Model 1.
Introduction to Computer Network
Networking Fundamentals
What Is a Computer Network?
. A computer network is a system that connects two or more computing devices for transmitting
and sharing information. Computing devices include everything from a mobile phone to a
server. These devices are connected using physical wires such as fiber optics, but they can also be
wireless.
. A computer network is a collection of computers and other peripheral devices that are
connected in order to exchange data and hardware resources.
. Computer networking refers to interconnected computing devices that can exchange data and
share resources with each other. These networked devices use a system of rules, called
communications protocols, to transmit information over physical or wireless technologies.
Key
Components
of a Computer
Network
1.Network Devices
• Network devices or nodes are computing devices that need to be linked in the network. Some
network devices include:
• Computers, mobiles, and other consumer devices: These are end devices that users directly
and frequently access. For example, an email originates from the mailing application on a
laptop or mobile phone.
• Servers: These are application or storage servers where the main computation and data
storage occur. All requests for specific tasks or data come to the servers.
• Routers: Routing is the process of selecting the network path through which the data packets
traverse. Routers are devices that forward these packets between networks to ultimately reach
the destination. They add efficiency to large networks.
• Switches: Repeaters are to networks what transformers are to electricity grids—they are
electronic devices that receive network signals and clean or strengthen them. Hubs are
repeaters with multiple ports in them. They pass on the data to whichever ports are available.
Bridges are smarter hubs that only pass the data to the destination port. A switch is a multi-
port bridge. Multiple data cables can be plugged into switches to enable communication with
multiple network devices.
• Gateways: Gateways are hardware devices that act as ‘gates’ between two distinct networks.
They can be firewalls, routers, or servers.
2. Links
• Links are the transmission media which can
be of two types:
• Wired: Examples of wired technologies
used in networks include coaxial cables,
phone lines, twisted-pair cabling, and
optical fibers. Optical fibers carry pulses of
light to represent data.
• Wireless: Network connections can also be
established through radio or other
electromagnetic signals. This kind of
transmission is called ‘wireless’. The most
common examples of wireless links include
communication satellites, cellular networks,
and radio and technology spread spectrums.
Wireless LANs use spectrum technology to
establish connections within a small area.
3.Communication protocols
• A communication protocol is a set of rules followed by all
nodes involved in the information transfer. Some common
protocols include the internet protocol suite (TCP/IP), IEEE
802, Ethernet, wireless LAN, and cellular standards. TCP/IP
is a conceptual model that standardizes communication in a
modern network. It suggests four functional layers of these
communication links:
• Network access layer: This layer defines how the data is
physically transferred. It includes how hardware sends data
bits through physical wires or fibers.
• Internet layer: This layer is responsible for packaging the
data into understandable packets and allowing it to be sent
and received.
• Transport layer: This layer enables devices to maintain a
conversation by ensuring the connection is valid and stable.
• Application layer: This layer defines how high-level
applications can access the network to initiate data transfer.
4. Network
Defense
• While nodes, links, and protocols form the
foundation of a network, a modern network
cannot exist without its defenses. Security
is critical when unprecedented amounts of
data are generated, moved, and processed
across networks. A few examples of
network defense tools include firewall,
intrusion detection systems (IDS), intrusion
prevention systems (IPS), network access
control (NAC), content filters, proxy
servers, anti-DDoS devices, and load
balancers.
Types of Computer Networks
LAN (LOCAL AREA MAN (METROPOLITAN WAN (WIDE AREA
NETWORK) AREA NETWORK) NETWORK)
LAN (Local Area Network)
• The local area network connects devices within a
limited geographical area, such as schools,
hospitals, or office buildings.
• Local Area Network is a group of computers
connected to each other in a small area such as
building, office.
• LAN is used for connecting two or more
personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
• It is less costly as it is built with inexpensive
hardware such as hubs, network adapters, and
ethernet cables.
1. Covers a small region of space, typically a single building.
2. LAN is the smallest network compared to other two
LAN
networks.
3. The simplest form of LAN is to connect two computers
(Local Area
together
Network)
4. LAN is operated within a limited physical area such as at
home, school, a single building or several buildings.
5. A network which consists of less than 500 interconnected
devices across several buildings, is still recognized as a LAN.
6. LAN is very high-speed network (from previously 10Mbps)
to 100Mbps,which is faster than MAN and WAN.
LAN
MAN (Metropolitan Area Network)
• It’s a collection of LANs with the same geographical
area, for instance a city.
• Is a network of computers located at different sites
within a large physical area, such as a city.
• MAN often acts as a high-speed network(although not
as fast as LAN) to allow sharing of regional resources.
• MAN can define as a group of computers and network
devices connected together within a large physical area
through a communication medium such as Twisted-
Pair and Fiber-Optic etc.
• Companies that have several branches within the Pune
city such as banks, Offices, University, Government
Buildings.
MAN
• A MAN may be a large number of privately owned
or telecommunication provider interconnects
between organizations.
• A MAN may be a public or free Wi-Fi system
provided to residents of a city.
• A MAN may be a network used by a municipality
or company to interconnect its public works
systems and internet of things (IoT) devices.
WAN (Wide Area Network)
• It’s a largest network of all network types.
• The internet is the largest WAN in the world.
• WAN generally covers large distances such as states,
countries or continents through a communication medium
such as Fiber-Optic, radio wave and satellite etc.
• WAN is group of MANs or LANs or the mixture of both
network.
• A wide area network is a telecommunications network that
extends over a large geographic area.
• In its simplest form, a wide-area network (WAN) is a
collection of local-area networks (LANs) or other
networks that communicate with one another. A WAN is
essentially a network of networks, with the Internet the
world's largest WAN.
• An example in the society using WAN is the banking
organization.
Difference between Types of Computer Networks
Network LAN MAN WAN
Expands to Local Area Network Metropolitan Area Network. Wide Area Network.
A network that connects a group of It covers a broad area, such It connects countries and spans a broad geographic
Meaning
computers across a short distance. as cities and towns. area. As an example, consider the Internet.
Ownership of
Private Private or public Private or public.
Network
Speed High Moderate Low
Design and
Easy Difficult Difficult
Maintenance
Propagation
Short Moderate Long
Delay
Congestion Less More More
Fault Tolerance More tolerant. Less tolerant Less tolerant
Used for School, college and hospitals. Small town, city Country/Continent
Uses of Computer Networks
1. File Sharing:
1. Networks allow users to share files and resources seamlessly. This is particularly important in business environments
where multiple users need access to the same documents or files.
2. Communication:
1. Networks facilitate communication through email, instant messaging, and video conferencing. This is not only important
in business but also for personal communication.
3. Internet Access:
1. Networks provide access to the internet, enabling users to browse websites, access online services, and communicate
globally.
4. Resource Sharing:
1. Networks allow the sharing of hardware resources such as printers, scanners, and storage devices. This helps in
optimizing resource utilization and reducing costs.
5. Remote Access:
1. Networks enable remote access to systems and resources. This is valuable for individuals and organizations that need to
access data or applications from different locations.
6. Data Backup and Recovery:
1. Networks facilitate centralized data storage and backup, making it easier to recover information in case of system
failures or data loss.
7. Collaboration:
1. Networks support collaboration among users by providing shared platforms and tools for working on projects,
documents, and other collaborative efforts.
8. Online Gaming:
1. Multiplayer online gaming relies on computer networks to connect players worldwide, allowing them to interact and
compete in real-time.
9. E-commerce:
1. Computer networks form the backbone of e-commerce platforms, enabling online transactions, secure payment processing, and efficient order fulfillment.
10. Social Networking:
1. Social media platforms heavily depend on computer networks to connect users globally, allowing them to share updates, photos, and interact in real-time.
11. Education:
1. Networks are used in educational institutions to connect students, teachers, and resources. This facilitates online learning, collaboration, and access to
educational materials.
12. Business Applications:
1. Organizations use networks to run business applications such as Enterprise Resource Planning (ERP), Customer Relationship Management (CRM), and
other software that facilitates business processes.
13. Research and Development:
1. Researchers and scientists use computer networks to collaborate on projects, share data, and access information from various sources.
14. Security and Surveillance:
1. Networks are integral for security systems, including surveillance cameras, access control systems, and alarm systems, allowing for real-time monitoring
and response.
15. Healthcare Systems:
1. Computer networks are essential in healthcare for managing patient records, sharing diagnostic information, and connecting healthcare professionals for
collaboration.
16. Entertainment:
1. Networks support streaming services, online music platforms, and other forms of digital entertainment, providing users with a wide range of content.
17. Home Applications: Many smart home devices, such as smart thermostats, lights, cameras, doorbells, Refrigerator, AC, TV , Fan, Audio Video Equipment's or
other networks for communication and remote control.
Advantages of Uses of Computer Networks
• Improved communication and collaboration.
• Cost savings through resource sharing.
• Better data management and security.
• Increased flexibility with remote access.
• Enhanced productivity and efficiency
Disadvantages of Uses of Computer Networks
• Security risks.
• Technical issues and maintenance challenges.
• Increased vulnerability to viruses and malware.
• Potential for decreased privacy and confidentiality.
Features Of
Computer network
• Communication speed
• File sharing
• Back up and Roll back is easy
• Software and Hardware
sharing
• Security
• Scalability
• Reliability
Protocol
• A protocol is a set of rules for formatting and
processing data. Network protocols are like a
common language for computers. The computers
within a network may use vastly different software
and hardware; however, the use of protocols
enables them to communicate with each other
regardless.
• The three aspects of a protocol are
• Syntax − It defines the format of data that is to be
sent or received.
• Semantics − It defines the meaning of each section
of bits that are transferred.
• Timings − It defines the time at which data is
transferred as well as the speed at which it is
transferred.
Functions of Protocols
• Data Sequencing: It mainly refers to dive data into packets i.e. it divided the whole data into some
packets.
• Data Flow: It mainly deals with sending data to the correct destination i.e. the flow of the data is correct
or not.
• Data Routing: It refers to select the best path for data transmission between a sender and a receiver
because there can be many routes from sender to receiver and you should select the best possible route.
• Encapsulation: It refers to the process of taking one protocol and transferring it to some other another
protocol.
• Segmentation & Reassembly: It deals with segmenting the data message i.e. diving the data into
packets when data flows from the upper protocol layer to lower, and reassembly is vice-versa of
segmentation i.e. all the segmented packets are recollected in the correct order at the receiver side.
• Connection Control: It ensures connection-oriented data transfer for lengthy data items.
• Multiplexing: It allows combining multiple transmission unit signals or channels of higher-level
protocols in one transmission unit of a lower-level protocol. Multiplexing can be upward or downward.
• Ordered Delivery: Protocol facilitates ordered delivery of data, by providing a unique sequence number
to each data packet. It is the function of the sender to maintain ordered delivery. By doing so, the receiver
will receive the data in the same order as sent by the sender.
• Transmission Services: It mainly deals with priority, Quality of Service (QoS), and security of data
packets.
• Addressing: It mainly deals with addressing levels, addressing scope, communication identifiers, and
addressing modes.
• Flow Control: It facilitates to limit the flow of data. It is the function of the receiver's end to maintain
flow control of data.
• Error Control: It deals with error detection (using the checksum bits) and its control. If any error is
detected during the transmission of the data, a request for retransmission of data is sent to the sender by
the receiver, and the corrupt data is discarded.
Types of Internet Protocol
1. TCP/IP(Transmission Control Protocol/ Internet Protocol)
2. SMTP(Simple Mail Transfer Protocol)
3. PPP(Point-to-Point Protocol)
4. FTP (File Transfer Protocol)
5. SFTP(Secure File Transfer Protocol)
6. HTTP(Hyper Text Transfer Protocol)
7. HTTPS(HyperText Transfer Protocol Secure)
8. TELNET(Terminal Network)
9. IPv4
10. IPv6
11. ICMP (Internet Control Message Protocol)
12. UDP (User Datagram Protocol)
13. IMAP (Internet Message Access Protocol)
Protocol
Hierarchies :
Generally, Computer networks are comprised of or
contain a large number of pieces of hardware and
software. To just simplify network design, various
networks are organized and arranged as a stack of
layers of hardware and software, one on top of
another. The number, name, content, and function
of each layer might vary and can be different from
one network to another. The main purpose of each
of layers is just to offer and provide services to
higher layers that are present. Each and every layer
has some particular task or function. In
programming, this concept is very common. The
networks are organized and arranged as different
layers or levels simply to reduce and minimize
complexity of design of network software.
Example :
Diagram representing a five-layer network. The diagram shows
communication between Host 1 and Host 2. The data stream is passed
through a number of layers from one host to other. Virtual communication is
represented using dotted lines between peer layers. Physical communication
is represented using solid arrows between adjacent layers. Through physical
medium, actual communication occurs. The layers at same level are
commonly known as peers. The peer basically has a set of communication
protocols. An interface is present between each of layers that are used to
explain services provided by lower layer to higher layer.
Advantages :
•The layers generally reduce complexity of communication between
networks
•It increases network lifetime.
•It also uses energy efficiently.
•It does not require overall knowledge and understanding of network.
Design Issues for the
Layers of Computer
Networks
• Reliability
• Scalability.
• Addressing. ...
• Error Control. ...
• Flow Control. ...
• Resource Allocation. ...
• Statistical Multiplexing. ...
• Routing.
Connection-Oriented and
Connectionless Services
• Connection-oriented service is related to the telephone system. It includes
connection establishment and connection termination.
• A connection-oriented service is a type of communication service in computer
networking that ensures reliable and ordered data transfer between two
devices. In a connection-oriented communication model, a dedicated
connection or path is established between the communicating devices before
any data exchange occurs. This connection is maintained throughout the
duration of the communication session, allowing for a reliable and controlled
data transfer process.
• Connection-less service is related to the postal system. It does not include any
connection establishment and connection termination. Connection-less Service
does not give a guarantee of reliability.
• A connectionless service is a type of communication service in computer
networking that does not establish a dedicated connection before transmitting
data between devices.
Difference between Connection-oriented and Connection-less Services:
S.NO CONNECTION-ORIENTED SERVICE CONNECTION-LESS SERVICE
1. Connection-oriented service is related to the telephone system. Connection-less service is related to the postal system.
2.
Connection-oriented service is preferred by long and steady
Connection-less Service is preferred by bursty communication.
communication.
3. Connection-oriented Service is necessary. Connection-less Service is not compulsory.
4. Connection-oriented Service is feasible. Connection-less Service is not feasible.
5. In connection-oriented Service, Congestion is not possible. In connection-less Service, Congestion is possible.
6. Connection-oriented Service gives the guarantee of reliability. Connection-less Service does not give a guarantee of reliability.
7. In connection-oriented Service, Packets follow the same route. In connection-less Service, Packets do not follow the same route.
8. Connection-oriented services require a bandwidth of a high range. Connection-less Service requires a bandwidth of low range.
9. Ex: TCP (Transmission Control Protocol) Ex: UDP (User Datagram Protocol)
10. Connection-oriented requires authentication. Connection-less Service does not require authentication.
• LISTEN : When a server is ready to accept an incoming
connection, it executes the LISTEN primitive. It blocks
waiting for an incoming connection.
• CONNECT : It connects the server by establishing a
Service connection. Response is awaited.
Primitives • RECIEVE: Then the RECIEVE call blocks the server.
• SEND : Then the client executes SEND primitive to
transmit its request followed by the execution of
RECEIVE to get the reply. Send the message.
• DISCONNECT : This primitive is used for terminating the
connection. After this primitive one can't send any
message. When the client sends DISCONNECT packet
then the server also sends the DISCONNECT packet to
acknowledge the client. When the server package is
received by client then the process is terminated.