Module 1 Lesson 1 EC3 - Introduction To Networking

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

COLLEGEOF INFORMATION TECHNOLOGY

PROGRAM OUTCOMES:

In pursuance of the above-stated mission, the objectives of the College are as follows:

1. Apply knowledge of computing, theories, fundamentals, models, mathematics and science


appropriate to the discipline.
2. Analyze a problem, identify and define the need and user requirements appropriate to its
solution.
3. Design, implement and evaluate a computer-based system, process, component or program to
meet desired needs.
4. Develop ideas and solutions with creativity and innovation with appropriate considerations to
ethics, cultural, and environment factors.
5. Analyze the local and global impact of technology on individuals, organizations and society.
6. Function effectively as a member or leader of a development team recognizing the different roles
within a team to accomplish a common goal.
7. Assist in the creation of an effective project plan.
8. Recognize the legal, social, ethical and professional issues involved in the utilization of computer
technology and be guided by the adoption of appropriate professional, ethical and legal
practices.
9. Recognize the fast-paced demands of industry allowing him or her to formulate personal goals
aligned to organizational goals in order to determine plans of action to improve own
performance, capability and self. Such goals allow the student to self-assess him/himself to
determine his development needs.
10. Ability to effectively communicate and present the designed solutions with a range of audiences
both in oral and in writing.
11. Apply current and appropriate techniques, skills and tools necessary for the IT profession.

COURSE TITLE: Computer Communications and Network (EC - 3)

COURSE DESCRIPTION:

This course is a detailed introduction to the basic hardware and software, architectural components for
computer communications in local area networks. The components that are focused upon include
understanding the basics of computer networks, switching, routing, protocols and security.
Module 1
Introduction to Computer Networking
Module Learning Outcomes:
At the end of the module, the students will be able to:
1. Build an understanding of the fundamental concepts of computer networking.
2. Familiarize the student with the basic taxonomy and terminology of the computer networking area.
3. Introduce the student to advanced networking concepts, preparing the student for entry Advanced courses in
computer networking.
4. Allow the student to gain expertise in some specific areas of networking such as the design and maintenance of
individual networks.

Pre: Test
Multiple Choice. Encircle the correct answer.

1. It is a free software package or mobile app that lets you view web pages, graphics, and most
online content.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
2. It is what you see in your browser when you are on the internet.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
3. Are the web browser addresses of internet pages and files.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
4. This indicates that the webpage has a special layer of encryption added to hide your personal
information and passwords from others.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
5. It is the company or government organization that plugs you into the vast internet.
A. SPAM B. EMAIL C. ISP D. ROUTER
6. It is the hardware device that acts as the traffic cop for network signals arriving at your home or
business from your ISP.
A. SPAM B. EMAIL C. ISP D. ROUTER
7. It is the sending and receiving of typewritten messages from one screen to another.
A. SPAM B. EMAIL C. ISP D. ROUTER
8. It is the jargon name of unwanted and unsolicited email.
A. SPAM B. EMAIL C. ISP D. ROUTER
9. It is the broad term for any online tool that enables users to interact with thousands of other users.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
10. The transaction of business selling and buying online.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
11. It is the mathematical scrambling of data so that it is hidden from eavesdroppers.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
12. It is a broad term that describes transferring something you find on the internet.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
13. It is the broad term to describe any malicious software designed by hackers.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN
14. It is a generic term to describe a barrier against destruction.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN
15. It is the use of convincing-looking emails and web pages to lure you into typing your account
numbers and passwords/PINs.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN

Lesson Map

Lesson 1
Computer Networks

Lesson Learning Outcomes


1. Have a good understanding of the OSI Reference Model and in particular have a good knowledge of Layers 1-3.
2. Analyze the requirements for a given organizational structure and select the most appropriate networking
architecture and technologies;
3. Identify basic knowledge of the use of cryptography and network security;
4. Specify deficiencies in existing protocols, and then go onto formulate new and better protocols;
5. Understanding of the issues surrounding Mobile and Wireless Networks.
6. Have a working knowledge of datagram and internet socket programming

Introduction
A system of interconnected computers and computerized peripherals such as printers is called computer network.
This interconnection among computers facilitates information sharing among them. Computers may connect to
each other by either wired or wireless media.
A network consists of two or more computers that are linked in order to share resources (such as
printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.

A computer network is a group of computers that use a set of common communication


protocols over digital interconnections for the purpose of sharing resources located on or provided by
the network nodes. The interconnections between nodes are formed from a broad spectrum
of telecommunication network technologies, based on physically wired, optical, and wireless radio-
frequency methods that may be arranged in a variety of network topologies.

The nodes of a computer network may be classified by many means as personal


computers, servers, networking hardware, or general purpose hosts. They are identified
by hostnames and network addresses. Hostnames serve as memorable labels for the nodes, rarely
changed after initial assignment. Network addresses serve for locating and identifying the nodes by
communication protocols such as the Internet Protocol.

Computer networks may be classified by many criteria, for example, the transmission medium used to
carry signals, bandwidth, communications protocols to organize network traffic, the network size, the
topology, traffic control mechanism, and organizational intent.

Computer networks support many applications and services, such as access to the World Wide
Web, digital video, digital audio, shared use of application and storage servers, printers, and fax
machines, and use of email and instant messaging applications.

History
Computer networking may be considered a branch of computer science, computer engineering,
and telecommunications, since it relies on the theoretical and practical application of the related
disciplines. Computer networking was influenced by a wide array of technology developments and
historical milestones.

 In the late 1950s, early networks of computers included the U.S. military radar system Semi-
Automatic Ground Environment (SAGE).
 In 1959, Christopher Strachey filed a patent application for time-sharing and John McCarthy initiated
the first project to implement time-sharing of user programs at MIT.[1][2][3][4] Stratchey passed the
concept on to J. C. R. Licklider at the inaugural UNESCO Information Processing Conference in Paris
that year.[5] McCarthy was instrumental in the creation of three of the earliest time-sharing systems
(Compatible Time-Sharing System in 1961, BBN Time-Sharing System in 1962, and Dartmouth Time
Sharing System in 1963).
 In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of the Communist Party of the
Soviet Union a detailed plan for the re-organisation of the control of the Soviet armed forces and of
the Soviet economy on the basis of a network of computing centres, the OGAS.[6]
 In 1959, the MOS transistor was invented by Mohamed Atalla and Dawon Kahng at Bell Labs.[7] It
later became one of the basic building blocks and "work horses" of virtually any element
of communications infrastructure.[8]
 In 1960, the commercial airline reservation system semi-automatic business research
environment (SABRE) went online with two connected mainframes.
 In 1963, J. C. R. Licklider sent a memorandum to office colleagues discussing the concept of the
"Intergalactic Computer Network", a computer network intended to allow general communications
among computer users.
 Throughout the 1960s, Paul Baran and Donald Davies independently developed the concept
of packet switching to transfer information between computers over a network. Davies pioneered
the implementation of the concept with the NPL network, a local area network at the National
Physical Laboratory (United Kingdom) using a line speed of 768 kbit/s.[9][10][11]
 In 1965, Western Electric introduced the first widely used telephone switch that implemented
computer control in the switching fabric.
 In 1969, the first four nodes of the ARPANET were connected using 50 kbit/s circuits between
the University of California at Los Angeles, the Stanford Research Institute, the University of
California at Santa Barbara, and the University of Utah.[12] In the 1970s, Leonard Kleinrock carried
out mathematical work to model the performance of packet-switched networks, which underpinned
the development of the ARPANET.[13][14] His theoretical work on hierarchical routing in the late 1970s
with student Farouk Kamoun remains critical to the operation of the Internet today.
 In 1972, commercial services using X.25 were deployed, and later used as an underlying
infrastructure for expanding TCP/IP networks.
Year Event

1961 The idea of ARPANET, one of the earliest computer networks, was proposed by Leonard
Kleinrock in 1961, in his paper titled "Information Flow in Large Communication Nets."

1965 The term "packet" was coined by Donald Davies in 1965, to describe data sent between
computers over a network.

1969 ARPANET was one of the first computer networks to use packet switching. Development of
ARPANET started in 1966, and the first two nodes, UCLA and SRI (Standford Research
Institute), were connected, officially starting ARPANET in 1969.

1969 The first RFC surfaced in April 1969, as a document to define and provide information about
computer communications, network protocols, and procedures.

1969 The first network switch and IMP (Interface Message Processor) was sent to UCLA on August
29, 1969. It was used to send the first data transmission on ARPANET.

1969 The Internet was officially born, with the first data transmission being sent between UCLA and
SRI on October 29, 1969, at 10:30 p.m.

1970 Steve Crocker and a team at UCLA released NCP (NetWare Core Protocol) in 1970. NCP is a file
sharing protocol for use with NetWare.

1971 Ray Tomlinson sent the first e-mail in 1971.

1971 ALOHAnet, a UHF wireless packet network, is used in Hawaii to connect the islands together.
Although it is not Wi-Fi, it helps lay the foundation for Wi-Fi.

1973 Ethernet is developed by Robert Metcalfe in 1973 while working at Xerox PARC.

1973 The first international network connection, called SATNET, is deployed in 1973 by ARPA.

1973 An experimental VoIP call was made in 1973, officially introducing VoIP technology and
capabilities. However, the first software allowing users to make VoIP calls was not available
until 1995.

1974 The first routers were used at Xerox in 1974. However, these first routers were not
considered true IP routers.
1976 Ginny Strazisar developed the first true IP router, originally called a gateway, in 1976.

1978 Bob Kahn invented the TCP/IP protocol for networks and developed it, with help from Vint
Cerf, in 1978.

1981 Internet Protocol version 4, or IPv4, was officially defined in RFC 791 in 1981. IPv4 was the
first major version of the Internet protocol.

1981 BITNET was created in 1981 as a network between IBM mainframe systems in the United
States.

1981 CSNET (Computer Science Network) was developed by the U.S. National Science Foundation
in 1981.

1983 ARPANET finished the transition to using TCP/IP in 1983.

1983 Paul Mockapetris and Jon Postel implement the first DNS in 1983.

1986 The NSFNET (National Science Foundation Network) came online in 1986. It was a backbone
for ARPANET, before eventually replacing ARPANET in the early 1990s.

1986 BITNET II was created in 1986 to address bandwidth issues with the original BITNET.

1988 The first T1 backbone was added to ARPANET in 1988.

1988 WaveLAN network technology, the official precursor to Wi-Fi, was introduced to the market
by AT&T, Lucent, and NCR in 1988.

1988 Details about network firewall technology was first published in 1988. The published paper
discussed the first firewall, called a packet filter firewall, that was developed by Digital
Equipment Corporation the same year.

1990 Kalpana, a U.S. network hardware company, developed and introduced the first
network switch in 1990.

1996 IPv6 was introduced in 1996 as an improvement over IPv4, including a wider range of IP
addresses, improved routing, and embedded encryption.

1997 The first version of the 802.11 standard for Wi-Fi is introduced in June 1997, providing
transmission speeds up to 2 Mbps.

1999 The 802.11a standard for Wi-Fi was made official in 1999, designed to use the 5 GHz band and
provide transmission speeds up to 25 Mbps.

1999 802.11b devices were available to the public starting mid-1999, providing transmission speeds
up to 11 Mbps.

1999 The WEP encryption protocol for Wi-Fi is introduced in September 1999, for use with 802.11b.

2003 802.11g devices were available to the public starting in January 2003, providing transmission
speeds up to 20 Mbps.

2003 The WPA encryption protocol for Wi-Fi is introduced in 2003, for use with 802.11g.

2003 The WPA2 encryption protocol is introduced in 2004, as an improvement over and
replacement for WPA. All Wi-Fi devices are required to be WPA2 certified by 2006.

2009 The 802.11n standard for Wi-Fi was made official in 2009. It provides higher transfer speeds
over 802.11a and 802.11g, and it can operate on the 2.4 GHz and 5 GHz bandwidths.

2018 The Wi-Fi Alliance introduced WPA3 encryption for Wi-Fi in January 2018, which includes
security enhancements over WPA2.

The basic types of networks include:

 Local Area Network (LAN)


 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)
 Wireless Local Area Network (WLAN)
 Personal Area Network (PAN)
 Campus Area Network (CAN)
 System Area Network (SAN)
 Enterprise Private Network (EPN)
 Virtual Private Network (VPN)

Local Area Network

A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited
to a geographic area such as a writing lab, school, or building. Rarely are
LAN computers more than a mile apart.

Metropolitan Area Network

A Metropolitan Area Network (MAN) covers larger geographic areas, such as cities or school districts. By
interconnecting smaller networks within a large geographic area.

Wide Area Network

Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the
world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network.

Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of minutes, without
paying enormous phone bills. A WAN is complicated. It uses multiplexers to connect local and
metropolitan networks to global communications networks like the Internet. To users, however, a WAN
will not appear to be much different than a LAN or a MAN.

Advantages of Installing a School Network


 Speed.
 Cost.
 Security.
 Centralized Software Management.
 Resource Sharing.
 Electronic Mail.
 Flexible Access.
 Workgroup Computing.

Disadvantages of Installing a School Network

 Expensive to Install.
 Requires Administrative Time.
 File Server May Fail.

Wireless Local Area Network – This is a LAN which works using wireless network technology such as Wi-
Fi. This type of network is becoming more popular as wireless technology is further developed and is
used more in the home and by small businesses. It means devices do not need to rely on physical cables
and wires as much and can organise their spaces more effectively.


Storage Area Network – This network connects servers directly to devices which store amounts of data
without relying on a LAN or WAN network to do so. This can involve another type of connection known
as Fibre Channel, a system similar to Ethernet which handles high-performance disk storage for
applications on a number of professional networks.

This section provides information on the following components:

1. File Servers

A file server stands at the heart of most networks. It is a very fast computer with a large amount of RAM
and storage space, along with a fast network interface card. The network operating system software
resides on this computer, along with any software applications and data files that need to be shared.

2. Workstations

All of the computers connected to the file server on a network are called workstations. A typical
workstation is a computer that is configured with a network interface card, networking software, and
the appropriate cables. Workstations do not necessarily need floppy disk drives or hard drives because
files can be saved on the file server. Almost any computer can serve as a network workstation.

3. Network Interface Cards

The network interface card (NIC) provides the physical


connection between the network and the computer
workstation. Most NICs are internal, with the card fitting into an
expansion slot inside the computer.
Network interface cards are a major factor in determining the speed and performance of a network. It is
a good idea to use the fastest network card available for the type of workstation you are using.

The three most common network interface connections are Ethernet cards, LocalTalk connectors, and
Token Ring cards.

Ethernet Cards

Ethernet cards are usually purchased separately from a computer, although many computers (such as
the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain
connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial
cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection.

Fig. 1. Ethernet card. From top to bottom:


LocalTalk Connectors

LocalTalk is Apple's built-in solution for networking Macintosh


computers. It utilizes a special adapter box and a cable that plugs into the
printer port of a Macintosh. A major disadvantage of LocalTalk is that it is
slow in comparison to Ethernet. Most Ethernet connections operate at
10 Mbps (Megabits per second). In contrast, LocalTalk operates at
only 230 Kbps (or .23 Mbps).

Token Ring Cards

Token Ring network cards look similar to Ethernet cards. One visible difference is the type of connector
on the back end of the card. Token Ring cards generally have a nine pin DIN type connector to attach the
card to the network cable.
4. Concentrators/Hubs

A concentrator is a device that provides a central


connection point for cables from workstations,
servers, and peripherals. In a star topology,
twisted-pair wire is run from each workstation to a
central concentrator. Hubs are multislot
concentrators into which can be plugged a number of
multi-port cards to provide additional access as the
network grows in size. Some concentrators are
passive, that is they allow the signal to pass from one
computer to another without any change. Most
concentrators are active, that is they electrically
amplify the signal as it moves from one device to another

5. Repeaters

Since a signal loses strength as it passes along a cable, it is often


necessary to boost the signal with a device called a repeater. The
repeater electrically amplifies the signal it receives and
rebroadcasts it. Repeaters can be separate devices or they can be
incorporated into a concentrator. They are used when the total
length of your network cable exceeds the standards set for the type
of cable being used.

6. Bridges

A bridge is a device that allows you to segment a large network into


two smaller, more efficient networks. If you are adding to an older
wiring scheme and want the new network to be up-to-date, a
bridge can connect the two.
7. Routers

A router translates information from one network to another; it is similar to a superintelligent bridge.
Routers select the best path to route a message, based on the destination address and origin. The router
can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along
back roads and shortcuts.

If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In
this case, the router serves as the translator between the information on your LAN and the Internet. It
also determines the best route to send the data over the Internet. Routers can:

 Direct signal traffic efficiently


 Route messages between any two protocols
 Route messages between linear bus, star, and star-wired ring topologies
 Route messages across fiber
optic, coaxial, and twisted-pair
cabling
Activity # 1

Circle the best answer for each of the following multiple choice questions. (2 points each)

1. ARPANET stands for?


a) Advanced Research Project Agency Network
b) Advanced Research Programmed Auto Network
c) Advanced Research Project Automatic Network
d) Advanced Research Project Authorized Network

2. Internet can help you find the shortest route.


a) True
b) False

3. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing

4. A technique that marked the beginning of computer communications.


a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing

5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment

6. TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol

7. The “Victorian internet” is actually?


a) Telegraph
b) Batch Environment
c) Unit Environment
d) System Environment

8. Packet switching was invented in?


a) 1960s
b) 1980s
c) 2000s
d) 1990s

9. The probability of failure-free operation of a software application in a specified environment for a


specified time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety

10. DARPA stands for?


a) Data Advanced Research Projects Agency
b) Defense Advanced Research Product Agency
c) Data based Advanced Research Product Agency
d) Defense Advanced Research Projects Agency
Post Test
TRUE/FALSE Directions: Read each statement below carefully. Place a T on the line if you think a
statement it TRUE. Place an F on the line if you think the statement is FALSE.

_____ 1. Route messages between linear bus, star, and star-wired ring topologies.

_____ 2. Routers select the best path to route a message, based on the destination address and origin.

_____ 3. A bridge is a device that allows you to segment a large network into two smaller, more efficient
networks.

_____ 4. Repeaters can be separate devices or they can be incorporated into a concentrator.

_____ 5. Token Ring cards generally have a nine pin DIN type connector to attach the card to the
network cable.

_____ 6. NIC provides the physical connection between the network and the computer workstation.
Most NICs are internal, with the card fitting into an expansion slot inside the computer.

_____ 7. A file server stands at the heart of most networks.

_____ 8. WAN connect larger geographic areas, such as Florida, the United States, or the world.

_____9. MAN covers larger geographic areas, such as cities or school districts.
_____ 10. LAN is a network that is confined to a relatively small area.

Topic Summary
1. Introduction to computer networks
2. Different types of network devices
3. History of networks
4. Advantage and dis advantage of using topology
References:

1. https://www.goodreads.com/book/show/39303126-introduction-to-
computer-networking 2016
2. https://www.quora.com/How-do-I-get-this-book-Data-Communication-
And-networking-by-Behrouz-A-Forouzan-and-Firouz-Mosharraf
3. https://www.visual-paradigm.com/tutorials/how-to-create-network-
diagram/
4. https://www.elsevier.com/books/computer-networks/peterson/978-0-12-
818200-0

You might also like