Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

College of Information and Computing

MODULE 1

INTRODUCTION TO COMPUTER
NETWORKS

Outline

• Introduction to Computer Networks


• Basic Enterprise Network Architecture
• Introduction to Transmission Media
• Ethernet Framing

Module Overview:

This module introduces you to the basic concepts and principles of computer networks,
types of enterprise network architecture, transmission media and modes, and ethernet framing. You
will learn the different kinds of media and technologies used to establish a network and understand
how data forwarding within ethernet-based networks works.

Module Outcomes:

At the completion of this module, you should be able to:

• Explain how network architectures work to meet specific enterprise needs and requirements
• Explain what constitutes a network and its primary mechanisms for communication
• Explain how frame forwarding works

IT214 – Applied Computer Networks 1


College of Information and Computing

LESSON 1
Introduction to Computer Networks

Learning Outcomes:

Ø Describe the elements and types of a computer network


Ø Differentiate the models of computer network
Ø Evaluate how computer networks affect the way people learn, play, work, and
communicate

Time Frame: Week 1

Introduction

This lesson introduces you to computer networks including its elements, types, and models.
At the end of this lesson, you will reflect on how computer networks affect our lives.

ACTIVITY

Analyze the graphic given that represents a computer network and answer the analysis questions
below.

IT214 – Applied Computer Networks 2


College of Information and Computing

ANALYSIS

Briefly discuss the following questions.

1. What can you conclude about computer networks?


______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

2. What role does Internet play?


______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

3. How do computer networks impact these sectors – finance, education, government, and
electricity, and others?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

ABSTRACTION

Definition
A computer network connects two or more computers to communicate data electronically
[1] and resources such as printer, Internet connection, application, or a combination of these
resources. It is a network system that serves the critical function of establishing a cohesive
architecture that allows various equipment types to transfer information in a near-seamless fashion.

Computer Network Topology

IT214 – Applied Computer Networks 3


College of Information and Computing

Evolution of Computer Network


● 1995 – Fixed Computing
● 2000 – Mobility or Bring your own device (BYOD)
● 2011 – Internet of Things
● 2020 – Internet of Everything

Communication Elements
Communication involves the process of transmitting a message from one source to another.
The elements of communication include a) message or information to send, b) identified source and
receiver, c) protocols or rules governing the process of communication, d) language and grammar,
e) speed and timing of delivery, f) confirmation or acknowledgment requirement.

Rules of Communication
Communication over a network involves the following [2]
• Message encoding - the process of converting information into another, acceptable form,
for transmission. Decoding reverses this process in order to interpret the information.
• Message Formatting and Encapsulation - A message must use a specific structure or format
when sent from a source to destination. The format of the message depends on the type of
message and the channel that is used to deliver the message. The process of placing one
message format inside another message format is called encapsulation. De-encapsulation
occurs when the process is reversed by the recipient.
• Message Size - size restrictions of frames require the source host to break a long message
into individual pieces that meet both the minimum and maximum size requirements.
• Segmentation - breaking the communication into pieces
• Labeling - provides for ordering and assembling the pieces when they arrive
• Message Timing
ü Access Method - is used by a host in a network to know when to begin sending
messages and how to respond when errors occur.
ü Flow Control - Source and destination hosts use flow control to negotiate correct
timing for successful communication.
ü Response Timeout - refers to the rules that defines how long a host in the network
should wait for responses and what action to take if a response timeout occurs.
• Message Delivery Options
ü Unicast - only a single destination for the message.
ü Multicast - is the delivery of the same message to a group of host destinations
simultaneously.

IT214 – Applied Computer Networks 4


College of Information and Computing

ü Broadcast - all hosts on the network will receive the message at the same time
Types of Computer Network
• Local Area Networks – operate within a limited geographic area and enables users to access
high-bandwidth media. Some common technologies include Ethernet, token ring, and
Fiber Distributed Data Interchange (FDDI)
• Metropolitan Area Networks – is the interconnection of different LANs through backbone
lines that spans a city or a suburban area or region larger than that covered by LAN, but
smaller than WAN.
• Wide Area Networks – operate over the large, geographically divided area. It allows real-
time and full-time remote access to resources and provides access to email, WWW, file
transfer, and e-commerce services. Some common technologies include: modems
(asynchronous dialup), Integrated Services Digital Network (ISDN), Digital Subscriber Line
(DSL), Frame Relay, T1, or E1 leased lines.
• Personal Area Networks – interconnects devices within the person's workspace [3]
• Intranet - is one common configuration of a LAN privately contained within an enterprise.
It comprised of interconnected local area networks and also use leased lines in the wide-
area network. The primary purpose of an intranet is to share company information and
computing resources among employees.
• Extranet – is a private network that uses the Internet and the public telecommunication
system to securely share part of a company's information or operations with suppliers,
vendors, partners, customers, or other companies. Extranet may be seen as part of a
company's intranet extended to users outside the company. It requires strict privacy and
security that may include some firewall server management, making use of digital
certificates or other means of user authentication, encryption of messages, and virtual
private networks (VPNs) that tunnel through the public network [4].
• Virtual Private Network (VPN) - is a private network built within a public network
infrastructure such as the Internet. For example, a telecommuter can access the company
network through the Internet by building a secure tunnel between the telecommuter's PC
and VPN router .

Benefits of VPN
o It offers reliable and secure connectivity over a shared public network
infrastructure such as the Internet.
o It provides a cost-effective method of establishing a point-to-point connection
between remote users and an enterprise customer’s network.

IT214 – Applied Computer Networks 5


College of Information and Computing

o It provides mobility to employees and allows employees to access the corporate


network securely.
Main Types of VPN
o Access VPN – provide remote access for a mobile worker and small office/home
office to the headquarters’ intranet or extranet over a shared infrastructure. It uses
analog dial-up, ISDN, DSL, mobile IP and cable technologies.
o Intranet VPN – links regional and remote offices to the headquarters internal
network using dedicated connections. This allows access only to the employees.
o Extranet VPN – links business partners to the headquarters’ network using
dedicated connections. It differs from intranet VPNs in that they allow access to
users outside the enterprise.

Models of Computer Network


A model depicts the operation of the protocols occurring within each layer, as well as the
interaction of protocols with the layers above and below each layer. The following are the benefits
of using a model:
● It assists in protocol design because protocols that operate at a specific layer have defined
information that they act upon and a defined interface to the layers above and below.
● It fosters competition because products from different vendors can work together.
● It prevents technology or capability changes in one layer from affecting other layers above
and below.
● It provides a common language to describe networking functions and capabilities.

Models
● Protocol Model - is a protocol model, because it describes the functions that occur at each
layer of protocols within the TCP/IP suite
● Reference Model - aid in clearer understanding of the functions and processes involved in
each layer.

IT214 – Applied Computer Networks 6


College of Information and Computing

APPLICATION

Exercises

1. Which of the following best describes an extranet?


a. It is a private network that is contained within an enterprise.
b. It operates within a small geographic area.
c. It is a private network that enables sharing of information to external users.

2. Why is message formatting important?


a. It increases the speed of delivering the message to the receiver
b. It ensures that the receiver understands the message it receives.
c. It ensures that message delivered is free of errors.

Well done! You have just finished Lesson 1 of this module. Should there be some parts of
the lesson which you need clarification, please feel free to communicate with your instructor using
applicable modes.

Now if you are ready, please proceed to Lesson 2 of this module which will discuss about
basic enterprise network architecture

IT214 – Applied Computer Networks 7

You might also like