Computer Network

Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

1

1 Computer Network

Page NO. -1
Computer Network

ABHISHEK TIWARI (2102028)

Feb 17 2023
Contents
P REF ACE
1. Introduction
• introduce the fundamental types of networking
2. Basic Principle of Computer Network

• demonstrate the TCP and OSI model


3. Types of Computer Architecture
4. Basic Topology

• About different type of topology


5. Different Types of Enterprise
6. Internet Protocol
• To know the role of various protocol in Networking

7. Conclusion

0.1 Introduction Of Computer Network


What is a computer network? A computer network comprises two or more computers that
are connected—either by cables (wired) or WiFi (wireless)—with the purpose of transmitting,
exchanging, or sharing data and resources. You build a computer network using hardware (e.g.,
routers, switches, access points, and cables) and software (e.g., operating systems or business
applications). Geographic location often defines a computer network. For example, a LAN (local
area network) connects computers in a defined physical space, like an office building, whereas a
WAN (wide area network) can connect computers across continents. The internet is the largest
example of a WAN, connecting billions of computers worldwide.

0.1.1 Fundamental Types of Networking


You can further define a computer network by the protocols it uses to communicate, the physical
arrangement of its components, how it controls traffic, and its purpose.
Computer networks enable communication for every business, entertainment, and research pur-
pose. The internet, online search, email, audio and video sharing, online commerce, live-
streaming, and social networks all exist because of computer networks.
Computer network types As networking needs evolved, so did the computer network types that
serve those needs. Here are the most common and widely used computer network types:
1.LAN (local area network): A LAN connects computers over a relatively short distance, allowing
them to share data, files, and resources. For example, a LAN may connect all the computers in
an office building, school, or hospital. Typically, LANs are privately owned and managed.
2.WLAN (wireless local area network): A WLAN is just like a LAN but connections between
devices on the network are made wirelessly.
3.WAN (wide area network): As the name implies, a WAN connects computers over a wide
area, such as from region to region or even continent to continent. The internet is the largest
WAN, connecting billions of computers worldwide. You will typically see collective or distributed
ownership models for WAN management.
4.MAN (metropolitan area network): MANs are typically larger than LANs but smaller than
WANs. Cities and government entities typically own and manage MANs.

Page NO. -1
5.PAN (personal area network): A PAN serves one person. For example, if you have an iPhone
and a Mac, it’s very likely you’ve set up a PAN that shares and syncs content—text messages,
emails, photos, and more—across both devices.
6.SAN (storage area network): A SAN is a specialized network that provides access to block-level
storage—shared network or cloud storage that, to the user, looks and works like a storage drive
that’s physically attached to a computer. (For more information on how a SAN works with block
storage, see Block Storage: A Complete Guide.)
7.CAN (campus area network): A CAN is also known as a corporate area network. A CAN is
larger than a LAN but smaller than a WAN. CANs serve sites such as colleges, universities, and
business campuses.
8.VPN (virtual private network): A VPN is a secure, point-to-point connection between two
network end points (see ‘Nodes’ below). A VPN establishes an encrypted channel that keeps a
user’s identity and access credentials, as well as any data transferred, inaccessible to hackers

0.1.2 Use of Computer Network


1.Resource sharing: Resource sharing is the sharing of resources such as programs, printers, and
data among the users on the network without the requirement of the physical location of the
resource and user.
2.Server-Client model: Computer networking is used in the server-client model. A server is a
central computer used to store the information and maintained by the system administrator.
Clients are the machines used to access the information stored in the server remotely.
3.Communication medium: Computer network behaves as a communication medium among the
users. For example, a company contains more than one computer has an email system which the
employees use for daily communication.
4.E-commerce: Computer network is also important in businesses. We can do the business over
the internet. For example, amazon.com is doing their business over the internet, i.e., they are
doing their business over the internet.

0.2 Basic Principle Of Computer Network


Principles Theoretical concept of computer networks states that a network is comprised of two
or more identifiable interconnected nodes (computers). These nodes share information with each
other through this interconnection in the form of data packets. These data packets travel through
a medium (path), defining the route of access from one node to another. In this manner, the
whole network is connected to another network, and the same process (with a few exceptions of
security and privacy) goes over again.
Functions In order to initiate a communication session in a computer network, information
needs to be transmitted from a point of origin (transmitter computer) towards a destination
(receiver computer). At this stage, the shortest path to reach the destination and at what rate
data should be transmitted has to be determined. Furthermore, this whole process requires the
location address of the receiver, as well as of the transmitter. It is possible that the addressee’s
location might be in another network; therefore, an intermediate neutral link is established to
transfer data bits from one network to another.
Architectures The physical design or architecture of a computer network is known as its topology.
In general, topology or architecture of a network defines how different nodes in a network are
interconnected with each other, which usually depicts how data is transferred from one node to
another in a network. There are multiple topologies of computer networks and each of them
presents different hierarchies of data flow in a network. Some major network topologies include
ring, mesh, bus, star and tree.
Types According to theory, each type of a computer network defines its size, characteristics and
functions. This idea clearly depicts that computer networks are classified according to their
capacities and operational features. Major types of networks include LAN (local area network),

Page NO. -2
MAN (metropolitan area network), WAN (wide area network) and PAN (personal area network).
A network of networks, i.e. Internet, has evolved from the composition and interconnection of
all these types of computer networks.
Media The medium (link) interconnecting two nodes in computer networks can be a wire or air.
Computer networks working on wired links are called wired networks, while those using air as
their medium of communication are called wireless networks. In the domain of wired networks,
different types of links such as coaxial, twisted pair and optical fiber are used. Similarly, in
wireless networks, common links of communication are microwave, satellite and Bluetoot

0.2.1 Open System Interconnection (OSI) Model


OSI stands for Open Systems Interconnection. It is a reference model that specifies standards for
communications protocols and also the functionalities of each layer.(as shown in figure Figure
1The OSI has been developed by the International Organization For Standardization and it is 7
layer architecture. Each layer of OSI has different functions and each layer has to follow different
protocols.
The 7 layers are:-
1.Physical layer
2.Data link layer
3.Network layer
4.Transport layer
5.Session layer
6.Presentation layer
7.Application layer
Protocol: A protocol is the set of rules or algorithms which define the way how two entities can
communicate across the network and there exists different protocol defined at each layer of the
OSI model. Few of such protocols are TCP, IP, UDP, ARP, DHCP, FTP and so on.

0.2.2 TCP Model


It stands for Transmission Control Protocol/Internet Protocol. The TCP/IP model is a concise
version of the OSI model. It contains four layers, unlike seven layers in the OSI model.
The layers are:
1.Process/Application Layer
2.Host-to-Host/Transport Layer
3.Internet Layer
4.Network Access/Link Layer

0.2.3 Difference between TCP Model and OSI Model

0.3 Types Of Computer Architecture


Computer network design falls under two broad categories:
1. Client-server architecture In this type of computer network, nodes may be servers or clients.
Server nodes provide resources like memory, processing power, or data to client nodes. Server
nodes may also manage client node behavior. Clients may communicate with each other, but
they do not share resources. For example, some computer devices in enterprise networks store
data and configuration settings. These devices are the servers in the network. Clients may access
this data by making a request to the server machine.
2. Peer-to-peer architecture In Peer-to-Peer (P2P) architecture, connected computers have equal
powers and privileges. There is no central server for coordination. Each device in the computer

Page NO. -3
Sr No. TCP Model OSI Model
1. This model is based on This model is based on
a vertical approach. a horizontal approach.
2. It consists of 7 layers. It consists of 4 layers.
3. The usage of this This model is highly
model is very low. used.
4. Protocols in the OSI Protocols in the OSI
model are hidden and model are hidden and
can be easily replaced can be easily replaced
when the technology when the technology
changes. changes.

Table 1: Difference between OSI and TCP Model

Figure 1: Computer Networking


fig;image 1

network can act as either client or server. Each peer may share some of its resources, like
memory and processing power, with the entire computer network. For example, some companies
use P2P architecture to host memory-consuming applications, such as 3-D graphic rendering,
across multiple digital devices.

0.4 Basic Topology


0.4.1 What is network topology
The arrangement of nodes and links is called network topology. They can be configured in dif-
ferent ways to get different outcomes. Some types of network topologies are:

Page NO. -4
0.4.2 Types of Network Topology
1.Bus topology:
Each node is linked to one other node only. Data transmission over the network connections
occurs in one direction.
2.Ring topology:
Each node is linked to two other nodes, forming a ring. Data can flow bi-directionally. How-
ever,single node failure can bring down the entire network.
3.Star topology:
A central server node is linked to multiple client network devices. This topology performs better
as data doesn’t have to go through each node. It is also more reliable.
4.Mesh topology:
Every node is connected to many other nodes. In a full mesh topology, every node is connected
to every other node in the network.

0.5 Different Types of Enterprise Computer Network


What are the types of enterprise computer networks? Depending on the organization’s size and
requirements, there are three common types of enterprise private networks:
Local area network (LAN) A LAN is an interconnected system limited in size and geography. It
typically connects computers and devices within a single office or building. It is used by small
companies or as a test network for small-scale prototyping.
Wide area networks (WAN) An enterprise network spanning buildings, cities, and even countries,
is called a wide area network (WAN). While local area networks are used to transmit data at
higher speeds within close proximity, WANs are set up for long-distance communication that is
secure and dependable.
SD-WAN or software-defined WAN is virtual WAN architecture controlled by software tech-
nologies. An SD-WAN offers more flexible and dependable connectivity services that can be
controlled at the application level without sacrificing security and quality of service.
Service provider networks Service provider networks allow customers to lease network capacity
and functionality from the provider. Network service providers may consist of telecommunica-
tions companies, data carriers, wireless communications providers, Internet service providers,
and cable television operators offering high-speed Internet access.
Cloud networks Conceptually, a cloud network can be seen as a WAN with its infrastructure
delivered by a cloud-based service. Some or all of an organization’s network capabilities and
resources are hosted in a public or private cloud platform and made available on demand. These
network resources can include virtual routers, firewalls, bandwidth, and network management
software,with other tools and functions available as required.
Businesses today use cloud networks to accelerate time-to-market, increase scale, and manage
costs effectively. The cloud network model has become the standard approach for building and
delivering applications for modern enterprises.
Track changes are available on all our premium plans, and can be toggled on or off using the
option at the top of the Review pane. Track changes allow you to keep track of every change
made to the document, along with the person making the change.

0.6 AWS Computer Networking Services


What are AWS computer networking services?
AWS networking services are designed to provide enterprises with:
1.Network security: AWS infrastructure is monitored 24/7 to help ensure confidentiality and
integrity and to meet the highest global network security standards.

Page NO. -5
Figure 2: Global Computer Networking
fig;image 2

2.Network availability: AWS has the global infrastructure required to deliver high availability
anywhere in the world.
3.Network performance: AWS network services deliver high-speed performance with minimal lag
time.

0.7 Internet Protocol


Internet service provider (ISP), company that provides Internet connections and services to
individuals and organizations. ISP may also provide software packages (such as browsers), e-
mail accounts, and a personal website or home page. ISP can host websites for businesses and
can also build the websites themselves. ISP share all connected to each other through network
access points, public network facilities on the Internet backbone.
The rise of commercial Internet services and applications helped fuel a rapid commercialization
of the Internet. This phenomenon was the result of several other factors as well. One important
factor was the introduction of the personal computer (PC) and the workstation in the early
1980s—a development that in turn was fueled by unprecedented progress in integrated circuit
technology and an attendant rapid decline in computer prices. Another factor, which took on
increasing importance, was the emergence of Ethernet and other “local area networks” (LANs)
to link personal computers. But other forces were at work too. Following the restructuring
of ATT Corporation in 1984, the U.S. National Science Foundation took advantage of various
new options for its national-level digital backbone service, known as NSFNET. In 1988 the U.S.
Corporation for National Research Initiatives received approval to conduct an experiment linking
a commercial e-mail service (MCI Mail) to the Internet. This application was the first Internet
connection to a commercial provider that was not also part of the research community. Approval
quickly followed to allow other e-mail providers access, and the Internet began its first explosion
in traffic. Usually the template you’re using will have the page margins and paper size set
correctly for that use-case. For example, if you’re using a journal article template provided by
the journal publisher, that template will be formatted according to their requirements. In these
cases, it’s best not to alter the margins directly.

Page NO. -6
If however you’re using a more general template, such as this one, and would like to alter the
margins, a common way to do so is via the geometry package. You can find the geometry package
loaded in the preamble at the top of this example file

0.7.1 Function of Protocol


1.Connection Establishment/Release. A data transfer can be a communication-oriented transfer
or connectionless transfer.
2.Encapsulation.
3.Segmentation and Reassembly.
4.Data Transfer Management.
5.Multiplexing/Demultiplexing.
6.Addressing.
7.Ordered Delivery.
8.Error Control.

This is my first reference [3] This is my first reference [2] This is my first reference [1]

0.8 Conclusion
In Present Scenario Computer Network is most integral part of modern technology Computer
networks connect nodes like computers, routers, and switches using cables, fiber optics, or wireless
signals. These connections allow devices in a network to communicate and share information and
resources.
Networks follow protocols, which define how communications are sent and received. These pro-
tocols allow devices to communicate. Each device on a network uses an Internet Protocol or
IP address, a string of numbers that uniquely identifies a device and allows other devices to
recognize it.
Routers are virtual or physical devices that facilitate communications between different networks.
Routers analyze information to determine the best way for data to reach its ultimate destination.
Switches connect devices and manage node-to-node

0.8.1 Benefits of Computer Network


Setting up a computer network is a fast and reliable way of sharing information and resources
within a business. It can help you make the most of your IT systems and equipment.
Advantages of computer networking The main benefits of networks include:
1.File sharing - you can easily share data between different users, or access it remotely if you
keep it on other connected devices.
2.Resource sharing - using network-connected peripheral devices like printers, scanners and
copiers, or sharing software between multiple users, saves money.
3.Sharing a single internet connection - it is cost-efficient and can help protect your systems if
you properly secure the network.
4.Increasing storage capacity - you can access files and multimedia, such as images and music,
which you store remotely on other machines or network-attached storage devices.
Networking computers can also help you improve communication, so that:staff, suppliers and
customers can share information and get in touch more easily your business can become more
efficient - eg networked access to a common database can avoid the same data being keyed mul-
tiple times, saving time and preventing errors staff can deal with queries and deliver a better
standard of service as a result of sharing customer data staff can deal with more customers in
less time since they have shared access to customer and product databases you can centralise
network administration, meaning less IT support is required you can cut costs through sharing
of peripherals and internet access

Page NO. -7
Bibliography

[1] Joseph Migga Kizza, Wheeler Kizza, and Wheeler. Guide to computer network security. 2013.

[2] Lawrence G Roberts and Barry D Wessler. Computer network development to achieve re-
source sharing. In Proceedings of the May 5-7, 1970, spring joint computer conference, pages
543–549, 1970.
[3] Barry Wellman. Computer networks as social networks. Science, 293(5537):2031–2034, 2001.

Page NO. -8

You might also like