Professional Documents
Culture Documents
Origenes IT
Origenes IT
Computer Networks
A computer network is a broad term for one of the biggest technological advances in computer
science over the last 40 years. The basic definition of a computer network is that a computer
network connects parts of a distributed architecture, whether those parts are made up of
hardware, or virtual or logical resources.
The earliest computers had no networks — they were monoliths that crunched numbers through
basic mechanical and electrical components.
Then, slowly, as the technology evolved, we figured out how to link one physical computer to
another.
Early simpler computer networks were situations where individual computers and workstations
and servers got connected one by one, first by Ethernet and other cabling, and later through
wireless connection technologies.
In the beginning, those machine-to-machine connections were the only kinds of networking that
were available. The traditional computer network saw each physical hardware piece as a node in
a connected infrastructure.
In order to affect these kinds of early networks, engineers used a range of physical network
topologies. A bus topology connected all of the nodes to a single dimensional channel. A star
topology sent traffic to and from each node, to a central hub in the middle.
Ring topologies sent a token laterally among a circle of nodes, with or without a hub. All of these
topologies presented different control methods and connectivity models for the same types of
hardware networks, where computers first learned to “talk” to each other and share data and
resources.
In the 1990s, the types of cutting-edge computer networks adopted by wealthy institutions like
corporations and universities features a set of “virtual drive” identifiers, where a user at a
workstation could click into, for example, “drive Z” to access data resources housed on another
connected computer’s hard drive.
Over time, the hardware developed — for instance, pioneers like Cisco created sophisticated
network switches and advanced node handling setups.
Then the technology world exploded with the rise of virtual networking.
In newer virtual types of networks, the hardware that was connected to each other is replaced by
structural resources handled by software programs that create widespread networks independent
of hardware.
The tools used to orchestrate all of these resources are different than those topologies used for
earlier networks. Instead of computers cabled together, the network data traffic moves in packets,
through a wireless or distributed virtual environment, and often, through the web to and from
vendor services, like AWS.
Virtualization resources include containers and other models where engineers clone an operating
system to various nodes and synchronize activity between them.
Cloud and Software as a Service (Saas) technologies further abstracted networking, which is now
an extremely diverse industry. New developments include the rise of network segmentation,
where parts of the network are walled off with firewalls for security purposes, and edge
computing, where data transfers take place at strategic points in a sophisticated network, also for
security purposes.
Other key network security tools involve defenses “beyond the perimeter,” where, for instance,
advanced monitoring algorithms look for errant or unusual network activity in order to identify a
threat.
A modern computer network professional doesn’t just need to know how to tether computers
together, but they have to understand the difference between a LAN (local area network) and a
WAN (wide area network).
All of this contributes to the modern computer networking field, where there is so much
progress, and so much rapid evolution.
Reference: https://www.techopedia.com/definition/25597/computer-network
Setting up a computer network is a fast and reliable way of sharing information and resources
within a business. It can help you make the most of your IT systems and equipment.
Advantages of computer networking
Main benefits of networks include:
File sharing – you can easily share data between different users, or access it remotely if
you keep it on other connected devices.
There are mainly three types of computer networks based on their size:
1. Local area network is a group of computers connected with each other in a small places such
2. LAN is secure because there is no outside connection with the local area network thus the data
which is shared is safe on the local area network and can’t be accessed outside.
3. LAN due to their small size are considerably faster, their speed can range anywhere from 100
to 100Mbps.
4. LANs are not limited to wire connection, there is a new evolution to the LANs that allows
Metropolitan area network various Local area networks are connected with each other through
telephone lines. The size of the Metropolitan area network is larger than LANs and smaller than
WANs(wide area networks), a MANs covers the larger area of a city or town.
Wide area network provides long distance transmission of data. The size of the WAN is larger
than LAN and MAN. A WAN can cover country, continent or even a whole world. Internet
connection is an example of WAN. Other examples of WAN are mobile broadband connections
Reference: https://beginnersbook.com/2019/03/types-of-computer-network-lan-man-and-
wan/
D. Network Topology
network. Network topology can be used to define or describe the arrangement of various types of
networks, industrial fieldbuses and computer networks.
nodes and the connections between the devices are modeled as links or lines between the
nodes. Physical topology is the placement of the various components of a network (e.g., device
location and cable installation), while logical topology illustrates how data flows within a
may differ between two different networks, yet their topologies may be identical. A network’s
Reference: https://en.wikipedia.org/wiki/Network_topology
Types of Topology
Mesh Topology
In mesh topology each device is connected to every other device on the network through a
dedicated point-to-point link. When we say dedicated it means that the link only carries data for
the two connected devices only. Let’s say we have n devices in the network then each device
must be connected with (n-1) devices of the network. Number of links in a mesh topology of n
devices would be n (n-1)/2.
1. No data traffic issues as there is a dedicated link between two devices which means the link is
only available for those two devices.
2. Mesh topology is reliable and robust as failure of one link doesn’t affect other links and the
communication between other devices on the network.
3. Mesh topology is secure because there is a point to point link thus unauthorized access is not
possible.
4. Fault detection is easy.
Star Topology
In star topology each device in the network is connected to a central device called hub. Unlike
Mesh topology, star topology doesn’t allow direct communication between devices; a device
must have to communicate through hub. If one device wants to send data to other device, it has
to first send the data to hub and then the hub transmit that data to the designated device.
1. Less expensive because each device only need one I/O port and needs to be connected with
hub with one link.
2. Easier to install
3. Fewer amounts of cables required because each device needs to be connected with the hub
only.
4. Robust, if one link fails, other links will work just fine.
5. Easy fault detection because the link can be easily identified.
1. If hub goes down everything goes down, none of the devices can work without hub.
2. Hub requires more resources and regular maintenance because it is the central system of star
topology.
Bus Topology
In bus topology there is a main cable and all the devices are connected to this main cable through
drop lines. There is a device called tap that connects the drop line to the main cable. Since all the
data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable
can have.
Ring Topology
In ring topology each device is connected with the two devices on either side of it. There are two
dedicated point to point links a device has with the devices on the either side of it. This structure
forms a ring thus it is known as ring topology. If a device wants to send data to another device
then it sends the data in one direction, each device in ring topology has a repeater, if the received
data is intended for other device then repeater forwards this data until the intended device
receives it.
1. Easy to install.
2. Managing is easier as to add or remove a device from the topology only two links are required
to be changed.
1. A link failure can fail the entire network as the signal will not travel forward due to failure.
2. Data traffic issues, since all the data is circulating in a ring.
Hybrid topology
1. We can choose the topology based on the requirement for example, scalability is our concern
then we can use star topology instead of bus technology.
2. Scalable as we can further connect other computer networks with the existing networks with
different topologies.
Disadvantages of Hybrid topology
Reference: https://beginnersbook.com/2019/03/computer-network-topology-mesh-star-bus-
ring-and-hybrid/
E. OSI Model
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to
describe the functions of a networking system. The OSI model characterizes computing
functions into a universal set of rules and requirements in order to support interoperability
between different products and software. In the OSI reference model, the communications
between a computing system are split into seven different abstraction layers: Physical, Data
Link, Network, Transport, Session, Presentation, and Application.
Created at a time when network computing was in its infancy, the OSI was published in 1984 by
the International Organization for Standardization (ISO). Though it does not always map directly
to specific systems, the OSI Model is still used today as a means to describe Network
Architecture.
The 7 Layers of the OSI Model
Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw
unstructured data bits across the network from the physical layer of the sending device to the
physical layer of the receiving device. It can include specifications such as voltages, pin layout,
cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems.
At the data link layer, directly connected nodes are used to perform node-to-node data transfer
where data is packaged into frames. The data link layer also corrects errors that may have
occurred at the physical layer.
The data link layer encompasses two sub-layers of its own. The first, media access control
(MAC), provides flow control and multiplexing for device transmissions over a network. The
second, the logical link control (LLC), provides flow and error control over the physical medium
as well as identifies line protocols.
Network Layer
The network layer is responsible for receiving frames from the data link layer, and delivering
them to their intended destinations among based on the addresses contained inside the frame.
The network layer finds the destination by using logical addresses, such as IP (internet protocol).
At this layer, routers are a crucial component used to quite literally route information where it
needs to go between networks.
Transport Layer
The transport layer manages the delivery and error checking of data packets. It regulates the size,
sequencing, and ultimately the transfer of data between systems and hosts. One of the most
common examples of the transport layer is TCP or the Transmission Control Protocol.
Session Layer
The session layer controls the conversations between different computers. A session or
connection between machines is set up, managed, and termined at layer 5. Session layer services
also include authentication and reconnections.
Presentation Layer
The presentation layer formats or translates data for the application layer based on the syntax or
semantics that the application accepts. Because of this, it at times also called the syntax layer.
This layer can also handle the encryption and decryption required by the application layer.
Application Layer
At this layer, both the end user and the application layer interact directly with the software
application. This layer sees network services provided to end-user applications such as a web
browser or Office 365. The application layer identifies communication partners, resource
availability, and synchronizes communication.
Reference: https://www.forcepoint.com/cyber-edu/osi-model