Professional Documents
Culture Documents
Lesson 1.3 Introduction To Computer Networks
Lesson 1.3 Introduction To Computer Networks
MODULE 1
INTRODUCTION TO COMPUTER
NETWORKS
Outline
Module Overview:
This module introduces you to the basic concepts and principles of computer networks,
types of enterprise network architecture, transmission media and modes, and ethernet framing. You
will learn the different kinds of media and technologies used to establish a network and understand
how data forwarding within ethernet-based networks works.
Module Outcomes:
• Explain how network architectures work to meet specific enterprise needs and requirements
• Explain what constitutes a network and its primary mechanisms for communication
• Explain how frame forwarding works
LESSON 1
Introduction to Computer Networks
Learning Outcomes:
Introduction
This lesson introduces you to computer networks including its elements, types, and models.
At the end of this lesson, you will reflect on how computer networks affect our lives.
ACTIVITY
Analyze the graphic given that represents a computer network and answer the analysis questions
below.
ANALYSIS
3. How do computer networks impact these sectors – finance, education, government, and
electricity, and others?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
ABSTRACTION
Definition
A computer network connects two or more computers to communicate data electronically
[1] and resources such as printer, Internet connection, application, or a combination of these
resources. It is a network system that serves the critical function of establishing a cohesive
architecture that allows various equipment types to transfer information in a near-seamless fashion.
Communication Elements
Communication involves the process of transmitting a message from one source to another.
The elements of communication include a) message or information to send, b) identified source and
receiver, c) protocols or rules governing the process of communication, d) language and grammar,
e) speed and timing of delivery, f) confirmation or acknowledgment requirement.
Rules of Communication
Communication over a network involves the following [2]
• Message encoding - the process of converting information into another, acceptable form,
for transmission. Decoding reverses this process in order to interpret the information.
• Message Formatting and Encapsulation - A message must use a specific structure or format
when sent from a source to destination. The format of the message depends on the type of
message and the channel that is used to deliver the message. The process of placing one
message format inside another message format is called encapsulation. De-encapsulation
occurs when the process is reversed by the recipient.
• Message Size - size restrictions of frames require the source host to break a long message
into individual pieces that meet both the minimum and maximum size requirements.
• Segmentation - breaking the communication into pieces
• Labeling - provides for ordering and assembling the pieces when they arrive
• Message Timing
ü Access Method - is used by a host in a network to know when to begin sending
messages and how to respond when errors occur.
ü Flow Control - Source and destination hosts use flow control to negotiate correct
timing for successful communication.
ü Response Timeout - refers to the rules that defines how long a host in the network
should wait for responses and what action to take if a response timeout occurs.
• Message Delivery Options
ü Unicast - only a single destination for the message.
ü Multicast - is the delivery of the same message to a group of host destinations
simultaneously.
ü Broadcast - all hosts on the network will receive the message at the same time
Types of Computer Network
• Local Area Networks – operate within a limited geographic area and enables users to access
high-bandwidth media. Some common technologies include Ethernet, token ring, and
Fiber Distributed Data Interchange (FDDI)
• Metropolitan Area Networks – is the interconnection of different LANs through backbone
lines that spans a city or a suburban area or region larger than that covered by LAN, but
smaller than WAN.
• Wide Area Networks – operate over the large, geographically divided area. It allows real-
time and full-time remote access to resources and provides access to email, WWW, file
transfer, and e-commerce services. Some common technologies include: modems
(asynchronous dialup), Integrated Services Digital Network (ISDN), Digital Subscriber Line
(DSL), Frame Relay, T1, or E1 leased lines.
• Personal Area Networks – interconnects devices within the person's workspace [3]
• Intranet - is one common configuration of a LAN privately contained within an enterprise.
It comprised of interconnected local area networks and also use leased lines in the wide-
area network. The primary purpose of an intranet is to share company information and
computing resources among employees.
• Extranet – is a private network that uses the Internet and the public telecommunication
system to securely share part of a company's information or operations with suppliers,
vendors, partners, customers, or other companies. Extranet may be seen as part of a
company's intranet extended to users outside the company. It requires strict privacy and
security that may include some firewall server management, making use of digital
certificates or other means of user authentication, encryption of messages, and virtual
private networks (VPNs) that tunnel through the public network [4].
• Virtual Private Network (VPN) - is a private network built within a public network
infrastructure such as the Internet. For example, a telecommuter can access the company
network through the Internet by building a secure tunnel between the telecommuter's PC
and VPN router .
Benefits of VPN
o It offers reliable and secure connectivity over a shared public network
infrastructure such as the Internet.
o It provides a cost-effective method of establishing a point-to-point connection
between remote users and an enterprise customer’s network.
Models
● Protocol Model - is a protocol model, because it describes the functions that occur at each
layer of protocols within the TCP/IP suite
● Reference Model - aid in clearer understanding of the functions and processes involved in
each layer.
APPLICATION
Exercises
Well done! You have just finished Lesson 1 of this module. Should there be some parts of
the lesson which you need clarification, please feel free to communicate with your instructor using
applicable modes.
Now if you are ready, please proceed to Lesson 2 of this module which will discuss about
basic enterprise network architecture