top of page
Writer's pictureSharon Rajendra Manmothe

Computer Network Notes for Computer Science

Updated: 4 days ago

Welcome to your one-stop shop for mastering Computer Networks!

Created specifically for Computer Science students interested in exploring the captivating realm of interconnected devices, this blog will assist you in understanding the fundamental concepts of computer networks, whether you are a novice or seeking to enhance your existing knowledge.


During our exploration, we will examine the fundamental components of networks, investigate communication protocols, and analyze various network types and applications. Throughout this journey, we will offer concise explanations, illustrative diagrams, and respond to any inquiries you may have.

So, grab your virtual cables and get ready to explore the exciting world of computer networks!

What is computer network?


A computer network is essentially a collection of computers and devices that are connected together enabling them to communicate and share resources. These resources can be anything from data files and printers to software applications and the internet.

Here's a breakdown of the key aspects of a computer network:


Computer Network
Computer Network
  • Nodes: These are the individual devices on the network, which can include computers, printers, servers, tablets, smartphones, and more. Each node is identified by a unique network address.

  • Connections: Nodes are linked together through physical connections like cables or wirelessly.

  • Communication Protocols:  These are the rules that govern how data is transmitted and received over the network. Common protocols include TCP/IP, HTTP, and FTP.

  • Network Topology: This refers to the way nodes are arranged on the network, such as in a star, bus, or mesh pattern.


Computer networks can vary in size and complexity. A small home network might just have a few devices connected together, while a large enterprise network could have thousands of devices spread out over a wide geographic area.

Here are some of the benefits of using computer networks:


  • Resource Sharing:  Networks allow devices to share resources like printers, storage, and software applications. This can save money and improve efficiency.


  • Communication: Networks make it easy for people to communicate with each other, regardless of their location. This can be done through email, instant messaging, video conferencing, and other applications.


  • Centralized Management: Networks can be centrally managed, making it easier to add, remove, and troubleshoot devices.


  • Access to the Internet: Networks provide access to the vast resources of the internet.


List the characteristics of data communication


There are four main characteristics that define an effective data communication system:

  1. Delivery: The system must ensure that data reaches the intended recipient accurately. This relies on addressing mechanisms like MAC and IP addresses to route data packets to the correct destination device.

  2. Accuracy: The data received must be an exact replica of the data sent. Errors introduced during transmission can corrupt the data, rendering it unusable. Data communication systems employ error detection and correction techniques to maintain accuracy.

  3. Timeliness: For certain types of data, like streaming video or real-time chat, prompt delivery is crucial. The system should deliver data within a specific timeframe to maintain its usefulness. This is often referred to as low latency.

  4. Jitter: In data streams, jitter refers to variations in the arrival time of individual data packets. This can be problematic for real-time applications like video conferencing, where inconsistent data flow can cause disruptions. Measures are taken to minimize jitter in data communication systems.




List the components of a data communication system


Identify the five components of a data communication system.



  1. Message: The information being communicated. This data can be in various formats, including text, numbers, images, audio, or video.  

  2. Sender: The device that originates the data transmission. This could be a computer, smartphone, tablet, or any device capable of generating data.

  3. Receiver: The device that receives the transmitted data. Similar to the sender, the receiver can be any device equipped to process the incoming data.

  4. Transmission Medium: The physical pathway through which the data travels from sender to receiver. Common transmission mediums include cables (coaxial, twisted pair, fiber optic) and wireless signals (radio waves, microwaves)

  5. Protocol: A set of rules that govern how data is formatted, transmitted, and received. Protocols ensure compatibility between sender and receiver devices and enable reliable data communication.  A widely used protocol is the TCP/IP.



List the types of data flow

In the context of data flow direction between two devices on a communication channel, here's how simplex, half-duplex, and full-duplex differ:

Simplex:


  • Data Flow: Uni-directional

  • Communication Analogy:  A radio broadcast - Information is sent from one station (transmitter) to many receivers, but receivers cannot transmit data back to the original source.


Half-Duplex:


  • Data Flow: Bi-directional, but one at a time

  • Communication Analogy:  A walkie-talkie - Two people can communicate, but only one person can speak at a time. The other person needs to wait for their turn to transmit.

Full-Duplex:

  • Data Flow: Bi-directional, simultaneously

  • Communication Analogy:  A telephone conversation - Both people can talk and listen at the same time.


What are some of the factors that determine whether a communication system is LAN for WAN


LAN (Local Area Network):

  • Scope: Covers a limited geographical area, typically a single building, home, office, or school campus.

  • Reach: Connects devices in close proximity.

  • Speed: Offers high data transfer rates (usually in gigabits per second - Gbps). This is because the distances involved are short, and the signal strength remains strong.

  • Security: Generally more secure since it's a private network with controlled access.

  • Cost: Relatively inexpensive to set up and maintain due to the shorter distances and simpler technologies involved.

  • Examples: The Wi-Fi network in your house connecting your laptop, smartphone, and printer, or the wired network connecting computers in an office building.

WAN (Wide Area Network):

  • Scope: Spans a large geographical area, covering cities, states, countries, or even the entire globe.

  • Reach: Connects devices separated by significant distances.

  • Speed: Data transfer rates are generally slower than LANs (often in megabits per second - Mbps) due to longer distances and potential signal degradation.

  • Security: More complex to secure due to its wider reach and potentially less controlled access.

  • Cost: Setting up and maintaining a WAN can be expensive due to the infrastructure required to connect geographically distant locations.

  • Examples: The internet itself, a corporate network connecting offices in different cities, or a virtual private network (VPN) that allows secure remote access to a company network


What is internet ?

The internet is a massive network of interconnected computer networks that allows global communication and information sharing. It's like a giant web where billions of computers and electronic devices are linked together. Here's a breakdown of its key features:

  • Network of Networks: The internet isn't a single physical entity, but rather a collection of interconnected networks. These networks can be private, public, academic, business, and government owned, all working together to exchange data.

  • Communication Protocols:  Devices on the internet communicate using a common language called protocols. The most common protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol), which ensures data is formatted, transmitted, and received accurately.

  • Global Reach:  The internet connects people and devices across the world. You can access information and communicate with anyone anywhere on the planet, provided they also have an internet connection.

  • Vast Information Resources: The internet offers a vast amount of information on virtually any topic imaginable. You can find educational resources, news articles, entertainment content, and much more.

  • Services: The internet supports a wide range of services beyond just browsing websites. These include email, instant messaging, video conferencing, online shopping, banking, social media, and many more.



When we use local telephone to talk to a friend, are we using circuit switthed network or packet switch network?


You are using a circuit switched network when you use a local telephone to talk to a friend.

Here's why:

  • Dedicated Connection: In a traditional phone call, a dedicated communication path is established between your phone and your friend's phone. This dedicated circuit is maintained for the entire duration of the call, ensuring a constant and uninterrupted connection.

  • Real-time Communication: Voice calls require real-time transmission, where the flow of voice data needs to be continuous and consistent. Circuit switching is well-suited for this because it provides a guaranteed path for the entire conversation.

  • Older Technology: Traditional phone networks were built on circuit switching technology, which has been around for a long time.

Packet switching, on the other hand, is more commonly used for data transmission over networks like the internet. It breaks down data into packets, which are then sent over the network and reassembled at the destination. While this can be efficient for data transfer, it wouldn't be ideal for voice calls due to the potential for delays and disruptions in the data flow.


What are two types of transmission technologies?

There are two main ways to categorize transmission technologies: by the direction of data flow and by the physical medium used to transmit the data.

By Direction of Data Flow:

  1. Point-to-Point: This is a common type of transmission technology where data travels between two specific devices or endpoints. It's like having a private conversation between two people. Examples include wired connections between computers and routers, or dedicated leased lines used by businesses.

2. Broadcast: In broadcast transmission, data is sent from a single source to multiple receivers. It's similar to a radio or television broadcast where one station transmits content that can be received by anyone with a compatible device within the broadcast range. Examples include radio and television signals, Wi-Fi networks (where a router broadcasts a signal that multiple devices can connect to), and satellite broadcasts.

By Physical Medium:

  1. Guided Media: This type of transmission technology uses a physical cable or structure to guide the data signals. Common examples include:

  2. Coaxial Cable: Used for cable TV and internet connections.

  3. Twisted Pair Cable: Used for telephone lines and Ethernet networks.

  4. Fiber Optic Cable: Uses light pulses to transmit data and offers the highest bandwidth and speed among these options.

  5. Unguided Media: In unguided media, data travels through the air or space without a physical cable. Examples include:

  6. Radio Waves: Used for wireless communication like Wi-Fi, Bluetooth, and cellular networks.

  7. Microwaves: Used for long-distance data transmission and satellite communication.

  8. Infrared (IR): Used for short-range data transmission in devices like remote controls.

These are two common ways to classify transmission technologies. The specific type of technology used depends on factors like the application, required speed, distance, and cost.


Network Topologies: Bus, Star, Ring, Mesh, Hybrid

Network topology refers to the arrangement or layout of network devices and how they are interconnected. Different topologies have their advantages and disadvantages depending on the size, structure, and requirements of the network. Here’s a detailed explanation of the most common topologies:

1. Bus Topology

Definition:In a bus topology, all devices (computers, printers, etc.) are connected to a single central cable (called the bus or backbone). Data sent by any device travels along the bus in both directions, and all devices receive the data, but only the intended recipient accepts it.

Key Characteristics:

  • Simple and easy to set up.

  • Requires less cabling compared to other topologies.

  • Terminators are placed at both ends of the bus to prevent signal reflection.

Advantages:

  • Cost-effective for small networks.

  • Easy to extend by adding more devices to the bus.

  • Requires less cabling than star topology.

Disadvantages:

  • If the central bus cable fails, the entire network shuts down.

  • Performance degrades as more devices are added due to data collisions.

  • Troubleshooting is difficult because it's hard to pinpoint failures.

Usage:

  • Ideal for small networks or temporary setups where cost is a major factor.


2. Star Topology

Definition:In a star topology, all devices are connected to a central hub or switch. The hub acts as a repeater, and all communication between devices passes through the hub.

Key Characteristics:

  • The central hub controls all network activity.

  • If one cable connecting a device to the hub fails, only that device is affected.

Advantages:

  • Easy to install and manage.

  • Centralized management makes troubleshooting simpler.

  • Fault-tolerant to a single device failure (as long as the hub/switch is operational).

  • Scalability is easy by adding more devices.

Disadvantages:

  • The entire network depends on the hub/switch; if it fails, the entire network goes down.

  • Requires more cabling than a bus topology.

  • More expensive due to the cost of the hub or switch.

Usage:

  • Commonly used in home and office networks, as it supports good performance and reliability.

3. Ring Topology

Definition:In a ring topology, each device is connected to exactly two other devices, forming a closed loop. Data travels in one direction (unidirectional) or in both directions (bidirectional) around the ring, and each device has exactly two neighbors.

Key Characteristics:

  • Data moves in a circular fashion, passing through each device until it reaches the destination.

  • Often uses a token-passing protocol to prevent data collisions.

Advantages:

  • Data travels at a predictable speed since each device retransmits the data.

  • No collisions because only one device can send data at a time with token-passing.

Disadvantages:

  • If one device or connection fails, the entire network can fail (unless a dual-ring is used).

  • Troubleshooting can be difficult, especially in larger rings.

  • Slower than star topology as data must pass through multiple devices.

Usage:

  • Previously used in Token Ring networks, and still used in some MAN and WAN setups.

4. Mesh Topology

Definition:In a mesh topology, each device is connected to every other device in the network. This allows data to travel along multiple paths, providing redundancy and improving reliability.

Key Characteristics:

  • There are two types of mesh topology:

    • Full Mesh: Every device is connected to every other device.

    • Partial Mesh: Only some devices are connected to all others, while others are connected to a subset.

Advantages:

  • Extremely reliable, as multiple paths ensure that if one connection fails, data can still travel along another path.

  • No central point of failure.

  • High security, as data can take different paths, making it harder to intercept.

Disadvantages:

  • Expensive to implement due to the large number of connections and cabling required.

  • Complex installation and management.

  • Difficult to scale for very large networks.

Usage:

  • Used in critical environments where reliability is a priority, such as in military, industrial, and financial systems.

5. Hybrid Topology

Definition:A hybrid topology is a combination of two or more different types of network topologies. For example, a star-bus topology combines elements of both star and bus topologies, taking advantage of the benefits of each.

Key Characteristics:

  • Customizable to meet the needs of specific environments.

  • Can inherit both the advantages and disadvantages of the topologies used.

Advantages:

  • Flexible and scalable, as you can mix and match topologies based on the specific requirements of different network segments.

  • Can provide better performance, fault tolerance, and scalability than a single topology.

Disadvantages:

  • Complex to design and manage.

  • Expensive due to the need for different types of devices, cabling, and management tools.

Usage:

  • Widely used in large enterprises, campuses, or environments where different network needs exist in different segments.

Summary Table of Topologies:

Topology

Cost

Reliability

Scalability

Complexity

Fault Tolerance

Bus

Low

Low

Low

Simple

Low

Star

Medium

High

High

Medium

Medium

Ring

Medium

Medium

Medium

Medium

Low

Mesh

High

Very High

Low

Complex

Very High

Hybrid

High

High

High

Complex

Medium to High

Each topology has its strengths and weaknesses, and the choice depends on the specific network requirements like size, cost, fault tolerance, and management complexity.


list the uses of network in business appliation

Businesses rely heavily on networks to operate efficiently and securely. Here are some of the key uses of networks in business applications:

Resource Sharing:

  • File Sharing: Networks enable employees to share documents, spreadsheets, presentations, and other digital files easily. This eliminates the need for physical copies or emailing large files constantly.

  • Printers and Peripherals:  Multiple users can access and share printers, scanners, or other peripheral devices on the network, reducing costs and improving convenience.

  • Software Applications:  Certain business software applications can be installed on a central server and accessed by authorized users across the network, eliminating the need for individual installations on each device.

Communication and Collaboration:

  • Email:  Email remains a critical tool for business communication, allowing employees to exchange messages and documents internally and with clients and partners.

  • Instant Messaging (IM):  IM platforms facilitate real-time communication among team members, promoting quick discussions and efficient collaboration.

  • Video Conferencing:  Networks enable video conferencing, allowing geographically dispersed teams to hold meetings virtually, saving time and travel costs.

Centralized Management and Security:

  • Remote Access: Employees can securely access company resources like files and applications remotely through the network, facilitating flexible work arrangements.

  • Data Backup and Recovery:  Networks allow for centralized data backup on servers, ensuring business continuity in case of device failures or security incidents.

  • Network Security:  Business networks can be equipped with firewalls, intrusion detection systems, and other security measures to protect sensitive data and prevent unauthorized access.

Business Operations and Customer Service:

  • E-commerce:  Businesses can set up online stores to sell products and services directly to customers over the network.

  • Customer Relationship Management (CRM):   CRM systems running on networks help businesses track customer interactions, manage sales leads, and improve customer service.

  • Supply Chain Management:  Networks facilitate communication and data exchange between businesses and their suppliers, streamlining supply chain management.

Additionally, networks play a crucial role in:

  • Cloud Computing: Businesses can access and use software applications and other resources hosted on cloud platforms over the network.

  • Internet of Things (IoT): Networks connect various IoT devices used in businesses, enabling data collection, automation, and remote monitoring of operations.



list the uses of network in business application

Here are some of the ways networks are used in home applications:

Internet Access:

  • Browsing the Web: Networks provide access to the vast resources of the internet, allowing you to browse websites for information, entertainment, news, and online services.

  • Email and Communication: You can stay connected with family, friends, and colleagues through email, instant messaging, and video chat applications.

  • Streaming Services: Enjoy movies, TV shows, music, and other streaming content through services like Netflix, Hulu, or Spotify.

Device Connectivity and Sharing:

  • Wireless Networking (Wi-Fi): Connect multiple devices like laptops, smartphones, tablets, and smart speakers to the internet and each other wirelessly for sharing and access.

  • File Sharing: Easily share documents, photos, music, and videos between devices on the network, eliminating the need for physical storage devices or emailing large files.

  • Printers and Peripherals: Share printers, scanners, or other peripherals among various devices on the network, reducing costs and improving convenience.

Smart Home Integration:

  • Smart Home Devices:  Networks connect and enable control of smart home devices like thermostats, lights, doorbells, and security cameras, allowing for automation and remote monitoring.

  • Home Entertainment: Stream music, movies, and shows to smart TVs or entertainment systems throughout the house using network connectivity.

  • Gaming: Online gaming consoles connect to the network for multiplayer gaming experiences.

Additional Uses:

  • Remote Work and Learning: Networks facilitate remote work and learning by allowing access to work files, applications, and online learning platforms.

  • Online Banking and Bill Pay: Manage your finances conveniently by accessing online banking services and making bill payments securely through the network.

  • Social Media: Connect and share with friends and family on social media platforms using your home network.

By utilizing these network applications, your home can become more connected, convenient, and entertaining.



State the advantages of digital representation of data

Digital representation of data offers several advantages over traditional analog methods:

  • Accuracy: Digital data is less prone to errors and noise compared to analog data. Analog signals can be degraded by interference or distortion during transmission, leading to inaccuracies. Digital data, on the other hand, is represented by discrete bits (0s and 1s) which are less susceptible to such issues.

  • Reliability: Due to its accuracy, digital data can be easily duplicated and stored perfectly.  Each copy of the data remains identical to the original, ensuring reliable transmission and storage.

  • Efficiency: Digital data can be compressed efficiently.  Since it consists of a series of 0s and 1s, techniques can be used to remove redundant information and reduce the overall data size for storage or transmission.

  • Processing and Manipulation: Digital data is easier to process and manipulate by computers.  Algorithms can be applied to analyze, modify, and sort digital data with high precision.

  • Versatility: Digital data can represent a wide range of information types.  Text, audio, video, images, and even software can all be encoded in digital format, making it a universal language for storing and transmitting information.

  • Security:  Digital data can be encrypted to ensure privacy and prevent unauthorized access.  Encryption scrambles the data using a key, making it unreadable to anyone without the decryption key.

  • Cost-Effectiveness:  Digital storage and transmission technologies are generally more cost-effective than analog methods.  Data can be stored on compact devices like flash drives and transmitted over efficient networks.

Overall, digital representation of data has revolutionized information storage, processing, and communication.  Its accuracy, reliability, and versatility have made it the foundation for modern computing and information technology.


List the network Criteria

Here are the key network criteria that ensure an effective and efficient network:

  1. Performance: This refers to the overall speed, responsiveness, and capacity of the network. It's measured by factors like:

  2. Throughput: The amount of data that can be transmitted over the network in a given amount of time, typically measured in Mbps (megabits per second) or Gbps (gigabits per second).

  3. Latency: The time it takes for data to travel from one point on the network to another, often measured in milliseconds (ms). Lower latency is desirable for real-time applications like video conferencing or online gaming.

  4. Bandwidth: The maximum amount of data that can flow through a network connection at a given time, similar to the width of a highway. Higher bandwidth allows for faster data transfer.

  5. Reliability: This refers to the network's ability to consistently deliver data accurately and without failures. It's measured by:

  6. Uptime: The percentage of time the network is operational and available for use.

  7. Downtime: The amount of time the network is unavailable due to outages or errors.

  8. Fault Tolerance: The network's ability to withstand and recover from failures without significant data loss or disruption to users.

  9. Security: This refers to protecting the network from unauthorized access, data breaches, and malicious attacks.  Network security measures include:

  10. Authentication: Verifying the identity of users and devices attempting to access the network.

  11. Authorization: Controlling access to network resources based on user permissions.

  12. Encryption:  Scrambling data to make it unreadable to anyone without the decryption key.

  13. Firewalls: Security systems that monitor and filter incoming and outgoing network traffic to block unauthorized access or malicious content.

  14. Scalability: This refers to the network's ability to adapt and grow to accommodate increasing numbers of users, devices, and data traffic. A scalable network can be easily expanded to meet future needs without significant performance degradation.

  15. Manageability: This refers to the ease with which the network can be administered, monitored, and maintained.  A well-managed network allows for efficient troubleshooting, performance optimization, and security updates.

The importance of each criterion can vary depending on the specific network application. For example, a network designed for real-time video conferencing will prioritize low latency, while a network for storing and sharing files might prioritize high bandwidth and storage capacity.








Recent Posts

See All

コメント


bottom of page