You are on page 1of 10

COMPUTER NETWORK

INTRODUCTION TO COMPUTER NETWORKS

GOALS

• Overview: Components, types and purposes.


• Fundamentals of networks: communication protocols and network models.

OVERVIEW

- COMPONENTS:

Computer networks are made up of several components that work together to


enable communication and resouce sharing devices. Some of the main components of a
computer network include:

• Devices: These are the physical components of the network, including computers, routers,
switches, hubs, modems, printers and servers.
• Transmission media: These are the channels through which data is transmitted between
the network devices. Including copper cables, fiber optics and wireless connections such as
WiFi and Bluetooth.
• Protocols: These are rules and procedures that govern how devices communicate and
exchange information on the network. Ensure that data is sent and received correctly and
securely.
• Network Services: Network services are applications that run on on top of the network
infrastructure and provide services such as email, files, network printing and remote
access.
• Security: Critical component of any computer network. the resources security measures
include firewalls, antivirus, encryption and authentication to protect the network and the
data stored on it against external and internal threats.

These are the main components of a computer network. Measure As technology


advances, new components are added and networks become increasingly increasingly
complex and sophisticated.
- TYPES:

Computer networks are classified according to geographic dimension they occupy


and all of them are designed so that they can communicate with other networks. Thus,
networks can be classified into:

• LAN (Local Area Network)

Covers a limited geographic area, usually a building or field university. The LAN allows
devices such as computers, printers, and other network equipment, communicate with each other,
and share resources such as files and internet connections.

LANs are generally constructed using copper or fiber optic cables to connect the devices.
Devices are connected to a hub, switch, or router which manages network traffic. Data is
transmitted in packets of information over the network, and each device has a unique address so it
can be identified by other devices on the network.

LAN networks can be implemented using various network protocols, such as Ethernet and
Wi-Fi. Ethernet networks are the most common and use copper cables to transmit data. Wi-Fi
networks, on the other hand, use radio waves to transmit data wirelessly. Both protocols offer data
transfer speeds high-speed data and are widely used in LAN networks.

A LAN network can be configured in many ways. A peer-to-peer network is a simple setup,
where all devices on the network have the same capabilities and can share resources directly with
each other. On a client network server, one or more devices are designated as servers,
responsible for manage resources while the other devices, the clients, access those resources.

LAN networks are widely used in corporate environments and educational institutions to
provide reliable, high-speed network connectivity to devices in the same physical location. Also
used in domestic environments to share resources and provide internet access across multiple
devices in one House or apartment.

• MAN (Metropolitan Area Network)

Covers a relatively large geographic area, such as a city or a group from nearby cities. It
connects multiple LANs and in some cases can also connect other MANs or WANs (Wide Area
Network).
A MAN is generally used to provide data communication services for companies and
organizations that have multiple branches or offices in one certain geographic area. For example, a
bank may have several branches in one city and use a MAN to interconnect them. This allows
agencies share network resources such as servers and databases, and also facilitates the
communication between them.

MAN is generally designed for speed and low latency, to allow for fast transfer of large
amounts of data between connected networks. He can configured in a variety of ways, including
ring, star, or bus topologies. The choice of topology will depend on the specific needs of the
network and the requirements of performance.

Some common technologies used in MANs include Ethernet, Fiber Optic, ATM
(Asynchronous Transfer Mode) and MPLS (Multiprotocol Label Switching). The kind of technology
chosen will depend on the application and oerformance needs of the network.

MANs are designed to be scalable, which means they can be expanded as needed. This is
important for companies that are in constant growth and need to add new branches or offices to
the network.

• WAN (Wide Area Network)

It covers large geographic area, such as a country, a continent or even the whole world. It is
a communication infrastructure that allows the the exchange of information between computers
and devices in different geographic locations.

The WAN in made of network devices such as routers, switches and gateways, which are
used to connect computers and other devices in different locations. These devices are
interconnected high-speed connections. Speed, such as fiber optic cables, dedicated telephone
lines, satellites, radio and other means of communication.

One of the key features of the WAN is its ability to transmit large volumes of data over long
distances. For example, a company with offices in different parts of the world can be a WAN to
share information and resources between these locations, allowing employees to work together
regardless of where they are located.

There are several types of WAN networking technologies available including MPLS
(Multiprotocol Label Switching), Frame Relay, ATM (Asynchronous Transfer Mode), ISDN
(Integrated Services Digital Network) and VPN (Virtual Private Network). Each of these
technologies have their own advantages and disadvantages, and the choice depends on the
organization's specific needs.
WAN is a complex network that requires a high level of planning, management and
maintenance to ensure reliabl and safe performance. With an adequate WAN, companies can
improve collaboration, increase efficiency and reduce operational costs by allowing them to
connect with customers, suppliers and business partners around the world.

With the advent of new technologies of wireless networks (wireless), new classifications
were adopted:

• WPAN (Wireless Pernal Area Network)

Personal wireless network, which allows wireless communication of devices within of a


limiting range area, usually up to 10 m. this technology is used to connect electronic devices that
need to communicate with each other but are physically close.

WPAN is based on wireless communication technologies such as Bluetooth, ZigBee, Near


Field Communication (NFC) and Radio Frequency Identification (RFID), which allow the transfer of
data between electronic devices. Bluetooth is the most common technology used in WPAN,
allowing devices such as smartphones, laptops, tablets and other mobile devices, connect with
others nearby electronic devices.

A WPAN is typically made up of a network of devices, each with its own own unique identity,
which can communicate with other devices within the reach area. Devices can communicate with
each other in an ad-hoc (direct) or via a central device such as a smartphone or laptop.

WPAN technology offers many advantages, such as a simple and convenient to connect
nearby electronic devices without the need for cables or wires. It's also secure and reliable, with
built-in encryption and authentication, ensuring data is protected from unauthorized access. In
addition, the WPAN is highly scalable, allowing new devices to be added to the network without
need for a complex network infrastructure.

• WLAN (Wireless Local Area Network)

WLAN, or Wireless Local Area Network, is a wireless networking technology that allows the
connection of electronic devices in a limited area, such as a residence, office or university campus.
It is a type of local area network (LAN) that uses radio waves to transmit data between devices
instead of cables physicists.
A WLAN consists of a collection of wireless devices that are connected to a wireless router.
The wireless router is the center of the network and is responsible for manage data traffic between
devices connected to it. It connects to internet through a modem and then transmits the internet
signal wirelessly to the connected devices.

Devices that can be connected to a WLAN include laptops, smartphones, tablets, wireless
printers and other mobile devices. to connect to the network, wireless devices must have a built-in
wireless adapter or a external wireless adapter.

There are different WLAN standards such as 802.11a, 802.11b, 802.11g, 802.11n and
802.11ac. Each standard defines a maximum data transfer rate, range and other technical
specifications. For example, the 802.11n standard has a maximum transfer of 600 Mbps and a
range of up to 70 meters in environments internal.

Security is an important concern in WLANs. There are several techniques security features
available to protect the wireless network from unauthorized access, such as data encryption, user
authentication and MAC address filtering. In addition, the wireless router setup must be performed
correctly to prevent security vulnerabilities such as network access by unauthorized persons.

• WMAN (Wireless Metropolitan Area Network)

Wireless Metropolitan Area Network (WMAN) is a wireless area network metropolitan area
that provides high-speed and high-bandwidth connectivity to a relatively large geographic area,
such as a city or university campus. It is a long-range wireless network technology that uses
various communication technologies. transmission, such as WiMAX (Worldwide Interoperability for
Microwave Access), to provide wireless Internet connectivity.

WMAN uses wireless communication technologies to transmit data, voice and video across
the network. The network is usually deployed using transmission towers that are placed in strategic
locations in a metropolitan area to ensure that the
coverage is broad and reliable.
Some of the key features of a WMAN include:

• High data transfer speed: WMAN is able to offer a high data transfer rate that can reach
several megabits per second (Mbps) or even gigabits per second (Gbps).

• Wide Areas of Coverage: WMAN technology is designed to cover areas relatively large
geographic areas, such as entire cities or college campuses. This means that users can
access the network over a wide area. Geographic.
• Flexibility: WMAN can be deployed on multiple frequencies, allowing it adapts to different
network needs and requirements.

• Reliability: WMAN is highly reliable and provides constant connectivity and reliable
throughout the geographic area covered.

• Security: WMAN networks are protected by various security protocols to ensure that user
data is kept safe and secure.

• Low cost: WMAN is a relatively cost-effective wireless networking technology compared to


other metro area connectivity options such as fiber optic cables or telephone lines.

• WWAN (Wireless Wide Area Network)

WWAN (Wireless Wide Area Network) is a wireless networking technology that provides
long-range connectivity to mobile devices such as smartphones, tablets, laptops and other network
devices. It is a type of wireless network that covers a large geographic area, usually an entire city
or even an entire country, providing Internet connection and other network services.

The key feature of WWAN is its ability to provide long range over large geographic areas,
using various wireless technologies, including cellular, satellite, and other wireless networking
technologies. In addition, WWAN offers continuous connectivity on the go, allowing users to
connect to the Internet and other network services while on the go.

There are several wireless networking technologies that are used in WWAN, including 2G,
3G, 4G and 5G. Each technology has its own data transmission speed and coverage range. 2G is
the oldest technology and offers the lowest data transfer, while 5G is the latest technology and
offers the greatest data transfer speed.

WWAN is used in various scenarios including business, industry, government and for
personal use. Companies can use WWAN to connect employees who work remotely or in remote
areas while government can use WWAN to provide emergency services in remote areas.
Consumers too can use WWAN to access the Internet and other network services on their
smartphones, tablets and laptops while traveling.

- PURPOSE:

Computer networks serve several purposes, which include:


• Resource sharing: Computer networks allow users to devices share resouces such as
printers, files and storage devices. Storage:

• Communication: Computer networks allow people to communicate with each other.


communicate and collaborate with each other, whether through email, chat or
videoconferencing.
• Remote Access: Computer networks allow users to access resources and data from other
locations, either through a VPN or the Internet.
• Improved performance: Computer networks can improve performance of shared
applications and services, distributing the workload across multiple devices.
• Cost Reduction: Computer networks can help reduce costs by sharing resources and
eliminating the need for duplicate devices in each location.
• Security: Computer networks can be used to protect data and resources, implementing
security policies and access control.

These are just some of rhe purposes of computer networks. Depending on the
types and purposes of the network, other purposes may include monitoring, backup and
disaster recovery, among others.

FUNDAMENTALS OF NETWORKS

- COMMUNICATION PROTOCOLS:

A computer network communication protocol is a set of rules and procedures that


govern communication between devices connected on a network. These protocols ensure
that information is transmitted reliably and securely. between different devices, regardless
of the type of hardware, software or operating system they are using.
The most common types of communication protocols in computer networks they
are:

• TCP/IP (Transmission Control Protocol/Internet Protocol): A widely used protocol used in


computer networks and is used for communication between devices on local networks and
the internet. TCP is responsible for segmentation. of the data in packets, while IP handles
the routing of those packets through the network.
• HTTP (Hypertext Transfer Protocol): Protocol used for communication between clients
(such as web browsers) and web servers. It is used to request and send web pages and
other internet resources.

• SMTP (Simple Mail Transfer Protocol) – Protocol used to send and receive and mails.
SMTP is responsible for sending email messages to a server e-mail, where they can be
forwarded to other servers until they are delivered to the final recipient.

• DNS (Domain Name System) – Protocol used to translate domain names. domain into IP
addresses. DNS allows users to access resources from the internet using domain name
instead of IP addresses, making browsing on the web easier and more user-friendly.

• DHCP (Dynamic Host Configuration Protocol) – Protocol used to assign IP addresses and
other network configuration information to devices on a network. DHCP is responsible for
ensuring that each device on a network has a unique IP address and other network
information needed to connect communicate with other devices on the network.

Each protocol has its own purpose and is designed to provide a set of specific
features and functionality for users and devices on a network.

- NETWORK MODELS:

Network models are theoretical frameworks that describe how devices on a network
computers communicate with each other. There are two models main network
technologies that are widely used in industry: the OSI model and the TCP/IP. Here is a
detailed description of each of them:

OSI Model (Open Systems Interconnection): The OSI model is composed of seven
layers and is widely used to help understand how devices in a network communicate with
each other. Each layer is responsible for a function. specific in network communication and
works in conjunction with the other layers to ensure that data is transmitted efficiently and
reliably. the seven layers of the OSI model are:

• Physical Layer: This layer is responsible for transmitting raw bits through a physical
transmission medium, such as copper cable or fiber optics.
• Data Link Layer: This layer is responsible for sending and receiving data frames over a
physical medium. It deals with detection and correction of errors and also with flow control.
• Network Layer: This layer is responsible for sending and receiving packets from data. It
handles data routing and congestion control.
• Transport Layer: This layer is responsible for ensuring that the data are transmitted reliably
and efficiently. It handles flow control and with data segmentation and reassembly.
• Session Layer: This layer is responsible for establishing, managing and terminate sessions
between devices on a network.
• Presentation Layer: This layer is responsible for formatting and presenting data for the
application.
• Application Layer: This layer is responsible for providing network services to applications
running on a device.

TCP/IP Model (Transmission Control Protocol/Internet Protocol): The TCP/IP model


is the most widely used networking model on the Internet and is made up of four layers.
The four layers of the TCP/IP model are:

• Network Access Layer: This layer is responsible for transmitting data through the physical
layer.
• Internet Layer: This layer is responsible for addressing and routing data in a network.
• Transport Layer: This layer is responsible for ensuring that the data are transmitted reliably
and efficiently. It handles flow control and with data segmentation and reassembly.
• Application Layer: This layer is responsible for providing network services to applications
running on a device.

Although the TCP/IP model is simpler than the OSI model, it still provides a useful
framework for understanding how devices on a network communicate with each other with
others. Both models are widely used in the networking industry. computers.

REFERENCES:

To learn more about the subject, visit the websites below:

• Cisco Networking Academy (https://www.netacad.com/)


• TechTarget Networking (https://searchnetworking.techtarget.com/)
• Microsoft Networking (https://docs.microsoft.com/en-us/windows-server/networking/)
• Open Networking Foundation (https://www.opennetworking.org/)

You might also like