CNW 112 - Lecture note_110908
CNW 112 - Lecture note_110908
OBJECTIVE:
At the end of this unit, you should be able to:
• define and classify network
• distinguish between different types of networks
• understand what OSI model is, and TCP reference model and functions of each
layer.
OUTLINE:
I. Introduction
• Definition and Importance of Computer Networks
• Historical Background
II. Network Components
• Nodes
• Links
• Switches and Routers
• Transmission Media
• Network Interface Cards (NICs)
• Network Topologies
III. Network Protocols
• TCP/IP Protocol Suite
o IP (Internet Protocol)
o TCP (Transmission Control Protocol)
o UDP (User Datagram Protocol)
• Ethernet
• Wi-Fi (Wireless Fidelity)
IV. Network Layers
A. OSI (Open Systems Interconnection) Model
i. Physical Layer
ii. Data Link Layer
iii. Network Layer
iv. Transport Layer
v. Session Layer
vi. Presentation Layer
vii. Application Layer
B. TCP/IP Protocol Stack
V. Network Addressing
• IPv4 Addressing
• IPv6 Addressing
• Domain Name System (DNS)
VI. Network Security
• Threats and Vulnerabilities
• Firewall and Intrusion Detection Systems
• Virtual Private Networks (VPNs)
• Secure Socket Layer (SSL) and Transport Layer Security (TLS)
VII. Network Services
• Email and Web Services
• File Transfer Protocol (FTP)
• Dynamic Host Configuration Protocol (DHCP)
• Domain Name System (DNS)
• World Wide Web (WWW) and Hypertext Transfer Protocol (HTTP)
VIII. Network Management
• Network Monitoring and Troubleshooting
• Bandwidth Management
• Network Performance Optimization
IX. Emerging Network Technologies
• Cloud Computing
• Internet of Things (IoT)
• Software-Defined Networking (SDN)
• 5G and Beyond
X. Conclusion and Recap
XI. References:
1.1 WHAT IS A NETWORK?
A network refers to two or more connected computers that can share resources such as
data, a printer, an Internet connection, applications, or a combination of these resources.
In the simplest form, data transfer can take place between two devices which are directly
connected by some form of communication medium. But it is not practical for two devices
to be directly Point–to–Point connected. This is due to the following reasons:
(i) The devices are very far apart.
(ii) There is a set of devices, each of which may require to connect to others at
various times.
Solution to this problem is to connect each device to a communication network. Computer
network means interconnected set of autonomous systems that permit distributed
processing of information.
Networks can be classified on the basis of geographical coverage.
1.2 CLASSIFICATION OF NETWORKS
• Local Area Network (LAN)
• Metropolitan Area Network (MAN)
• Wide Area Network (WAN)
Local Area Network (LAN): A local area network is a relatively smaller and privately owned
network with maximum span of 10km to provide local connectivity within a building or
small geographical area. The LANs are distinguished from other kinds of networks by three
characteristics:
(i) Size
(ii) Transmission technology, and
(iii) Topology
Metropolitan Area Network (MAN): Metropolitan Area Network is defined as less than
50km and provides regional connectivity typically within a campus or small geographical
area. It is designed to extend over an entire city. It may be a single network, such as cable
television network, or it may be a means of connecting a number of LANs into a large
network, so that resources may be shared LAN–to–LAN as well as device to device. For
example, a company can use a MAN to connect to the LANs in all of its offices throughout a
city.
Wide Area Network (WAN): Wide Area Network provides no limit of distance. In most
WAN, the subnet consists of two distinct components. Transmission lines, also called
circuits or channels, and routers. Transmission lines are used for moving bits between
machines, whereas routers are used to connect two or more transmission lines.
A WAN provides long distance transmission of data, voice, image and video information
over large geographical areas that may comprise a country, a continent or even the whole
world.
In contrast to LANs (which depend on their own hardware for transmission), WANs may
utilise public, leased or private communication devices usually in combination, and span
own unlimited number of miles.
1.3 WIRELESS NETWORKS:
Over the past five years, the world has become increasingly mobile. As a result, traditional
ways of networking the world have proven inadequate to meet the challenges posed by
our new collective lifestyle. If users must be connected to a network by physical cables,
their movement is dramatically reduced. Wireless connectivity, however, poses no such
restriction and allows a great deal more free movement on the part of the network user. As
a result, wireless technologies are encroaching on the traditional realm of "fixed" or
"wired" networks. This change is obvious to anybody who drives on a regular basis. One of
the "life and death" challenges to those of us who drive on a regular basis is the daily
gauntlet of erratically driven cars containing mobile phone users in the driver's seat.
Wireless connectivity for voice telephony has created a whole new industry. Adding mobile
connectivity into the mix for telephony has had profound influences on the business of
delivering voice calls because callers could be connected to people, not devices. We are on
the cusp of an equally profound change in computer networking. Wireless telephony has
been successful because it enables people to connect with each other regardless of
location. New technologies targeted at computer networks promise to do the same for
Internet connectivity. The most successful wireless data networking technology this far has
been 802.11.
Why Wireless?
The most obvious advantage of wireless networking is mobility. Wireless network users can
connect to existing networks and are then allowed to roam freely. A mobile telephone user
can drive miles in the course of a single conversation because the phone connects the user
through cell towers. Initially, mobile telephony was expensive. Costs restricted its use to
highly mobile professionals such as sales managers and important executive decision
makers who might need to be reached at a moment's notice regardless of their location.
Mobile telephony has proven to be a useful service, however, and now it is relatively
common in the United States and extremely common among Europeans
1.4 IMPORTANCE OF COMPUTER NETWORK:
The goals of a computer network can vary depending on the specific needs and
requirements of the organization or individuals involved. However, some common goals of
computer networks include:
Communication and Connectivity:
▪ The fundamental goal of a computer network is to enable communication and
connectivity between devices, systems, and users.
▪ Networks allow for the exchange of information, data, and resources, facilitating
collaboration and efficient workflow.
Resource Sharing:
▪ Networks enable the sharing of resources such as files, printers, storage devices,
and applications among multiple users and devices.
▪ This allows for better utilization of resources and cost savings, as individual devices
can access shared resources instead of duplicating them.
Data Transfer and Transmission:
▪ Computer networks facilitate the efficient transfer and transmission of data
between devices and systems.
▪ Networks provide the infrastructure and protocols necessary for reliable and timely
data delivery, whether it's sending emails, transferring files, or streaming media.
Centralized Management and Control:
▪ Networks allow for centralized management and control of resources, security
policies, and user access.
▪ Administrators can monitor and manage network devices, configure settings,
enforce security measures, and ensure the overall health and performance of the
network.
Scalability and Flexibility:
▪ Networks should be designed to scale and accommodate growth in terms of the
number of devices, users, and data traffic.
▪ They should provide flexibility to adapt to changing business needs, such as adding
or removing devices, expanding network coverage, or accommodating new
technologies.
Reliability and Availability:
▪ Computer networks aim to provide reliable and continuous access to resources and
services.
▪ Redundancy measures, fault tolerance, backup systems, and disaster recovery plans
are implemented to ensure network availability and minimize downtime.
Security and Privacy:
▪ Networks must prioritize security to protect data, systems, and users from
unauthorized access, data breaches, and other threats.
▪ Security measures such as firewalls, encryption, access controls, and authentication
mechanisms help safeguard network resources and maintain privacy.
Performance Optimization:
▪ Networks strive to optimize performance by minimizing latency, maximizing
throughput, and ensuring efficient data transmission.
▪ Techniques like quality of service (QoS), traffic prioritization, and bandwidth
management help prioritize critical traffic and optimize network performance.
Cost Efficiency:
▪ Networks aim to provide cost-effective solutions by maximizing resource utilization,
reducing infrastructure requirements, and streamlining operations.
▪ By sharing resources and leveraging economies of scale, networks help reduce costs
associated with hardware, software, maintenance, and support.
1.5 TYPES OF COMPUTER NETWORK:
There are basically two types of computer network, based on whether the network
contains switching elements or not. These are Point–to–Point network and Broadcast
network.
Point–to–Point Network or Switch Network
Point–to–Point networks consist of many connections between individual pairs of
machines. To go from the to the source destination, a packet on this type of network may
have to first visit one or more intermediate machine routers. When a packet is sent from
one router to another intermediate router, the entire packet is stored at each intermediate
router, till the output line is free and then forwarded. A subnet using this principle is called
Point–to–Point or Packet switched network.
Some possible topologies for a Point–to–Point subnet are:
Star Topology
In a star topology, each device has a dedicated Point–
to–Point link only to a central controller, usually
called a hub. These devices are not linked to each
other. If one device wants to send data to another, it
sends to the hub which then relays the data to the
other connected devices. In a star, each device needs
only one link and one I/O Port to connect it to any
number of other devices. This factor makes it easy to install and configure. Far less cabling
need to be housed and additions, moves and deletions involve only one connection
between that device and the hub.
Tree Topology
A tree topology is a variation of a star. As in a star
modes in a tree are linked to a central hub that
controls the traffic to the network. However, not every
device plugs directly into the central hub. The majority
of devices connect to a secondary hub that in turn is
connected to the central hub.
The advantages and disadvantages of a tree topology
are generally the same as those of stars. The addition of secondary hubs, however, brings
two further advantages. First, it allows more devices to be attached to a single central hub
and can, therefore, increase the distance a signal can travel between devices. Second, it
isolates the network and prioritizes communication from different computers.
Ring Topology