Computer Networks
Computer Networks
Computer Networks involve the study of how computers and other devices communicate with each
other. A computer network is a collection of interconnected devices (e.g., computers, routers,
switches, smartphones) that share data and resources. The internet itself is the largest and most
well-known example of a computer network.
2. Network Topologies
3. Network Protocols
5. Network Security
Network devices are the physical components used to connect and manage networks.
Key Devices:
Router: Directs data between different networks and connects them to the internet. It acts
like a traffic cop, ensuring data packets reach their correct destination.
Switch: Connects devices within a single network (e.g., computers in an office). It uses MAC
addresses to forward data only to the intended device.
Hub: A basic device that broadcasts data to all devices in the network (less efficient than a
switch).
Modem: Converts digital data from a computer to analog signals for transmission over
telephone lines (modulation) and vice versa (demodulation).
Access Point (AP): Allows wireless devices to connect to a wired network using Wi-Fi.
Example:
In a home network, a router connects your devices (laptops, phones) to the internet, while a switch
might connect multiple devices to the same local network.
2. Network Topologies
Network topology refers to the layout or arrangement of devices in a network. It determines how
devices are interconnected and communicate.
Common Topologies:
Bus Topology: All devices are connected to a single central cable (bus). It’s simple but prone
to failures if the main cable breaks.
Star Topology: Devices are connected to a central hub or switch. If one device fails, the rest
of the network remains unaffected.
Ring Topology: Devices are connected in a circular loop. Data travels in one direction, but a
single point of failure can disrupt the entire network.
Mesh Topology: Every device is connected to every other device. It provides high reliability
but is expensive to implement.
Hybrid Topology: Combines two or more different topologies for greater flexibility.
Example:
In an office network, a star topology is commonly used, where each computer connects to a central
switch.
3. Network Protocols
Protocols are rules that define how data is transmitted and received over a network. They ensure
that devices can communicate effectively.
Key Protocols:
Transmission Control Protocol (TCP): Ensures reliable, ordered delivery of data packets. It is
connection-oriented, meaning it establishes a connection before sending data.
Internet Protocol (IP): Handles addressing and routing of data packets across the network. IP
addresses uniquely identify devices on a network.
Hypertext Transfer Protocol (HTTP/HTTPS): Used for transferring web pages on the internet.
HTTPS is the secure version, using encryption.
Example:
When you visit a website, your browser uses HTTP to request the web page from the server, while
TCP ensures the data is delivered reliably.
Network models provide a framework for understanding how data is transmitted across a network.
The OSI Model and TCP/IP Model are the most widely used.
2. Data Link Layer: Ensures error-free transmission between adjacent devices (e.g., MAC
addresses).
3. Network Layer: Handles logical addressing and routing of data (e.g., IP addresses).
6. Presentation Layer: Formats and encrypts data for the application layer.
7. Application Layer: Provides network services directly to the user (e.g., HTTP, FTP).
1. Network Interface: Combines physical and data link layers (handles hardware connections).
4. Application: Corresponds to the OSI session, presentation, and application layers (e.g., HTTP,
SMTP).
Example:
When you send an email, the data moves through the layers of the TCP/IP model: from the
application layer (SMTP protocol) down to the network interface layer, and then back up on the
recipient’s side.
5. Network Security
Network security involves protecting data during transmission and preventing unauthorized access.
Key Concepts:
Virtual Private Network (VPN): Encrypts the internet connection, making data transfer
secure even on public networks.
Intrusion Detection Systems (IDS): Monitors network traffic for suspicious activity.
Example:
When you log into your bank account online, HTTPS encryption and multi-factor authentication help
protect your data from cybercriminals.
Types of Computer Networks
1. Local Area Network (LAN): Covers a small geographical area (e.g., a home or office). It uses
high-speed connections and provides fast data transfer rates.
2. Wide Area Network (WAN): Covers a large geographical area (e.g., the internet). It connects
multiple LANs using technologies like fiber optics.
3. Metropolitan Area Network (MAN): Spans a city or metropolitan area (e.g., a network
covering a university campus).
4. Personal Area Network (PAN): Connects devices within a short range (e.g., Bluetooth
connection between a smartphone and a smartwatch).
5. Virtual Private Network (VPN): Extends a private network across a public network, providing
secure data transfer.
1. Network Setup: The office uses a star topology, where each computer connects to a central
switch. The switch is connected to a router, which provides internet access.
2. Data Transfer: An employee sends an email. The data packet is routed through the switch,
sent to the router, and then directed to the destination using the IP address.
3. Security: The network uses a firewall to monitor traffic and prevent unauthorized access.
4. Protocol Handling: TCP ensures the email data is delivered correctly, while SMTP handles the
email transfer.
5. Resource Sharing: Employees can access a shared printer or server connected to the same
LAN.
1. Foundation of the Internet: Understanding networks is essential for working with any
internet-based technology.
4. Career Opportunities: Essential for roles in network administration, cybersecurity, and cloud
computing.