CIR 209 LECTURE ONE
INTRODUCTION TO COMPUTER NETWORKS
Session Summary
1.1 Definition of Computer Network: ........................................................................................................... 1
1.2 Need for and Global Impact of Computer Networks .............................................................................. 1
1.3 Basic Networking Principles ................................................................................................................... 2
1.4 Basic Networking Principles ................................................................................................................... 3
1.5 Attributes of Robust Network Design ..................................................................................................... 6
1.6 Measures of Effective Computer Networks ............................................................................................ 8
1.7 Modes of Data Communication .............................................................................................................. 9
1.1 Definition of Computer Network:
A computer network is an interconnection of computing devices for the purpose of
data/information communication i.e. allows for the transfer and exchange of different
types of data (Video, text or voice).
Network Communication: A process where two or more computing devices exchanges
meaningful data, guided by network protocols with appropriate responses
(acknowledgements) between source and destination devices
1.2 Need for and Global Impact of Computer Networks
The invention and development of the internet; a global mesh of computer networks,
wireless and satellite telecommunication technologies has revolutionized the way
communication takes places.
Sharing of information has been made easy e.g. employees within the office and those in
the field can receive instructions via email, telephone or teleconference.
Sharing of expensive resources within an organization e.g. the printers and other facilities
e.g. online college libraries where the same document may be accessed simultaneously by
more than one student and/or researchers
Page 1 of 9
Business (e-commerce) transactions can be done through computer networks. For
example withdrawing of money and checking of bank account balance,
requesting/ordering of goods and services and paying for purchased goods online.
Distance learning (e-learning) has simplified. Students can receive instruction online and
learn from a remote location. The learner and the teacher can exchanges views or discuss
concepts by chatting online or through instant short text messages.
Important/breaking news can be made available to the public within a short time e.g.
weather, outbreak of diseases, road conditions or changes of certain important events.
Monitoring of events/areas remotely by use of surveillance cameras or satellites
connected to computer systems. The computers can be designed to trigger an alert or
alarm system.
Securing of resources, ensuring constant availability and controlling access to the
resources. Through a centralized backup system, chances of recovering from disaster are
much higher. The centralized access control to resources ensures that the resources are
made available to authorized personnel only; when they supply authentic credentials.
Coordinating of research activities e.g. collaborations between companies and or
universities
1.3 Basic Networking Principles
Any computer network that achieves the goal of data communication between devices in the
same of different networks bust fulfills the following underlying principles:
i. Number of Devices: the must be at least two devices linked by a networking
media; wired or wireless
ii. Media: there should be a channel or pathway interconnecting the communication
devices (Guided - cabled or unguided - wireless media)
iii. Protocols: There must be a set of rules (protocol) that define how communication
between the two devices will take place. (Protocols have multiple functions – to be
discussed later)
Page 2 of 9
iv. Unique Identity: There should be a unique way of identifying each device on the
network in order to keep track of sender and recipient of the transmitted data (IP
Addresses, Names, MAC Addresses and Subscriber Identification Module).
v. Error Control: The communicating devices should have a way of confirming that the
transmitted data was received by the intended recipient without error and incase an error
is detected, there should be away of recovering from the error. (Two elements: Detection
and attempt to correct)
vi. Flow Control: The communicating devices should have a flow control mechanism that
allows them to slow down the rate of transmission when there is network congestion and
increase the rate when the congestion is cleared (Ability to regulate the amount of data
received/sent)
vii. Security: The devices participating in the communication process must provide basic encryption
security for the data being exchanged between them. This would prevent breach of
confidentiality.
1.4 Basic Networking Principles
Node:
A node is any device connected to a computer network.
Nodes can be computers, personal digital assistants (PDAs), cell phones, or various
other network appliances
On an IP network, a node is any device with an IP address.
Network Operating System:
Systems software designed to handle multiple requests for services and resources from
network users and devices
Backbone
A high speed, high bandwidth link connecting network segments
Host
A computer on the network that is accessed from a remote location
Bandwidth
The data carrying capacity of a network media
Page 3 of 9
Bit
Definition: A bit is the smallest unit of data transfer on a computer network.
Bits represent the two binary values "on" or "off."
Bits are often stored on computers as the digital numbers '1' and '0', but in networking,
bits can also be "encoded" by electrical signals and pulses of light.
In computer networking, some network protocols send and receive data in the form of
bit sequences.
Byte
A byte is a sequence of bits. A byte contains eight bits. In computer networking, some
network protocols send and receive data in the form of byte sequences.
Server:
A network server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet
Network servers typically are configured with additional processing, memory and
storage capacity to handle the load of servicing clients.
Common types of specialized network servers include: (see the workbook)
Segment:
A segment is a specially-configured subset of a larger network.
The boundaries of a network segment are established by devices capable of regulating the
flow of packets into and out of the segment, including routers, switches, hubs, bridges, or
multi-homed gateways (but not simple repeaters).
Client:
An application or system that accesses a service made available by a server
Firewall:
A device or software program that protects a computer network from unauthorized access
Network firewalls may be hardware devices, software programs, or a combination of the
two.
Page 4 of 9
Network firewalls guard an internal computer network (home, school, business intranet)
against malicious access from the outside.
Network firewalls may also be configured to limit access to the outside from internal
users.
Workstation:
A microcomputer that contains a client operating system and designed primarily for
running applications and provide an interface through which a user can interact with
underlying network infrastructures and associated utilities.
Intended primarily to be used by one person at a time, they are commonly connected to a
local area network
Workgroup:
Workgroup is a collection of computers on a local area network (LAN) that share
common resources and responsibilities.
Sometimes referred to as Peer to peer network
Domain
A collection of computer systems and services that share the same centralized security database
Media:
Channels or pathways through which data flows from one device to another in a
network.
The three main types are copper cable, fiber optic cable, and wireless.
Network:
An interconnection of devices that can communicate; an infrastructure that links and allows
computing devices to exchange data
Computer Network
Defined as system of interconnected computing devices for the purposes of data communication
Design
Technical, logical or physical plan or drawing produced to show the look and function of
a system or device
The process of developing a blue print for implementing something
A blueprint of something representing technical details
Page 5 of 9
Network Design
A blue print; logical and physical layout of a computer network in an enterprise
May also be defined as the process of producing a logical and physical representation of a
computer network
Network design refers to the planning of the implementation of a computer network
infrastructure
Management
Management is the process of planning; identifying, directing and controlling organizing the
resources (Human or otherwise), processes and activities of a enterprise to achieve specific goals
in the most effective and efficient
1Network Management
Network management is a process that refers to the activities, methods, procedures, and tools
that pertain to the operation, administration, maintenance, and provisioning of networked
systems. In other words, it is all about the activities associated with running a network, along
with the technology required to support those activities
1.5 Attributes of Robust Network Design
1) Security:
Description: the degree to which a network infrastructure addresses the dimension of security
or the degree to which network devices and infrastructure is safe from harm or destruction.
Security Dimensions: should focus on addressing the following dimensions: Confidentiality,
integrity and accounting, Privacy and Availability.
Consequences of security breach: Loss of monetary value, disruption of services and
network operations, loss of clients/customers, loss of partnerships, loss of assets, loss of
important data and legal suits
Computer network should be built to guarantee
Data integrity
Data Confidentiality
Data Availability
Data Privacy
Non-repudiation
Accountability
Page 6 of 9
The basic approach to security can use the security trinity principles of Prevention, Detection
and Response, represented in the following diagram.
Prevention – deterrence i.e. attempting to ensure that security breach does not happen.
Detection – ability to establish that a breach is happening of has happened.
Response – effective strategy and mechanisms to restore normal operations.
2) Growth and scalability:
Enterprise computer networks should enable future expansion or growth with negligible negative
effect on the performance of the network. Future growth may be through addition of users, new
streams of data and services etc.
Future network scalability/growth can be achieved through;
Appropriate network design
Implementation of scalable physical network topology
Inclusion of high capability devices
Appropriate network configuration
Selection of scalable network protocol
Implementing scalable network setup – client/server setup
3) Availability, fault tolerance and network recovery: Reliability
Ability to withstand possible failure and ability to recover from a catastrophic network failure
within the shortest possible time
Guarantee that a data network will continue to operate even under hostile conditions
Can recover within the shortest time possible is a failure occurs
This can be achieved through:
Page 7 of 9
Network redundant measures such as:
Redundant power supply e.g. inclusion of UPS and automated power generators
Redundant servers – multiple distributed files or authentication servers
(Distributed Files Service)
Redundant access to network e.g. through cabled or wireless means.
Implementing “Primary access sites” and “standby remote hot access sites”
Achieved through network monitoring, service clustering, implementation of RAID,
including of multiple sources of the same services e.g. two or more file servers etc
In fault tolerant networks;
Mean time between failure (MTBF) should be large
Mean time to repair (MTTR) should be very small
4) Quality of Service:
Ensuring Quality of the transmitted data remains the same despite the distance travelled data.
Achieved through use of:
Data prioritization (devices with this capability)
Proper fine-tuning of devices
High capability devices etc
1.6 Measures of Effective Computer Networks
The effectiveness of a computer network can be evaluated based on the following FOUR factors:
a) Delivery:
The computer network must ensure that the transmitted data gets to the intended destination.
b) Accuracy
The data must not be altered as it travels from the source to the intended destination, through
the transmission media and other components of the computer network.
c) Timeliness
Data must be delivered within a certain time limit. Extended delays may render the data
useless.
d) Jitter
It refers to variation in packet arrival time. In particular, it is concerned with un-even delays
in delivery of packet. Such delays will affect the quality of the delivered data. This effect is
much more pronounced in video and audio data
Page 8 of 9
1.7 Modes of Computer Network Communication
The data transmission mode refers to the manner in which data is transmitted from one device
(one location) to another device (another location).
There are three ways or modes for achieving transmission:
a) Simplex
Data is transmitted in only one direction
A terminal can only send data and cannot receive or it can only receive data but cannot
send
It is not possible to confirm successful transmission of data in simplex mode. There is no
provision for confirming successful delivery of the data
Radio and television broadcasting are examples of simplex transmission, on which the
signal is send from the transmission to the TV antenna
b) Half duplex (Semi-duplex)
Data can be transmitted in both directions but only in one direction at a time
During any transmission, one is the transmitter and the other is receiver
So each time for sending or receiving data, direction of data communication is reversed
An example of half duplex transmission is the Wireless communication (radio
communication)
c) Full duplex (duplex)
In full mode, data can be transmitted in both directions simultaneously i.e. sending and
receiving processes are done simultaneously
Page 9 of 9