such as LAN (Local Area
Network), WAN (Wide Area Network), MAN (Metropolitan Area Network), and PAN
(Personal Area Network), as well as by other factors like wireless/wired and purpose.
6
Private addresses are unique in relation to other computers on the local network.
Routers are found at the boundary of a LAN, connecting them to the larger WAN.
Data transmits at a very fast rate as the number of computers linked is limited. By
definition, the connections must be high-speed and relatively inexpensive hardware
(Such as hubs, network adapters, and Ethernet cables). LANs cover a smaller
geographical area (Size is limited to a few kilometres) and are privately owned. One
can use it for an office building, home, hospital, school, etc. LAN is easy to design
and maintain. A Communication medium used for LAN has twisted-pair cables and
coaxial cables. It covers a short distance, and so the error and noise are minimized.
maintain a Metropolitan Area Network. The fault tolerance of a MAN is less and also
there is more congestion in the network. It is costly and may or may not be owned by
a single organization. The data transfer rate and the propagation delay of MAN are
moderate. Devices used for transmission of data through MAN are Modem and
Wire/Cable. Examples of a MAN are part of the telephone company network that can
provide a high-speed DSL line to the customer or the cable TV network in a city.
7
is more congestion in the network. A Communication medium used for WAN is
PSTN(Public Switched Telephone Network) or Satellite Link. Due to long-distance
transmission, the noise and error tend to be more in WAN.
Computer networks can be classified based on architecture into two primary types:
Peer-to-Peer Architecture
Client/Server Architecture
In this architecture, system is generally decomposed into various computational nodes that
contain the same and equivalent capabilities, abilities, and responsibilities. In this network,
tasks are allocated at each and every device available on network. This network is very
essential and important for small environments, usually up to at least 10 computers. There is
also no separate division as clients and servers. Each and every computer in this network are
treated same and equally and might send even receive message directly. This P2P network is
generally useful in various fields such as business, education, military, etc.
8
as clients) are connected. It is type of system where clients are connected to server to just
share or use resources. These servers are generally considered as heart of system. This type of
network is more stable and scalable as compared to P2P network. In this architecture, system
is generally decomposed into client and server processor or processes.
5. Network Models
In computer networking, a network model is a structured framework that defines how data is
transmitted and received over a network, providing a common blueprint for network devices
and software to communicate effectively. Two prominent models are the OSI model and the
TCP/IP model, both of which organize network communication into layers, each with
specific functions.
1. OSI Model: The OSI (Open Systems Interconnection) Model is a set of rules that
explains how different computer systems communicate over a network. OSI Model was
developed by the International Organization for Standardization (ISO). The OSI Model
consists of 7 layers and each layer has specific functions and responsibilities. This layered
approach makes it easier for different devices and technologies to work together. OSI
Model provides a clear structure for data transmission and managing network issues. The
OSI Model is widely used as a reference to understand how network systems function.
9
Layers of the OSI Model
There are 7 layers in the OSI Model and each layer has its specific role in handling data. All
the layers are mentioned below:
Layer 1 – Physical Layer
The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the
actual physical connection between the devices. The physical layer contains information in
the form of bits. Physical Layer is responsible for transmitting individual bits from one node
to the next. When receiving data, this layer will get the signal received and convert it into 0s
and 1s and send them to the Data Link layer, which will put the frame back together.
10
Layer 2 – Data Link Layer (DLL)
The data link layer is responsible for the node-to-node delivery of the message. The main
function of this layer is to make sure data transfer is error-free from one node to another, over
the physical layer. When a packet arrives in a network, it is the responsibility of the DLL to
transmit it to the Host using its MAC address. Packet in the Data Link layer is referred to as
Frame. Switches and Bridges are common Data Link Layer devices.
The Data Link Layer is divided into two sublayers:
Logical Link Control (LLC)
Media Access Control (MAC)
The packet received from the Network layer is further divided into frames depending on the
frame size of the NIC ( Network Interface Card) DLL also encapsulates Sender and
Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP ( Address Resolution Protocol)
request onto the wire asking, “Who has that IP address?” and the destination host will reply
with its MAC address.
11
Layer 5 – Session Layer
Session Layer in the OSI Model is responsible for the establishment of connections,
management of connections, terminations of sessions between two devices. It also
provides authentication and security. Protocols used in the Session Layer are
NetBIOS, PPTP.
Example
Let us consider a scenario where a user wants to send a message through some
Messenger application running in their browser. The “Messenger” here acts as the
application layer which provides the user with an interface to create the data. This
message or so-called Data is compressed, optionally encrypted (if the data is
sensitive), and converted into bits (0’s and 1’s) so that it can be transmitted.
12
2. TCP/IP Model: The TCP/IP model is a fundamental framework for computer
networking. It stands for Transmission Control Protocol/Internet Protocol, which are the
core protocols of the Internet. This model defines how data is transmitted over networks,
ensuring reliable communication between devices. It consists of four layers: the Link
Layer, the Internet Layer, the Transport Layer, and the Application Layer. Each layer has
specific functions that help manage different aspects of network communication, making
it essential for understanding and working with modern networks.
Layers of TCP/IP Model
Application Layer
Transport Layer (TCP/UDP)
Network/Internet Layer (IP)
Network Access Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows:
13
responsible for the logical transmission of data over the entire network. The main protocols
residing at this layer are as follows:
IP: IP stands for Internet Protocol and it is responsible for delivering packets from the
source host to the destination host by looking at the IP addresses in the packet
headers. IP has 2 versions: IPv4 and IPv6. IPv4 is the one that most websites are using
currently. But IPv6 is growing as the number of IPv4 addresses is limited in number
when compared to the number of users.
ICMP: ICMP stands for Internet Control Message Protocol. It is encapsulated within
IP datagrams and is responsible for providing hosts with information about network
problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to find the hardware
address of a host from a known IP address. ARP has several types: Reverse ARP,
Proxy ARP, Gratuitous ARP, and Inverse ARP.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and retransmit
missing packets to ensure that packets arrive in order and without error. End-to-end
communication is referred to as such. Transmission Control Protocol (TCP) and User
Datagram Protocol are transport layer protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as though they were
physically connected by a circuit. TCP transmits data in a way that resembles
character-by-character transmission rather than separate packets.
UDP: The datagram delivery service is provided by UDP, the other transport layer
protocol. Connections between receiving and sending hosts are not verified by UDP.
4. Application Layer
The Application Layer in the TCP/IP model combines the functions of three layers from
the OSI model: the Application, Presentation, and Session layers. This layer is analogous
to the transport layer of the OSI model. It is responsible for end-to-end communication and
error-free delivery of data. It shields the upper-layer applications from the complexities of
data.
14
1. Personal Area Network (PAN)
PAN is the most basic type of computer network. It is a type of network designed to connect
devices within a short range, typically around one person. It allows your personal devices,
like smartphones, tablets, laptops, and wearables, to communicate and share data with each
other. PAN offers a network range of 1 to 100 meters from person to device providing
communication. Its transmission speed is very high with very easy maintenance and very low
cost.
15
The two important technologies involved in this network are Ethernet and Wi-Fi. It ranges
up to 2km & transmission speed is very high with easy maintenance and low cost. Examples
of LAN are networking in a home, school, library, laboratory, college, office, etc.
16
distance through a shared communication path. It is not restrained to a single location but
extends over many locations. WAN can also be defined as a group of local area networks
that communicate with each other with a range above 50km.
Here we use Leased-Line & Dial-up technology. Its transmission speed is very low and it
comes with very high maintenance and very high cost. The most common example of WAN
is the Internet.
7. Networks Topologies
Network topology refers to the arrangement of different elements like nodes, links, or devices
in a computer network. Common types of network topology include bus, star, ring, mesh, and
tree topologies, each with its advantages and disadvantages. Network topology is the way
devices are connected in a network. It defines how these components are connected and how
data transfer between the network. Understanding the different types of network topologies
can help in choosing the right design for a specific network.
17
1. Bus Topology
Bus Topology is a network type in which every computer and network device is connected
to a single cable. It is bi-directional. It is a multi-point connection and a non-robust
topology because if the backbone fails the topology crashes. In Bus Topology, various
MAC (Media Access Control) protocols are followed by LAN ethernet connections like
TDMA, Pure Aloha, CDMA, etc.
2. Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be passive
in nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub
can be intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables
or RJ-45 cables are used to connect the computers.
3.
3. Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices.
A number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes, then
the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data
loss repeaters are used in the network.The data flows in one direction, i.e. it is unidirectional,
18
but it can be made bidirectional by having 2 connections between each Network Node, it is
called Dual Ring Topology. In-Ring Topology, the Token Ring Passing protocol is used by
the workstations to transmit the data.
4.Tree Topology
Tree topology is the variation of the Star topology. This topology has a hierarchical flow of
data. In Tree Topology, protocols like DHCP and SAC (Standard Automatic
Configuration) are used.
3. Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel.
Every device is connected to another via dedicated channels. These channels are known as
links. In Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
19
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
4. Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied
above. Hybrid Topology is used when the nodes are free to take any form. It means these can
be individuals such as Ring or Star topology or can be a combination of various types of
topologies seen above. Each individual topology uses the protocol that has been discussed
earlier.
20
8. Networks Protocols
A network protocol is a set of rules that govern data communication between different
devices in the network. It determines what is being communicated, how it is being
communicated, and when it is being communicated. It permits connected devices to
communicate with each other, irrespective of internal and structural differences.
Types of Network Protocols:
In most cases, communication across a network like the Internet uses the OSI model. The
OSI model has a total of seven layers. Secured connections, network management, and
network communication are the three main tasks that the network protocol performs. The
purpose of protocols is to link different devices.
The protocols can be broadly classified into three major categories:
Network Communication
Network Management
Network Security
Network Communication
Communication protocols are really important for the functioning of a network. They are so
crucial that it is not possible to have computer networks without them. These protocols
formally set out the rules and formats through which data is transferred. These protocols
handle syntax, semantics, error detection, synchronization, and authentication. Below
mentioned are some network communication protocol :
21
Address Resolution Protocol (ARP)
ARP is a protocol that helps in mapping logical addresses to the physical addresses
acknowledged in a local network. For mapping and maintaining a correlation between these
logical and physical addresses a table known as ARP cache is used.
Internet Protocol (IP)
It is a protocol through which data is sent from one host to another over the internet. It is used
for addressing and routing data packets so that they can reach their destination.
Dynamic Host Configuration Protocol (DHCP)
it’s a protocol for network management and it’s used for the method of automating the
process of configuring devices on IP networks. A DHCP server automatically assigns an IP
and various other configurational changes to devices on a network so they can communicate
with other IP networks.
Network Management
These protocols assist in describing the procedures and policies that are used in monitoring,
maintaining, and managing the computer network. These protocols also help in
communicating these requirements across the network to ensure stable communication.
Network management protocols can also be used for troubleshooting connections between a
host and a client.
Internet Control Message Protocol (ICMP)
It is a layer 3 protocol that is used by network devices to forward operational information and
error messages. ICMP is used for reporting congestions, network errors, diagnostic purposes,
and timeouts.
22
software to look at their mailbox on the remote server and to download their emails. After the
email client downloads the emails, they are generally deleted from the servers.
Telnet
It is a protocol that allows the user to connect to a remote computer program and to use it i.e.,
it is designed for remote connectivity. Telnet creates a connection between a host machine
and a remote endpoint to enable a remote session.
Network Security
These protocols secure the data in passage over a network. These protocols also determine
how the network secures data from any unauthorized attempts to extract or review data.
These protocols make sure that no unauthorized devices, users, or services can access the
network data. Primarily, these protocols depend on encryption to secure data.
Secure Socket Layer (SSL)
It is a network security protocol mainly used for protecting sensitive data and securing
internet connections. SSL allows both server-to-server and client-to-server communication.
All the data transferred through SSL is encrypted thus stopping any unauthorized person from
accessing it.
Hypertext Transfer Protocol (HTTPS)
It is the secured version of HTTP. this protocol ensures secure communication between two
computers where one sends the request through the browser and the other fetches the data
from the web server.
Transport Layer Security (TLS)
It is a security protocol designed for data security and privacy over the internet, its
functionality is encryption, checking the integrity of data i.e., whether it has been tampered
with or not, and authentication
9. Networks Security
Any action intended to safeguard the integrity and usefulness of your data and network is
known as network security. In other words, Network security is defined as the activity created
to protect the integrity of your network and data.
Network security is the practice of protecting a computer network from unauthorized access,
misuse, or attacks. It involves using tools, technologies, and policies to ensure that data
traveling over the network is safe and secure, keeping sensitive information away from
hackers and other threats.
23
The basic principle of network security is protecting huge stored data and networks in layers
that ensure the bedding of rules and regulations that have to be acknowledged before
performing any activity on the data. These levels are:
Physical Network Security: This is the most basic level that includes protecting the
data and network through unauthorized personnel from acquiring control over the
confidentiality of the network. The same can be achieved by using devices like
biometric systems.
Technical Network Security: It primarily focuses on protecting the data stored in the
network or data involved in transitions through the network. This type serves two
purposes. One is protected from unauthorized users, and the other is protected from
malicious activities.
Administrative Network Security: This level of network security protects user
behaviour like how the permission has been granted and how the authorization
process takes place. This also ensures the level of sophistication the network might
need for protecting it through all the attacks. This level also suggests necessary
amendments that have to be done to the infrastructure.
Types of Network Security:
There are several types of network security through which we can make our network more
secure, Your network and data are shielded from breaches, invasions, and other dangers by
network security. Here below are some important types of network security:
Email Security
Email Security is defined as the process designed to protect the Email Account and its
contents safe from unauthorized access. For Example, you generally see, fraud emails are
automatically sent to the Spam folder. because most email service providers have built-in
features to protect the content.
The most common danger vector for a security compromise is email gateways Hackers create
intricate phishing campaigns using recipients’ personal information and social engineering
techniques to trick them and direct them to malicious websites. To stop critical data from
being lost, an email security programme restricts outgoing messages and stops incoming
24
threats.
Network Segmentation
Network traffic is divided into several categories by software-defined segmentation, which
also facilitates the enforcement of security regulations. Ideally, endpoint identity—rather than
just IP addresses—is the basis for the classifications. To ensure that the appropriate amount
of access is granted to the appropriate individuals and that suspicious devices are controlled
and remediated, access permissions can be assigned based on role, location, and other factors.
Access Control
Your network should not be accessible to every user. You need to identify every user and
every device in order to keep out any attackers. You can then put your security policies into
effect. Noncompliant endpoint devices might either have their access restricted or
blocked. Network Access Control (NAC) is this process.
Sandboxing
Sandboxing is a cybersecurity technique in which files are opened or code is performed on a
host computer that simulates end-user operating environments in a secure, isolated
environment. To keep threats off the network, sandboxing watches the code or files as they
are opened and searches for harmful activity.
Web Security
A online security solution will restrict access to harmful websites, stop web-based risks, and
manage staff internet usage. Your web gateway will be safeguarded both locally and in the
cloud.
25
Worms is handled by the same. This ensures that not only the entry of the malware is
protected but also that the system is well-equipped to fight once it has entered.
Firewalls Security
A firewall is a network security device, either hardware or software-based, which monitors
all incoming and outgoing traffic and based on a defined set of security rules accepts, rejects,
or drops that specific traffic. Before Firewalls, network security was performed by Access
Control Lists (ACLs) residing on routers.
Application Security
Application security denotes the security precautionary measures utilized at the application
level to prevent the stealing or capturing of data or code inside the application. It also
includes the security measurements made during the advancement and design of applications,
as well as techniques and methods for protecting the applications whenever.
Wireless Security
Wireless Securitys are less secure than wired ones. If not properly secured, setting up a
wireless LAN can be like having Ethernet ports available everywhere, even in places like
parking lots. To prevent attacks and keep your wireless network safe, you need dedicated
products designed to protect it from exploits and unauthorized access.
Web Security
A web security solution manages how your staff uses the internet, blocks threats from
websites, and stops access to harmful sites. It safeguards your web gateway either onsite or in
the cloud. Additionally, “web security” involves measures taken to protect your own website
from potential attacks and vulnerabilities.
26
90 percent of IT organizations might allow corporate applications on personal mobile
devices. It’s crucial to control which devices can connect to your network and set up their
connections securely to protect network traffic from unauthorized access.
VPN Security
A virtual private network (VPN) encrypts the connection between a device and a network,
usually over the internet. A remote-access VPN commonly uses IPsec to verify and secure
the communication between the device and the network. This encryption ensures that data
transmitted between the device and the network remains private and secure from
unauthorized access.
27
(IDS) can be complex and require specialized knowledge and resources.
Cost: Effective network security often requires investment in hardware, software, and
skilled personnel, which can be expensive for organizations, especially smaller ones.
Privacy Concerns: Some network security measures, such as deep packet inspection
and monitoring, may raise privacy concerns among users and stakeholders, requiring
careful balancing of security needs with individual privacy rights.
28
Security is one of the main characteristics of Computer Networks, Thus a computer network
should be secure so that the data transmitting over the network should be safe from any
unauthorized access.
Also, the data sent by the sending node should be received as it is at the receiving node,
which simply means there should be no loss of data during the transmission of the data.
4. Scalability
Another feature of a Computer network is scalability. The scalability of a computer network
simply means that we can add new nodes or components to the network easily. Any computer
network must be scalable so we can extend it easily by adding new nodes. After adding new
nodes to the network the speed of connection decreases which leads to a decrease in the speed
of transmission of data. Thus due to all these, there are more chances for the occurrence of
error.
This problem can be resolved with the help of routing devices.
Let us take an example of this: Suppose there are 50 computers in a company for their 50
employees. Let's say the company hires another 100 employees and then the company adds
100 computers to the existing local area network then in that case LAN should allow the
same.
5. Performance
The performance of a computer network is measured using response time and with the help
of the speed of data transmission. For better performance, the response time of sending and
receiving data from one node to another should be minimum.
6. Backup
There must be a central server for the computer network and this server must keep the backup
of all the data that is shared over the network. And at the time of failure in the network this
central server helps in the faster recovery.
7. Software and Hardware Compatibility
In the Computer Network, there must not be any limitation for all the computers in a
computer network to use the same software and hardware.
Instead, the computer network should allow better compatibility between different software
and hardware configuration.
With the help of a Computer network, it becomes very easy for all of us to share our
knowledge and ideas with others for example: via email messaging, via video conferencing
over the internet, everything becomes easy.
Conclusion
Thus we have covered different features of Computer Networks and with the help of the
computer network, the communication becomes easy and efficient. Another feature of
Computer networks is that they provide quality of service(QoS) by avoiding data loss,
avoiding unauthorized access to the data, reducing delay in data transmission, and by
managing the data traffic.
computer networks are vital for modern communication, collaboration, and information
access, enabling resource sharing, enhanced security, and efficient data transfer, benefiting
individuals, businesses, and institutions alike.
29
11. Summary
comprehensive summary of a network can be displayed in the Network Overview View. The
summary displays an overview of the entire network. If there is a current selection, the
summary also includes information about the selection.
A computer is an electronic device, operating under the control of instructions stored
in its own memory that can accept data (input), process the data according to specified rules,
produce information (output), and store the information for future use1. Any kind of
computers consists of HARDWARE AND SOFTWARE. Computing is any goal-oriented
activity requiring, benefiting from, or creating computing machinery. It includes the study
and experimentation of algorithmic processes, and the development of both hardware and
software. Computing has scientific, engineering, mathematical, technological, and social
aspects.
A computer is a machine that can be programmed to automatically carry out
sequences of arithmetic or logical operations (computation). Modern digital electronic
computers can perform generic sets of operations known as programs. These programs enable
computers to perform a wide range of tasks. A computer network is a system of
interconnected devices (nodes) that share resources and information using established
communication protocols (rules) over physical or wireless connections.
12. REFERENCES
Textbooks:
Goleniewski, L. (2006) Telecommunications Essentials, Addison Wesley Professional.
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Kurose, J.F. and K.W. Ross (2003) Computer Networking: A Top Down Approach Featuring
the Internet, Addison Wesley.
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Mir, N.F. (2006) Computer and Communication Networks, Prentice Hall.
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Ogletree, T.W. and M.E. Soper (2006) Upgrading and Repairing Networks, Que.
30
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Spurgeon, Charles E. (2000) Ethernet: The Definitive Guide, O'Reilly Media, Inc..
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Tanenbaum, A.S. (2002) Computer Networks, Prentice Hall.
(Order from amazon , order from Barnes and Noble , compare at bigwords , compare
at CampusBooks4Less , order from Chegg , or search eFollett )
Network Administration References: A variety of books concerned with practical aspects of
network administration are available (to members of the JMU community) from Safari Books
Online, including:
DNS for Rocket Scientists
Linux Networking Cookbook (2007) C. Schroder
Advanced Linux Networking (2002) R. Smith
Windows XP Networking (2004) K. Cohen and A. Daniels
Windows Server 2003 Network Administration (2005) C. Hunt and R. Bragg
Mastering Windows Server 2008 Networking Foundations (2008) M. Minasi, R. Layfield and
J. Mueller
Windows Server 2008 Networking and Network Access Protection (2008) J. Davies and T.
Northrup
31