[go: up one dir, main page]

0% found this document useful (0 votes)
52 views9 pages

CIR 209 (Lecture 1) Computer Network Overview

The document provides an introduction to computer networks. It defines a computer network as an interconnection of computing devices that allows for data communication. The global impact of networks is discussed, including how they enable sharing of information and resources, e-commerce, distance learning, dissemination of news, remote monitoring, and coordinating research activities. Basic networking principles are outlined, such as the need for multiple devices, a connecting media, protocols, unique device identification, error control, flow control, and security. Key networking terms are also defined, like nodes, bandwidth, servers, clients, firewalls, and network design.

Uploaded by

dancanongori9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views9 pages

CIR 209 (Lecture 1) Computer Network Overview

The document provides an introduction to computer networks. It defines a computer network as an interconnection of computing devices that allows for data communication. The global impact of networks is discussed, including how they enable sharing of information and resources, e-commerce, distance learning, dissemination of news, remote monitoring, and coordinating research activities. Basic networking principles are outlined, such as the need for multiple devices, a connecting media, protocols, unique device identification, error control, flow control, and security. Key networking terms are also defined, like nodes, bandwidth, servers, clients, firewalls, and network design.

Uploaded by

dancanongori9
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

CIR 209 LECTURE ONE

INTRODUCTION TO COMPUTER NETWORKS

Session Summary
1.1 Definition of Computer Network: ........................................................................................................... 1
1.2 Need for and Global Impact of Computer Networks .............................................................................. 1
1.3 Basic Networking Principles ................................................................................................................... 2
1.4 Basic Networking Principles ................................................................................................................... 3
1.5 Attributes of Robust Network Design ..................................................................................................... 6
1.6 Measures of Effective Computer Networks ............................................................................................ 8
1.7 Modes of Data Communication .............................................................................................................. 9

1.1 Definition of Computer Network:


 A computer network is an interconnection of computing devices for the purpose of
data/information communication i.e. allows for the transfer and exchange of different
types of data (Video, text or voice).

 Network Communication: A process where two or more computing devices exchanges


meaningful data, guided by network protocols with appropriate responses
(acknowledgements) between source and destination devices

1.2 Need for and Global Impact of Computer Networks


The invention and development of the internet; a global mesh of computer networks,
wireless and satellite telecommunication technologies has revolutionized the way
communication takes places.

 Sharing of information has been made easy e.g. employees within the office and those in
the field can receive instructions via email, telephone or teleconference.

 Sharing of expensive resources within an organization e.g. the printers and other facilities
e.g. online college libraries where the same document may be accessed simultaneously by
more than one student and/or researchers

Page 1 of 9
 Business (e-commerce) transactions can be done through computer networks. For
example withdrawing of money and checking of bank account balance,
requesting/ordering of goods and services and paying for purchased goods online.

 Distance learning (e-learning) has simplified. Students can receive instruction online and
learn from a remote location. The learner and the teacher can exchanges views or discuss
concepts by chatting online or through instant short text messages.

 Important/breaking news can be made available to the public within a short time e.g.
weather, outbreak of diseases, road conditions or changes of certain important events.

 Monitoring of events/areas remotely by use of surveillance cameras or satellites


connected to computer systems. The computers can be designed to trigger an alert or
alarm system.

 Securing of resources, ensuring constant availability and controlling access to the


resources. Through a centralized backup system, chances of recovering from disaster are
much higher. The centralized access control to resources ensures that the resources are
made available to authorized personnel only; when they supply authentic credentials.

 Coordinating of research activities e.g. collaborations between companies and or


universities

1.3 Basic Networking Principles


Any computer network that achieves the goal of data communication between devices in the
same of different networks bust fulfills the following underlying principles:

i. Number of Devices: the must be at least two devices linked by a networking


media; wired or wireless

ii. Media: there should be a channel or pathway interconnecting the communication


devices (Guided - cabled or unguided - wireless media)

iii. Protocols: There must be a set of rules (protocol) that define how communication
between the two devices will take place. (Protocols have multiple functions – to be
discussed later)

Page 2 of 9
iv. Unique Identity: There should be a unique way of identifying each device on the
network in order to keep track of sender and recipient of the transmitted data (IP
Addresses, Names, MAC Addresses and Subscriber Identification Module).

v. Error Control: The communicating devices should have a way of confirming that the
transmitted data was received by the intended recipient without error and incase an error
is detected, there should be away of recovering from the error. (Two elements: Detection
and attempt to correct)

vi. Flow Control: The communicating devices should have a flow control mechanism that
allows them to slow down the rate of transmission when there is network congestion and
increase the rate when the congestion is cleared (Ability to regulate the amount of data
received/sent)

vii. Security: The devices participating in the communication process must provide basic encryption
security for the data being exchanged between them. This would prevent breach of
confidentiality.

1.4 Basic Networking Principles


Node:
 A node is any device connected to a computer network.
 Nodes can be computers, personal digital assistants (PDAs), cell phones, or various
other network appliances
 On an IP network, a node is any device with an IP address.
Network Operating System:
 Systems software designed to handle multiple requests for services and resources from
network users and devices
Backbone
 A high speed, high bandwidth link connecting network segments

Host
 A computer on the network that is accessed from a remote location

Bandwidth
The data carrying capacity of a network media

Page 3 of 9
Bit
 Definition: A bit is the smallest unit of data transfer on a computer network.
Bits represent the two binary values "on" or "off."

 Bits are often stored on computers as the digital numbers '1' and '0', but in networking,
bits can also be "encoded" by electrical signals and pulses of light.

 In computer networking, some network protocols send and receive data in the form of
bit sequences.

Byte
A byte is a sequence of bits. A byte contains eight bits. In computer networking, some
network protocols send and receive data in the form of byte sequences.

Server:
 A network server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet

 Network servers typically are configured with additional processing, memory and
storage capacity to handle the load of servicing clients.

 Common types of specialized network servers include: (see the workbook)

Segment:
 A segment is a specially-configured subset of a larger network.

 The boundaries of a network segment are established by devices capable of regulating the
flow of packets into and out of the segment, including routers, switches, hubs, bridges, or
multi-homed gateways (but not simple repeaters).

Client:
An application or system that accesses a service made available by a server

Firewall:
 A device or software program that protects a computer network from unauthorized access

 Network firewalls may be hardware devices, software programs, or a combination of the


two.

Page 4 of 9
 Network firewalls guard an internal computer network (home, school, business intranet)
against malicious access from the outside.

 Network firewalls may also be configured to limit access to the outside from internal
users.

Workstation:
 A microcomputer that contains a client operating system and designed primarily for
running applications and provide an interface through which a user can interact with
underlying network infrastructures and associated utilities.

 Intended primarily to be used by one person at a time, they are commonly connected to a
local area network

Workgroup:
 Workgroup is a collection of computers on a local area network (LAN) that share
common resources and responsibilities.

 Sometimes referred to as Peer to peer network

Domain
A collection of computer systems and services that share the same centralized security database

Media:
 Channels or pathways through which data flows from one device to another in a
network.
 The three main types are copper cable, fiber optic cable, and wireless.

Network:
An interconnection of devices that can communicate; an infrastructure that links and allows
computing devices to exchange data

Computer Network
Defined as system of interconnected computing devices for the purposes of data communication

Design
 Technical, logical or physical plan or drawing produced to show the look and function of
a system or device
 The process of developing a blue print for implementing something
 A blueprint of something representing technical details

Page 5 of 9
Network Design
 A blue print; logical and physical layout of a computer network in an enterprise
 May also be defined as the process of producing a logical and physical representation of a
computer network
 Network design refers to the planning of the implementation of a computer network
infrastructure

Management
Management is the process of planning; identifying, directing and controlling organizing the
resources (Human or otherwise), processes and activities of a enterprise to achieve specific goals
in the most effective and efficient

1Network Management
Network management is a process that refers to the activities, methods, procedures, and tools
that pertain to the operation, administration, maintenance, and provisioning of networked
systems. In other words, it is all about the activities associated with running a network, along
with the technology required to support those activities

1.5 Attributes of Robust Network Design


1) Security:
 Description: the degree to which a network infrastructure addresses the dimension of security
or the degree to which network devices and infrastructure is safe from harm or destruction.

 Security Dimensions: should focus on addressing the following dimensions: Confidentiality,


integrity and accounting, Privacy and Availability.

 Consequences of security breach: Loss of monetary value, disruption of services and


network operations, loss of clients/customers, loss of partnerships, loss of assets, loss of
important data and legal suits

Computer network should be built to guarantee


 Data integrity
 Data Confidentiality
 Data Availability
 Data Privacy
 Non-repudiation
 Accountability
Page 6 of 9
The basic approach to security can use the security trinity principles of Prevention, Detection
and Response, represented in the following diagram.

 Prevention – deterrence i.e. attempting to ensure that security breach does not happen.
 Detection – ability to establish that a breach is happening of has happened.
 Response – effective strategy and mechanisms to restore normal operations.

2) Growth and scalability:


Enterprise computer networks should enable future expansion or growth with negligible negative
effect on the performance of the network. Future growth may be through addition of users, new
streams of data and services etc.

Future network scalability/growth can be achieved through;


 Appropriate network design
 Implementation of scalable physical network topology
 Inclusion of high capability devices
 Appropriate network configuration
 Selection of scalable network protocol
 Implementing scalable network setup – client/server setup

3) Availability, fault tolerance and network recovery: Reliability


Ability to withstand possible failure and ability to recover from a catastrophic network failure
within the shortest possible time
 Guarantee that a data network will continue to operate even under hostile conditions
 Can recover within the shortest time possible is a failure occurs
 This can be achieved through:

Page 7 of 9
 Network redundant measures such as:
 Redundant power supply e.g. inclusion of UPS and automated power generators
 Redundant servers – multiple distributed files or authentication servers
(Distributed Files Service)
 Redundant access to network e.g. through cabled or wireless means.
 Implementing “Primary access sites” and “standby remote hot access sites”
Achieved through network monitoring, service clustering, implementation of RAID,
including of multiple sources of the same services e.g. two or more file servers etc
In fault tolerant networks;
 Mean time between failure (MTBF) should be large
 Mean time to repair (MTTR) should be very small

4) Quality of Service:
Ensuring Quality of the transmitted data remains the same despite the distance travelled data.
Achieved through use of:
 Data prioritization (devices with this capability)
 Proper fine-tuning of devices
 High capability devices etc

1.6 Measures of Effective Computer Networks


The effectiveness of a computer network can be evaluated based on the following FOUR factors:
a) Delivery:
The computer network must ensure that the transmitted data gets to the intended destination.

b) Accuracy
The data must not be altered as it travels from the source to the intended destination, through
the transmission media and other components of the computer network.

c) Timeliness
Data must be delivered within a certain time limit. Extended delays may render the data
useless.

d) Jitter
It refers to variation in packet arrival time. In particular, it is concerned with un-even delays
in delivery of packet. Such delays will affect the quality of the delivered data. This effect is
much more pronounced in video and audio data

Page 8 of 9
1.7 Modes of Computer Network Communication
The data transmission mode refers to the manner in which data is transmitted from one device
(one location) to another device (another location).

There are three ways or modes for achieving transmission:


a) Simplex
 Data is transmitted in only one direction

 A terminal can only send data and cannot receive or it can only receive data but cannot
send
 It is not possible to confirm successful transmission of data in simplex mode. There is no
provision for confirming successful delivery of the data
 Radio and television broadcasting are examples of simplex transmission, on which the
signal is send from the transmission to the TV antenna

b) Half duplex (Semi-duplex)


 Data can be transmitted in both directions but only in one direction at a time
 During any transmission, one is the transmitter and the other is receiver
 So each time for sending or receiving data, direction of data communication is reversed

 An example of half duplex transmission is the Wireless communication (radio


communication)

c) Full duplex (duplex)


 In full mode, data can be transmitted in both directions simultaneously i.e. sending and
receiving processes are done simultaneously

Page 9 of 9

You might also like