NSDM Lecture 1 - Review of Computer Networks
NSDM Lecture 1 - Review of Computer Networks
1.1 Introduction
Welcome to the first lecture on Network Systems Design and Management. This lecture reviews
computer networks and the basic concepts and principles of the same. It is intended that we remind
ourselves of what components make up a computer network before advancing to designing and
implementing them. The lecture covers an Introduction to computer networks where definition of
terms is provided. The history of networking is briefly presented to give us an idea of where it all
started. The goals and benefits of networking are then presented. There are different ways in which
computer networks can be categorised. This is covered, though briefly, in the Types of Network
section. Devices or components in a computer network are connected via some transmission media
such as coaxial, twisted or fiber cable or even using wireless connections provided by radio frequency,
microwave or infrared. These media are discussed. The three flow of data transmission is also briefly
discussed here. The lesson ends with some lecture activities and selt-test questions.
A computer network is no different than any of the before-mentioned networks. A computer network
exchanges information to and from computers and has a system to direct the information to the correct
computer. The Internet as it is known today is a huge network composed of millions and millions of
smaller networks called LAN’s or Intranets.
Two or more computers connected to, or can communicate with, each other in some way. Such
computers are also called nodes or stations and run software that initiates and manages their
interaction in sharing files and other resources. (Encyclopaedia of Networking 2nd Ed. by Werner
Feibel)
A network is created when two or more computers are connected to share information and resources.
A computer network is a collection of computers, which are in some way connected such that they can
exchange data between themselves and other computers on the network. It might involve physical
wire, infrared or radio frequency communication, and can be usually used to share files, devices and
connections to other computers. The Internet is an example of a computer network.
A computer network is simply computers wired together in a way that lets them share data and/or
devices such as hard drives, CD-ROMs, fax-modems, printers, etc.
On the most basic level, therefore, a computer network is a collection of devices that can store and
manipulate electronic data, interconnected in such a way that network users can store, retrieve, and
share information.
A network is a connected system of objects or people. The telephone system, known in the industry as
the Public Switched Telephone Network (PSTN), is an example of a network. It allows people in
virtually every corner of the world to communicate with anyone who has access to a telephone.
Similarly, a computer network allows users to communicate with other users on that network by
transmitting data along cables. A computer network is defined as having two or more devices, such as
workstations, printers, and servers, linked together for the purpose of sharing information, resources,
or both. The link can be through copper or fiber-optic cable or it can be a wireless connection that uses
radio signals, laser or infrared technology, or satellite transmission. The information and resources
shared can be data files, applications, printers, modems, or other hardware. Computer networks are
used in businesses, schools, government agencies, and even many homes.
Computer networks are not always independent of the telephone network. Telephone lines are often
used for transmitting data between computers, particularly for homes and small businesses. In the past,
this has been a fairly slow and inexpensive connection method for utilizing low speed connection
devices. New telephone company (telco) data services are bringing higher bandwidths at reasonable
costs to home and small business users. These services use the same copper wires that carry voice
calls.
Early computers were standalone devices, which operated independently from other computers. It
soon became apparent that this was not an efficient or cost-effective way for businesses to operate.
Initially, the primary reason for networking computers in the beginning was to communicate between
computers and share resources such as printers. Of course, once they were linked, people discovered
the usefulness of being able to share much more than printers. Data, applications, and peripheral
equipment like scanners, faxes, and plotters could now be shared between users, thus saving
organizations money and time.
The earliest version of the largest network, the Internet, was developed by the United States
Department of Defense. The Internet was used to communicate with subcontractors and universities
involved with its research projects. Cables were laid between the sites to enable communication. Other
Internet services, such as e-mail and newsgroups, soon followed. In the 1990s, the World Wide Web
was developed which put more demands on existing cable. The cable manufacturers continue to
develop new media that can handle all the data transmission needs of users.
1.3.3 Goals of Networking
The goal of an effective network is to improve productivity, foster communication, control costs, and
make information access faster and easier. To achieve these goals, the network needs certain attributes.
A good way to help remember these attributes is to see that the first letter of each of these network
objectives creates the acronym SMART:
Simple - The network should be simple. It should require no special skills of its users.
Manageable - The network should be manageable. It should be easy to monitor and to adjust
the performance of network elements, such as servers, workstations, routers, switches, and
wiring.
Adaptable - The network should be adaptable and scalable. Change and growth should not
present barriers to network owners. The cabling on which a network is built has a great deal to
do with the ability of the network to adapt to change and adjust to growth.
Reliable - The network should be reliable. When a user requests any connected tool or
operation, it should be available.
Transparent - The network should be transparent. It should be just as fast and easy to access a
resource that is near as one that comes from a more distant server.
All of these attributes are affected by the quality of the cabling and the cable installation. A cable
installer must always remember the ultimate goals of the network when planning and installing cable
plants.
There are numerous benefits to networking computers and other devices. Users can share documents
easily, backup data easily, share a common network connection, share hardware to accomplish tasks
like printing documents, and group computers and devices together to more easily manage them. It is
common to find home networks with as little as two computers sharing files, printers, and network
connections.
The benefits of networking computers are the following:
Sharing Output Devices - Printers, other output devices, and fax machines can be shared
Sharing Input Devices - High-end scanners, medical equipment, optic readers, and other input
devices are typically used on only an occasional basis and are often relatively expensive.
Therefore, it makes sense to configure them for multiple users on the network.
Sharing Storage Devices - Networked computers can share the use of hard disks, floppy, Zip,
and CD-ROM drives. Files can be saved to or accessed from these storage devices on
computers anywhere on the network.
Sharing Modems and Internet Connections - Networked computers can share modems,
ISDN lines, cable modems, and DSL adapters. With the proper software, an entire LAN can
connect to the Internet through one phone line, or coaxial cable, and a single ISP account.
Security - Security can mean different things when it is associated with a network. Prying eyes
and malicious users can destroy the integrity of data. It is much easier to secure data and
resources when policies and enforcement are centralized and managed. Computers that are
networked together make securing data and resources easier. The term security can also be
used when speaking of hardware or software problems that users can experience. When
computers are networked together, it is much easier to backup the data that is on them. This
provides the users a sense of security should any unexpected failure occur.
Sharing Data and Applications - Shared data files result in the efficient use of disk space and
easier collaboration on multiuser projects. For example, if several managers need to revise a
spreadsheet containing the department budget, the file can be retrieved from a server, edited
locally and then saved again on a network server. Each manager will be able to access the
updated file to make additional changes. In addition, applications can be installed on a network
server. Users can access the application from the server without requiring disk space on local
hard disks for the program files.
Reduced expenditure - The cost savings involved in linking computers, which include the
purchase of network interface cards (NICs), cabling or wireless media, hubs, and other
connectivity devices, often outweigh the costs of buying multiple printers and other shared
devices. However, this cost still outweighs the cost of buying multiple printers and other
shared devices. Networking also saves labor hours when users access and share data.
By using local-area network (LAN) and wide-area network (WAN) technologies, many computers are
interconnected to provide services to their users. In providing services, networked computers take on
different roles or functions in relation to each other. Some types of applications require computers to
function as equal partners. Other types of applications distribute work so that one computer functions
to serve a number of others in an unequal relationship. In either case, two computers typically
communicate with each other by using request/response protocols. One computer issues a request for a
service, and a second computer receives and responds to that request. The requester takes on the role
of a client, and the responder takes on the role of a server.
In a peer-to-peer network, the networked computers act as equal partners, or peers, to each other. As
peers, each computer can take on the client function or the server function alternately.. At one time
Workstation A, for example, may make a request for a file from Workstation B, which responds by
serving the file to Workstation A. Workstation A functions as client, while Workstation B functions as
the server. At a later time, Workstation A and B can reverse roles. Workstation B could be the client,
making a request of Workstation A, and Workstation A, as server, responds to the request of
Workstation B. Workstations A and B stand in a reciprocal, or peer, relationship to each other.
In a peer-to-peer network, individual users control their own resources. They may decide to share
certain files with other users and may require passwords before they allow others to access their
resources. Since individual users make these decisions, there is no central point of control or
administration in the network. In addition, individual users must back up their own systems to be able
to recover from data loss in case of failures. When a computer acts as a server, the user of that machine
may experience reduced performance as the machine serves the requests made by other systems.
Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary
beyond a suitable operating system in each computer. Since users control their own resources, no
dedicated administrators are needed. A peer-to-peer network works well with a small number of
computers, perhaps 10 or fewer.
As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They
do not scale well, since their efficiency decreases rapidly as the number of computers on the network
increases. Since individual users control access to the resources on their computers, security may be
difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
Client-Server Networks
In a client/server network arrangement, network services are located in a dedicated computer whose
only function is to respond to the requests of clients. The server contains the file, print, application,
security, and other services in a central computer that is continuously available to respond to client
requests. Most network operating systems adopt the form of client/server relationships. Typically,
desktop computers function as clients and one or more computers with additional processing power,
memory, and specialized software function as servers.
Servers are designed to handle requests from many clients simultaneously. Before a client can access
the server resources, the client must identify itself and be authorized to use the resource. This is
usually done by assigning each user an account name and password. A specialized authentication
server acts as an entry point, guarding access to the network, and verifies this account information. By
centralizing user accounts, security, and access control, server-based networks simplify the work of
network administration.
The concentration of network resources such as files, printers, and applications on servers also makes
the data they generate easier to back up and maintain. Rather than having these resources spread
around on individual machines, they can be located on specialized, dedicated servers for easier access.
Most client/server systems also include facilities for enhancing the network by adding new services
that extend the usefulness of the network.
The distribution of functions in client/server networks brings substantial advantages, but also incurs
some costs. Although the aggregation of resources on server systems brings greater security, simpler
access, and coordinated control, the server introduces a single point of failure into the network.
Without an operational server, the network cannot function at all. Additionally, servers require a
trained, expert staff to administer and maintain them, which increases the expense of running the
network. Server systems require additional hardware and specialized software that adds substantially
to the cost.
A local-area network (LAN) can connect many computers in a relatively small geographical area such
as a home, an office, or a campus. It allows users to access high bandwidth media like the Internet and
allows users to share devices such as printers.
A LAN connects each computer to each of the others by using a separate communications channel. A
direct connection from one computer to another is called a point-to-point link. If the network were
designed using point-to-point links, the number of links would grow rapidly as new computers were
added to the network. For each new computer, the network would need a new separate connection to
each of the other computers. This approach would be very costly and difficult to manage.
Starting in the late 1960s and early 1970s, network engineers designed a form of network that enabled
many computers in a small area to share a single communications channel by taking turns using it.
These LANs now connect more computers than any other type of network. By allowing the computers
to share a communications channel, LANs greatly reduce the cost of the network. For economic and
technical reasons, point-to-point links over longer distances are then used to connect computers and
networks in separate towns, cities, or even across continents.
The general shape or layout of a LAN is called its topology. Topology defines the structure of the
network. This includes the physical topology, which is the actual layout of the wire or media, and the
logical topology, which is how the hosts access the media.
When all the computers connect to a central point, the network takes on a star topology. An alternative
topology connects the computers in a closed loop. Here, the cable is run from one computer to the next
and then from the second to its neighbor until the last one is connected back to the first. This forms a
ring topology. A third topology, called a bus, attaches each computer into a single, long cable. Each
topology has its benefits and drawbacks. Today, most LANs are designed using some form of star
topology, although ring and bus layouts are still used in some installations.
Whatever the layout, or topology, of the network, all LANs require the networked computers to share
the communications channel that connects them. The communications channel that they all share is
called the medium, and it is typically a cable that carries electrical signals through copper, or it may be
a fiber-optic cable that carries light signals through purified glass or plastic. In the case of wireless
networks, the computers may use antennas to broadcast radio signals to each other. In all cases, the
computers on a LAN share the medium by taking turns using it.
On a LAN, the rules for coordinating the use of the medium are called Media Access Control (MAC).
Since there are many computers on the network but only one of them can use the medium at a time,
there must be some rules for deciding how they will take turns in sharing the network. The data link
layer provides reliable transit of data across a physical link by using the MAC address. If there are
conflicts when more than one computer is contending for the media, the rules ensure that there is an
agreed method for resolving the conflict. In later sections of this chapter, the major types of LANs will
be reviewed, including the rules for sharing the medium.
For economic and technical reasons, LANs are not suitable for communications over long distances.
On a LAN, the computers must coordinate their use of the network and this coordination takes time.
Over long distances with greater delays in communication, the computers would take more time
coordinating the use of the shared medium and less time sending data messages. In addition, the costs
of providing high-speed media over long distances are much greater than in the case of LANs. For
these reasons, wide-area network (WAN) technologies differ from LANs.
A WAN, as the name implies, is designed to work over a larger area than a LAN. A WAN uses point-
to-point or point-to-multipoint, serial communications lines. Point-to-point lines connect only two
locations, one on each side of the line. Point-to-multipoint lines connect one location on one side of
the line to multiple locations on the other side. They are called serial lines because the bits of
information are transmitted one after another in a series, like cars traveling on a single lane highway.
The following are some of the more common WAN technologies:
Modems
Frame Relay
The T (US) and E (Europe) Carrier series (T1, E1, T3, E3)
Synchronous Optical Network (SONET)
Typically, individuals and companies do not build their own WAN connections. Government
regulations only allow utility companies to install lines on public property. Therefore, wide area
connections make use of the communications facilities put in place by utility companies, called
common carriers, such as the telephone company.
Connections across WAN lines may be temporary or permanent. Telephone or dialup lines, for
example, might make a temporary connection to a remote network from a computer in a home or small
office. In this case, the home or office computer makes a phone call to a computer on the boundary of
the remote network. The telephone company provides the connection, or circuit, that is used for the
duration of the call. After data is transmitted, the line is disconnected, just as it is for an ordinary voice
call. If a company wants to transmit data at any time without having to connect and disconnect the line
each time, the company can rent a permanent line or circuit from the common carrier. These leased
lines are constantly available and operate at higher speeds than temporary dialup connections.
In both temporary and permanent cases, computers that connect over wide area circuits must use
special devices called modems or channel service unit/data service unit (CSU/DSU) at each end of the
connection.
Note: Channel service unit /data service unit (CSU/DSU) is a pair of
communications devices that connect an in-house line to an external digital circuit (T1,
DDS, and so on). It is similar to a modem, but connects a digital circuit rather than an
analog one.
Modem devices are required because the electrical signals that carry digital computer data must be
transformed, or modulated, before they can be transmitted on telephone lines. On the transmitting end
of the connection, a modem (modulator-demodulator) transforms computer signals into phone signals.
On the receiving end, the transformation is done from phone to computer signals. The modem is only
one means of connecting computers or similar devices so they can communicate over long distances.
Other much faster technologies include ISDN, Frame Relay, and ATM.
In general, WANs typically connect fewer computers than LANs and normally operate at lower speeds
than LANs. WANs, however, provide the means for connecting single computers and many LANs
over large distances. Thus, they enable networks to span whole countries, and even the entire globe.
Circuit-Switched versus Packet-Switched Networks
The public telephone system, sometimes referred to as plain old telephone service (POTS), is a circuit-
switched communications network. When a telephone call is placed in this type of network, only one
physical path is used between the telephones for the duration of that call. This pathway, called a
circuit, is maintained for the exclusive use of the call, until the connection is ended and the telephone
is hung up.
If the same number is called tomorrow from the same location as the call from today, the path would
probably not be the same. The circuit is created by a series of switches that use currently available
network paths to set up the call end-to-end. This explains why callers can get a clear connection one
day, and noise and static on another. This demonstrates that a circuit-switched connection is end-to-
end or point-to-point.
Conversely, in a packet-switched network, each individual packet of data can take a different route and
no dedicated pathway or circuit is established. When transferring data, such as a word processing file,
from one computer to another using a packet-switched network, each individual packet (bundle of
data) can take a different route. Although it all arrives at the same destination, it does not all travel the
same path to get there. Internet traffic uses packet-switching technology.
The difference between circuit and packet switching can be compared to the different ways in which a
large group of people traveling from Kisumu to Mombasa (two cities in Kenya) can reach their
destination. For example, circuit switching is similar to loading the entire group on a bus, a train, or an
airplane. The route is plotted out, and the whole group travels over that same route.
Packet switching is comparable to people travelling in their own automobiles. The group is broken
down into individual components just as the data communication is broken into packets. Some
travelers can take interstate highways, and others can use back roads. Some can drive straight through,
and others can take a more roundabout path. Eventually, they all end up at the same destination. The
group is put back together, just as packets are reassembled at the endpoint of the communication.
Satellite
transponder
Dish
Dish
22,300 miles
Half-duplex Connection: A pathway that permits data transmission in either direction, one
direction at a time.
A half duplex channel can send and receive, but not at the same time. Its like a one-lane
bridge where two way traffic must give way in order to cross. Only one end transmits at a
time, the other end receives. An example is CB radio.
Full-duplex Connection: A pathway that has
a capability of transmission in both
directions at one time.
Data can travel in both directions
simultaneously in full-duplex data
communication. There is no need to switch
from transmit to receive mode like in half
duplex. Its like a two lane bridge on a two-
lane highway. An example is a telephone or
your local area network
1.6 Summary
In this lesson we have learnt:
What computer networks are.
Some history of networking.
About the goals and benefits of networking.
About different types of networks.
About the different transmission media.
The different flows of data transmission.
1.7 Suggestion for Further Reading
The learner can read further on the basics of computer networks. The various building blocks
of the network should be reviewed..