0% found this document useful (0 votes)
48 views10 pages

Introduction to Computer Networks

Uploaded by

Veloly Essiks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views10 pages

Introduction to Computer Networks

Uploaded by

Veloly Essiks
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ILOCOS SUR POLYTECHNIC STATE COLLEGE

Candon Campus

MODULE 5

COMPUTER NETWORKS

INTENDED LEARNING OBJECTIVES

At the lesson the students will be able to:


 Define what is computer network and its component;
 Differentiate the types of computer networks;

LESSON PROPER
 INTRODUCTION TO COMPUTER NETWORK?
A computer network is a system that connects two or more computing devices
to transmit and share information. A computer network is a system that connects two or
more computing devices for transmitting and sharing information. Computing devices
include everything from a mobile phone to a server. These devices are connected using
physical wires such as fiber optics, but they can also be wireless.

The first working network, called ARPANET (Advance Research Projects Agency
Networks), was created in the late 1960s and was funded by the U.S. Department of
Defense. Government researchers used to share information at a time when computers
were large and difficult to move. We have come a long way today from that basic kind of
network. Today’s world revolves around the internet, which is a network of networks that
connects billions of devices across the world. Organizations of all sizes use networks to
connect their employees’ devices and shared resources such as printers.

An example of a computer network at large is the traffic monitoring systems in


urban cities. These systems alert officials and emergency responders with information
about traffic flow and incidents. A simpler example is using collaboration software such
as Google Drive to share documents with colleagues who work remotely. Zoom, Teams,
Google Meet, Discord and etc. Every time we connect via a video call, stream movies,
share files, chat with instant messages, or just access something on the internet, a
computer network is at work.

Computer networking is the branch of computer science that deals with the
ideation, architecture, creation, maintenance, and security of computer networks. It is a
combination of computer science, computer engineering, and telecommunication.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
 KEY COMPONENTS OF A COMPUTER NETWORK
From a broader lens, a computer network is built with two basic blocks: nodes or
network devices and links. The links connect two or more nodes with each other. The
way these links carry the information is defined by communication protocols. The
communication endpoints, i.e., the origin and destination devices, are often called ports.

Main Components of a Computer Network


1. Network Devices
Network devices or nodes are computing devices that need to be linked in
the network. Some network devices include:
• Computers, mobiles, and other consumer devices: These are end devices
that users directly and frequently access. For example, an email originates
from the mailing application on a laptop or mobile phone.
• Servers: These are application or storage servers where the main
computation and data storage occur. All requests for specific tasks or data
come to the servers.
• Routers: Routing is the process of selecting the network path through
which the data packets traverse. Routers are devices that forward these
packets between networks to ultimately reach the destination. They add
efficiency to large networks.
• Switches: Repeaters are to networks what transformers are to electricity
grids—they are electronic devices that receive network signals and clean or
strengthen them. Hubs are repeaters with multiple ports in them. They pass
on the data to whichever ports are available. Bridges are smarter hubs that
only pass the data to the destination port. A switch is a multi-port bridge.
Multiple data cables can be plugged into switches to enable communication
with multiple network devices.
• Gateways: Gateways are hardware devices that act as ‘gates’ between two
distinct networks. They can be firewalls, routers, or servers.
2. Links
Links are the transmission media which can be of two types;
• Wired: Examples of wired technologies used in networks include coaxial
cables, phone lines, twisted-pair cabling, and optical fibers. Optical fibers
carry pulses of light to represent data.
• Wireless: Network connections can also be established through radio or
other electromagnetic signals. This kind of transmission is called ‘wireless’.
The most common examples of wireless links include communication
satellites, cellular networks, and radio and technology spread spectrums.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
Wireless LANs use spectrum technology to establish connections within a
small area.

3. Communication Protocols
A communication protocol is a set of rules followed by all nodes involved in
the information transfer. Some common protocols include the internet protocol
suite (TCP/IP), IEEE 802, Ethernet, wireless LAN, and cellular standards. TCP/IP is a
conceptual model that standardizes communication in a modern network. It
suggests four functional layers of these communication links:

• Network access layer: This layer defines how the data is physically
transferred. It includes how hardware sends data bits through physical wires
or fibers.
• Internet layer: This layer is responsible for packaging the data into
understandable packets and allowing it to be sent and received.
• Transport layer: This layer enables devices to maintain a conversation by
ensuring the connection is valid and stable.
• Application layer: This layer defines how high-level applications can access
the network to initiate data transfer.

Most of the modern internet structure is based on the TCP/IP model, though
there are still strong influences of the similar but seven-layered open systems
interconnection (OSI) model.

IEEE802 is a family of IEEE standards that deals with local area networks
(LAN) and metropolitan area networks (MAN). Wireless LAN is the most well-
known member of the IEEE 802 family and is more widely known as WLAN or Wi-
Fis.

4. Network Defense
While nodes, links, and protocols form the foundation of a network, a
modern network cannot exist without its defenses. Security is critical when
unprecedented amounts of data are generated, moved, and processed across
networks. A few examples of network defense tools include firewall, intrusion
detection systems (IDS), intrusion prevention systems (IPS), network access control
(NAC), content filters, proxy servers, anti-DDoS devices, and load balancers.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
 TYPES OF COMPUTER NETWORK
Computer networks can be classified based on several criteria, such as the
transmission medium, the network size, the topology, and organizational intent. Based on
a geographical scale, the different types of networks are:

1. Nanoscale networks: These networks enable communication between minuscule


sensors and actuators.
• Minuscule Sensor a very small sensor, or microsensor, that can convert
mechanical energy into electrical energy.
• Actuators it is the component in any machine that enables movement
2. Personal area network (PAN): PAN refers to a network used by just one person
to connect multiple devices, such as laptops to scanners, etc.
3. Local area network (LAN): The local area network connects devices within a
limited geographical area, such as schools, hospitals, or office buildings.
4. Storage area network (SAN): SAN is a dedicated network that facilitates block-
level data storage. This is used in storage devices such as disk arrays and tape
libraries.
• Disk Arrays a storage system that contains multiple disk drives that work
together to store data. It is also called as storage arrays
• Tape Libraries a physical storage system that houses magnetic tape
cartridges and tape drives for reading, writing, and managing data.
5. Campus area network (CAN): Campus area networks are a collection of
interconnected LANs. They are used by larger entities such as universities and
governments.
6. Metropolitan area network (MAN): MAN is a large computer network that spans
across a city.
7. Wide area network (WAN): Wide area networks cover larger areas such as large
cities, states, and even countries.
8. Enterprise private network (EPN): An enterprise private network is a single
network that a large organization uses to connect its multiple office locations.
9. Virtual private network (VPN): VPN is an overlay private network stretched on
top of a public network.
10. Cloud network: Technically, a cloud network is a WAN whose infrastructure is
delivered via cloud services. Cloud services also known as cloud computing
are applications, infrastructure, and platforms that are hosted by third-party
providers and accessed over the internet. They allow users to take advantage of
computing resources without having to purchase or maintain their own hardware
and software.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
Based on organizational intent, networks can be classified as:
1. Intranet: Intranet is a set of networks that is maintained and controlled by a single
entity. It is generally the most secure type of network, with access to authorized
users alone. An intranet usually exists behind the router in a local area network.

2. Internet: The internet (or the internetwork) is a collection of multiple networks


connected by routers and layered by networking software. This is a global system
that connects governments, researchers, corporates, the public, and individual
computer networks.

3. Extranet: An extranet is similar to the intranet but with connections to particular


external networks. It is generally used to share resources with partners, customers,
or remote employees.

4. Darknet: The darknet is an overlay network that runs on the internet and can only
be accessed by specialized software. It uses unique, customized communication
protocols.

 KEY OBJECTIVES OF DEPLOYING A COMPUTER NETWORK


There is no industry—education, retail, finance, tech, government, or healthcare—
that can survive without well-designed computer networks. The bigger an organization,
the more complex the network becomes. Before taking on the onerous task of creating
and deploying a computer network, here are some key objectives that must be
considered.

1. Resource sharing
Today’s enterprises are spread across the globe, with critical assets being
shared across departments, geographies, and time zones. Clients are no more
bound by location. A network allows data and hardware to be accessible to every
pertinent user. This also helps with interdepartmental data processing. For
example, the marketing team analyzes customer data and product development
cycles to enable executive decisions at the top level.

2. Resource availability & reliability


A network ensures that resources are not present in inaccessible silos and
are available from multiple points. The high reliability comes from the fact that
there are usually different supply authorities. Important resources must be backed
up across multiple machines to be accessible in case of incidents such as hardware
outages.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5

3. Performance management
A company’s workload only increases as it grows. When one or more processors
are added to the network, it improves the system’s overall performance and
accommodates this growth. Saving data in well-architected databases can
drastically improve lookup and fetch times.

4. Cost savings
Huge mainframe computers are an expensive investment, and it makes more
sense to add processors at strategic points in the system. This not only improves
performance but also saves money. Since it enables employees to access
information in seconds, networks save operational time, and subsequently, costs.
Centralized network administration also means that fewer investments need to be
made for IT support.

5. Increased storage capacity


Network-attached storage devices are a boon for employees who work with
high volumes of data. For example, every member in the data science team does
not need individual data stores for the huge number of records they crunch.
Centralized repositories get the job done in an even more efficient way. With
businesses seeing record levels of customer data flowing into their systems, the
ability to increase storage capacity is necessary in today’s world.

6. Streamlined collaboration & communication


Networks have a major impact on the day-to-day functioning of a company.
Employees can share files, view each other’s work, sync their calendars, and
exchange ideas more effectively. Every modern enterprise runs on internal
messaging systems such as Slack for the uninhibited flow of information and
conversations. However, emails are still the formal mode of communication with
clients, partners, and vendors.

7. Reduction of errors
Networks reduce errors by ensuring that all involved parties acquire
information from a single source, even if they are viewing it from different
locations. Backed-up data provides consistency and continuity. Standard versions
of customer and employee manuals can be made available to a large number of
people without much hassle.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
8. Secured remote access
Computer networks promote flexibility, which is important in uncertain
times like now when natural disasters and pandemics are ravaging the world. A
secure network ensures that users have a safe way of accessing and working on
sensitive data, even when they’re away from the company premises. Mobile
handheld devices registered to the network even enable multiple layers of
authentication to ensure that no bad actors can access the system.

 BEST PRACTICES FOR COMPUTER NETWORK MANAGEMENT


Network management is the process of configuring, monitoring, and
troubleshooting everything that pertains to a network, be it hardware, software, or
connections. The five functional areas of network management are fault management,
configuration management, performance management, security management, and (user)
accounting management.

Computer networks can quickly become unruly mammoths if not designed and
maintained from the beginning.

Network Management Best Practices


1. Pick the right topology
Network topology is the pattern or hierarchy in which nodes are connected
to each other. The topology can speed up, slow down, or even break the network
based on the company’s infrastructure and requirements. Before setting up a
network from scratch, network architects must choose the right one. Some
common topologies include:

• Bus network: Each node is linked to only one other node.


• Ring network: Each node is linked to two other nodes, thus forming a ring.
• Mesh network: Each node must strive to be connected to every other node
in the system.
• Star network: A central node server is linked to multiple other nodes. This
is faster since data doesn’t have to travel through each node.
• Tree network: Here, nodes are arranged in hierarchies.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
2. Document & update constantly
Documentation of the network is vital since it is the backbone of operations.
The documentation must include:
• Technical specifications of equipment, including wires, cables, and
connectors
• Hardware
• The software used to enable the hardware and the smooth and secure flow
of data
• Firmware
• A formal record of policies and procedures with respect to network
operators and users

This must be audited at scheduled intervals or during rehauls. Not only does
this make network management easier, but it also allows for smoother compliance
audits.

3. Use the right tools


The network topology is just the first step toward building a robust network.
To manage a highly available and reliant network, the appropriate tools must be
placed at the right locations. Must-have tools in a network are:

• Network monitoring solutions: A network monitoring solution gives


complete visibility into the network. Visual maps help gauge network
performance. It can track packets, provide a granular look into network
traffic, and help spot anomalies. Newer monitoring systems
leverage artificial intelligence to predict scaling requirements and cyber
threats using historic and real-time data.
• Configuration management tools: A network contains many components
that interface with each other. This results in a lot of configuration
parameters to keep track of. Configuration management tools resolve this
by providing configuration tools that span across the entire network. They
also allow network managers to ensure that all compliance requirements
have been fulfilled.
• IP address managers: Bigger networks need to have an IP address manager
(IPAM) to plan, track, and manage information associated with a network’s
IP addresses.
• Security solutions: Firewalls, content filtering systems, intrusion detection
and prevention systems—these are all tools that safeguard networks that
are carrying increasingly sensitive loads. No network is complete without

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
them. However, just acquiring these tools is not enough. They must also be
properly placed within the network. For example, a firewall must be placed
at every network junction. Anti-DDoS devices must be placed at the
perimeters of the network. Load balancers need to be placed at strategic
locations based on the infrastructure, such as before a cluster of database
servers. This must be an explicit part of the network architecture.

4. Establish baseline network & abnormal behavior


A baseline allows admins to know how the network normally behaves in
terms of traffic, user accesses, etc. With an established baseline, alerts can be set
up in appropriate places to flag anomalies immediately. The normal range of
behavior must be documented at both, user and organizational levels. Data
required for the baseline can be acquired from routers, switches, firewalls, wireless
APs, sniffers, and dedicated collectors.

5. Protect the network from insider threats


Firewalls and intrusion prevention systems ensure that bad actors remain
out of the network. However, insider threats need to be addressed as well,
particularly with cybercriminals targeting those with access to the network using
various social engineering ploys. One way of doing this is to operate on a least-
privilege model for access management and control. Another is to use stronger
authentication mechanisms such as single sign-on (SSO) and two-factor
authentication (2FA). Besides this, employees also need to undergo regular training
to deal with security threats. Proper escalation processes must be documented and
circulated widely.

6. Use multiple vendors for added security


While it makes sense to stick to one hardware vendor, a diverse range of
network security tools is a major plus for a large network. Security is a dynamic and
ever-involving landscape. Hardware advancements are rapid and cyber threats also
evolve with them. It is impossible for one vendor to be up to date on all threats.
Additionally, different intrusion detection solutions use different detection
algorithms. A good mix of these tools strengthens security; however, you must
ensure that they are compatible and allow for common logging and interfacing.

7. Segregate the network


Enterprise networks can become large and clunky. Segregation allows them
to be divided into logical or functional units, called zones. Segregation is usually
done using switches, routers, and virtual LAN solutions. One advantage of a

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.
ILOCOS SUR POLYTECHNIC STATE COLLEGE
Candon Campus

MODULE 5
segregated network is that it reduces potential damage from a cyberattack and
keeps critical resources out of harm’s way. Another plus is that it allows for more
functional classification of networks, such as separating programmer needs from
human resources needs.

8. Use centralized logging


Centralized logs are key to capturing an overall view of the network.
Immediate log analysis can help the security team flag suspicious logins and IT
admin teams to spot overwhelmed systems in the network.

9. Consider using honeypots & honeynets


Honeypots are separate systems that appear to have legitimate processes
and data but are actually a decoy for insider and outsider threats. Any breach of
this system does not cause the loss of any real data. A honeynet is a fake network
segment for the same cause. While this may come at an additional cost to the
network, it allows the security team to keep an eye out for malicious players and
make appropriate adjustments.

10. Automate wherever possible


New devices are added to systems regularly, and old ones are retired. Users
and access controls keep changing frequently. All of these must be automated to
ensure that human error does not occur and there are no vulnerable zombie
systems in the network, costing money and security. Automation with respect to
security is also crucial. It is a good practice to automate responses to attacks,
including blocking IP addresses, terminating connections, and gathering additional
information about attacks.

Course Code: IT 101


Descriptive Title: INTRODUCTION TO COMPUTING
Instructor: GONZAGA, John Paul G.

You might also like