0% found this document useful (0 votes)
28 views42 pages

Week 1 and 2 NT

The document discusses computer networks including their history, components, types of connections, protocols, and benefits for organizations. A computer network connects computing devices like phones, servers, and more for sharing information. Early networks like ARPANET were developed in the 1960s and today the internet connects billions of devices globally. Networks use devices like routers, switches, and gateways, and connections can be wired or wireless. Protocols define communication rules. Networks allow for resource sharing, availability, performance gains, cost savings, increased storage, collaboration, error reduction, and secure remote access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views42 pages

Week 1 and 2 NT

The document discusses computer networks including their history, components, types of connections, protocols, and benefits for organizations. A computer network connects computing devices like phones, servers, and more for sharing information. Early networks like ARPANET were developed in the 1960s and today the internet connects billions of devices globally. Networks use devices like routers, switches, and gateways, and connections can be wired or wireless. Protocols define communication rules. Networks allow for resource sharing, availability, performance gains, cost savings, increased storage, collaboration, error reduction, and secure remote access.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

A computer network is a system that connects two or more computing devices

for transmitting and sharing information. Computing devices include everything


from a mobile phone to a server. These devices are connected using physical
wires such as fiber optics, but they can also be wireless.

History
The first working network, called ARPANET, was created in the late 1960s and
was funded by the U.S. Department of Defense. Government researchers used to
share information at a time when computers were large and difficult to move. We
have come a long way today from that basic kind of network. Today’s world
revolves around the internet, which is a network of networks that connects
billions of devices across the world. Organizations of all sizes use networks to
connect their employees’ devices and shared resources such as printers.
Network Devices
Network devices or nodes are computing devices that need to be linked in the network. Some
network devices include:

• Computers, mobiles, and other consumer devices: These are end devices that users directly
and frequently access. For example, an email originates from the mailing application on a
laptop or mobile phone.

• Servers: These are application or storage servers where the main computation and data
storage occur. All requests for specific tasks or data come to the servers.

• Routers: Routing is the process of selecting the network path through which the data packets
traverse. Routers are devices that forward these packets between networks to ultimately reach
the destination. They add efficiency to large networks.
• Switches: Repeaters are to networks what transformers are to electricity grids they
are electronic devices that receive network signals and clean or strengthen them.
Hubs are repeaters with multiple ports in them. They pass on the data to whichever
ports are available. Bridges are smarter hubs that only pass the data to the
destination port. A switch is a multi-port bridge. Multiple data cables can be plugged
into switches to enable communication with multiple network devices.

• Gateways: Gateways are hardware devices that act as ‘gates’ between two distinct
networks. They can be firewalls, routers, or servers.
Links
Links are the transmission media which can be of two types:

Wired: Examples of wired technologies used in networks include coaxial


cables, phone lines, twisted-pair cabling, and optical fibers. Optical fibers
carry pulses of light to represent data.

Wireless: Network connections can also be established through radio or other


electromagnetic signals. This kind of transmission is called ‘wireless’. The
most common examples of wireless links include communication satellites,
cellular networks, and radio and technology spread spectrums. Wireless
LANs use spectrum technology to establish connections within a small area.
Communication protocols
A communication protocol is a set of rules followed by all nodes involved in
the information transfer. Some common protocols include the internet protocol
suite (TCP/IP), IEEE 802, Ethernet, wireless LAN, and cellular standards.
TCP/IP is a conceptual model that standardizes communication in a modern
network. It suggests four functional layers of these communication links:

• Network access layer: This layer defines how the data is physically
transferred. It includes how hardware sends data bits through physical wires
or fibers.
• Internet layer: This layer is responsible for packaging the data into
understandable packets and allowing it to be sent and received.
• Transport layer: This layer enables devices to maintain a conversation by
ensuring the connection is valid and stable.

• Application layer: This layer defines how high-level applications can


access the network to initiate data transfer.
Network Defense

• While nodes, links, and protocols form the foundation of a network,


a modern network cannot exist without its defenses.
• Security is critical when unprecedented amounts of data are
generated, moved, and processed across networks.
• A few examples of network defense tools include firewall, intrusion
detection systems (IDS), intrusion prevention systems (IPS), network
access control (NAC), content filters, proxy servers, anti-DDoS
devices, and load balancers.
Based on organizational intent, networks can be classified as:
Intranet: Intranet is a set of networks that is maintained and controlled by a single entity. It is
generally the most secure type of network, with access to authorized users alone. An intranet
usually exists behind the router in a local area network.

Internet: The internet (or the internetwork) is a collection of multiple networks connected by
routers and layered by networking software. This is a global system that connects
governments, researchers, corporates, the public, and individual computer networks.

Extranet: An extranet is similar to the intranet but with connections to particular external
networks. It is generally used to share resources with partners, customers, or remote
employees.

Darknet: The darknet is an overlay network that runs on the internet and can only be accessed
by specialized software. It uses unique, customized communication protocols.
1. Resource sharing
Today’s enterprises are spread across the globe, with critical assets being shared across
departments, geographies, and time zones. Clients are no more bound by location. A network
allows data and hardware to be accessible to every pertinent user. This also helps with
interdepartmental data processing. For example, the marketing team analyzes customer data
and product development cycles to enable executive decisions at the top level.

2. Resource availability & reliability


A network ensures that resources are not present in inaccessible silos and are available from
multiple points. The high reliability comes from the fact that there are usually different supply
authorities. Important resources must be backed up across multiple machines to be accessible in
case of incidents such as hardware outages.
3. Performance management
A company’s workload only increases as it grows. When one or more processors are added to the
network, it improves the system’s overall performance and accommodates this growth. Saving data
in well-architected databases can drastically improve lookup and fetch times.

4.Cost savings
Huge mainframe computers are an expensive investment, and it makes more sense to add
processors at strategic points in the system. This not only improves performance but also saves
money. Since it enables employees to access information in seconds, networks save operational
time, and subsequently, costs. Centralized network administration also means that fewer
investments need to be made for IT support.
5. Increased storage capacity
Network-attached storage devices are a boon for employees who work with high volumes of data.
For example, every member in the data science team does not need individual data stores for the
huge number of records they crunch. Centralized repositories get the job done in an even more
efficient way. With businesses seeing record levels of customer data flowing into their systems, the
ability to increase storage capacity is necessary in today’s world.

6. Streamlined collaboration & communication


Networks have a major impact on the day-to-day functioning of a company. Employees can share
files, view each other’s work, sync their calendars, and exchange ideas more effectively. Every
modern enterprise runs on internal messaging systems such as Slack for the uninhibited flow of
information and conversations. However, emails are still the formal mode of communication with
clients, partners, and vendors.
7. Reduction of errors
Networks reduce errors by ensuring that all involved parties acquire information from a single
source, even if they are viewing it from different locations. Backed-up data provides
consistency and continuity. Standard versions of customer and employee manuals can be made
available to a large number of people without much hassle.

8. Secured remote access


Computer networks promote flexibility, which is important in uncertain times like now when
natural disasters and pandemics are ravaging the world. A secure network ensures that users
have a safe way of accessing and working on sensitive data, even when they’re away from the
company premises. Mobile handheld devices registered to the network even enable multiple
layers of authentication to ensure that no bad actors can access the system.

You might also like