SlideShare a Scribd company logo
Note 1
Introduction to Computer Networks
Course Title: Computer Networks Theory
Course Code: CSE 317
Submitted To
Pranab Bandhu Nath
Senior Lecturer, Department Of CSE
City University, Dhaka
Submitted By
Hasibul Islam Nirob
ID: 182482526
BSc in CSE (Day)
Batch: 49th
What is Computer Network?
A computer network is any group of interconnected computing devices capable of sending
or receiving data. You can establish a network connection using either cable or wireless
media.
Advantages of computer networking:
File sharing - you can easily share data between different users, or access it remotely if
you keep it on other connected devices.
Resource sharing - using network-connected peripheral devices like printers, scanners
and copiers, or sharing software between multiple users, saves money.
Sharing a single internet connection - it is cost-efficient and can help protect your
systems if you properly secure the network.
Increasing storage capacity - you can access files and multimedia, such as images and
music, which you store remotely on other machines or network-attached storage
devices.
Goals of Computer Network:
Resource sharing: is the main objective of the computer network. The goal is to provide
all the program, date and hardware is available to everyone on the network without
regard to the physical location of the resource and the users.
Reliability: The second objective is to provide the high Reliability. It is achieved by
replicating the files on two or more machines, so in case of unavailability (due to fail of
hardware) the other copies can be used.
Scalability: Computer network have provided means to increase system performance as
the work load increases (load balancing). In the days of mainframe when the system
was full it was to replace with the other large mainframe computer, usually at and
expensive rate not convenience for user.
Performance: Another closely related goal is to increase the systems performance as
the work load increases by just adding more processors. With central mainframes, when
the system is full, it must be replaced by a larger one, usually at great expense and with
even greater disruption to the users.
Security: Only authorized user can access resource in a computer network. Users are
authenticated by their username and password. Hence it is not possible to access the
data without proper account. This increases security.
Application of Computer Networks
• Business Applications
• Communication Medium
• e-commerce
• Home Applications
• Electronic commerce
• Mobile Users
Network Hardware & Software
There are three components of Computer Network
1. Hardware Equipment
2. Software
3. Cables and Connectors
Hardware Equipment’s
Network Interface Card (NIC):
The interface card which is used to connect one device to another is called Network
interface card or NIC. Nowadays, it is attached to all computer’s motherboard. It has
a unique 48-bit code. This code is called MAC Address.
Modem:
The word Modem is sort form of the words Modulator and Demodulator. Modulator
converts digital signal to analog signal and Demodulator converts analog signal to
Digital signal.
Server:
A server is a computer that provides data to other computers. It may serve data to
systems on a local area network (LAN) or a wide area network (WAN) over the Internet.
Client:
A client is any device that communicates with a server. Businesses have clients
and servers have clients. In both instances, there exists a one-to-many relationship. Just
like a business may have several clients, a server can communicate with multiple clients.
In computer networking, this is called the client-server model.
Peers:
On the same level or providing the same function. In networking, a peer is a node that
provides the same functionality as another. Peer to Peer." In a P2P network, the "peers"
are computer systems which are connected to each other via the Internet. Files can be
shared directly between systems on the network without the need of a central server. In
other words, each computer on a P2P network becomes a file server as well as a client.
Transmission:
Data transmission is the process of sending digital or analog data over a communication
medium to one or more computing, network, communication or electronic devices. It
enables the transfer and communication of devices in a point-to-point, point-to-
multipoint and multipoint-to-multipoint environment
Medium:
A medium is a third-party or element through which a message is communicated. This
seems to apply to information technology as well as to seances. In information
technology, a medium can be:
1. A physical transmission medium such as optical fiber
2. A presentation medium (and thus the terms multimedia and advertising
media)
Router: Network routing is the process of selecting a path across one or more networks.
The principles of routing can apply to any type of network, from telephone networks to
public transportation. In packet-switching networks, such as the Internet, routing selects
the paths for Internet Protocol (IP) packets to travel from their origin to their
destination.
Bridge:
A bridge operates at data link layer. A bridge is a repeater, with add on the functionality
of filtering content by reading the MAC addresses of source and destination. It is also
used for interconnecting two LANs working on the same protocol. It has a single input
and single output port, thus making it a 2-port device.
Types of Bridges
Transparent Bridges: These are the bridge in which the stations are completely
unaware of the bridge’s existence i.e., whether or not a bridge is added or
deleted from the network, reconfiguration of the stations is unnecessary. These
bridges make use of two processes i.e., bridge forwarding and bridge learning.
Source Routing Bridges: In these bridges, routing operation is performed by
source station and the frame specifies which route to follow. The host can
discover frame by sending a special frame called discovery frame, which spreads
through the entire network using all possible paths to destination.
Hub:
A hub is basically a multiport repeater. A hub connects multiple wires coming from
different branches, for example, the connector in star topology which connects different
stations. Hubs cannot filter data, so data packets are sent to all connected devices
Types of Hub
Active Hub: These are the hubs which have their own power supply and can
clean, boost, and relay the signal along with the network. It serves both as a
repeater as well as wiring center. These are used to extend the maximum
distance between nodes.
Passive Hub: These are the hubs which collect wiring from nodes and power
supply from active hub. These hubs relay signals onto the network without
cleaning and boosting them and can’t be used to extend the distance between
nodes.
Intelligent Hub: It work like active hubs and include remote management
capabilities. They also provide flexible data rates to network devices. It also
enables an administrator to monitor the traffic passing through the hub and to
configure each port in the hub.
Switch:
Switch is a network device that connects other devices to ethernet networks
through twisted pair cables. It uses packet switching technique to receive,
store and forward data packets on the network. The switch maintains a list of
network addresses of all the devices connected to it
Gateway:
Gateway is a network device used to connect two or more dissimilar networks. In
networking, networks that use different protocols are dissimilar networks. A
gateway usually is a computer with multiple NICs connected to different networks.
A gateway can also be configured completely using software.
Wi-Fi Card:
Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network. Wi-Fi card is a card used to connect any device to the local
network wirelessly. The physical area of the network which provides internet access
through Wi-Fi is called Wi-Fi hotspot.
Repeater: A repeater operates at the physical layer. Its job is to regenerate the signal
over the same network before the signal becomes too weak or corrupted so as to
extend the length to which the signal can be transmitted over the same network. An
important point to be noted about repeaters is that they do not amplify the signal.
When the signal becomes weak, they copy the signal bit by bit and regenerate it at the
original strength. It is a 2-port device.
Software:
• Network Operating System,
• Protocols Switches (TCP/IP, OSI)
• Client Software
Cables and Connectors:
• Twisted pair cable
• Coaxial cable
• Fiber-optic cable
References
https://whatis.techtarget.com/definition/medium
https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:connecting-networks/a/computer-networks-overview
https://www.guru99.com/basic-computer-network.html#1
https://www.nibusinessinfo.co.uk/content/benefits-computer-
networks#:~:text=Advantages%20of%20computer%20networking&text=Resource%20sharing%
20%2D%20using%20network%2Dconnected,you%20properly%20secure%20the%20network.
https://www.techmesto.com/computer-networks/
https://www.ques10.com/p/9412/what-is-a-network-what-are-its-goals-and-applica-1/
https://techterms.com/definition/server
https://techterms.com/definition/nic
https://techterms.com/definition/client
https://www.pcmag.com/encyclopedia/term/peer
https://techterms.com/definition/p2p
https://www.techopedia.com/definition/9756/data-transmission
https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router-
gateways/
https://en.wikipedia.org/wiki/Gateway_%28telecommunications%29
https://en.wikipedia.org/wiki/Router_%28computing%29
https://en.wikipedia.org/wiki/Network_switch

More Related Content

What's hot

Computer Networks
Computer NetworksComputer Networks
Computer Networks
Sujon Kumar Dey
 
Computer network
Computer networkComputer network
Computer network
SharminSultana103
 
Computer communication
Computer communicationComputer communication
Computer communication
Mukul Kumar
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
jessandy
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
mvenkat2016
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
Md Saylab
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
eVidhya
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
ritajindal2
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
Abdul-Hamid Donde
 
Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & Connectors
Shamima Akther
 
Note 01
Note 01Note 01
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
Kavitha Dhanesh
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
Midhun Menon
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
marwa_ma
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
Jafar Nesargi
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
SSGMCE SHEGAON
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Shamima Akther
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
Dhivya T
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
Mujeeb Ahmad
 
Note -02
Note -02Note -02
Note -02
MejbahUddinRafi
 

What's hot (20)

Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Computer communication and internet
Computer communication and internetComputer communication and internet
Computer communication and internet
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Data com chapter 1 introduction
Data com chapter 1   introductionData com chapter 1   introduction
Data com chapter 1 introduction
 
Networking Cables & Connectors
Networking Cables & ConnectorsNetworking Cables & Connectors
Networking Cables & Connectors
 
Note 01
Note 01Note 01
Note 01
 
Networking online assignment
Networking online assignmentNetworking online assignment
Networking online assignment
 
types of computer networks, protocols and standards
types of computer networks, protocols and standardstypes of computer networks, protocols and standards
types of computer networks, protocols and standards
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Computer Networking concepts
Computer Networking conceptsComputer Networking concepts
Computer Networking concepts
 
Note -02
Note -02Note -02
Note -02
 

Similar to Note: Introduction to Computer Networks

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
MdAlifKhanRifat
 
Computer networks
Computer networksComputer networks
Computer networks
MDHASNAIN23
 
Computer Network Theory Part1
 Computer Network Theory Part1 Computer Network Theory Part1
Computer Network Theory Part1
NishatTasnimAli
 
1834902548 nafisa raihana mubasshira (1)
1834902548 nafisa raihana mubasshira (1)1834902548 nafisa raihana mubasshira (1)
1834902548 nafisa raihana mubasshira (1)
nafisarayhana1
 
Computer network
Computer networkComputer network
Computer network
NajmulIslam38
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
AlidHasan4
 
Assignment1
Assignment1Assignment1
Assignment1
NishatTasnimAli
 
Computer network
Computer networkComputer network
Computer network
Md Saylab
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
Md. Asifur Rahman Siddiki
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
Khondoker Sadia
 
Dc assignment
Dc assignmentDc assignment
Dc assignment
Manaly Khan
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
Rameesh Paul
 
Class Note
Class NoteClass Note
Class Note
AK IJ
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
shubhangisonawane6
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
Computer network note
Computer network noteComputer network note
Computer network note
MdAnikKhan
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
Pankaj Gautam
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
LemuelCondes4
 
Note1
Note1Note1
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 

Similar to Note: Introduction to Computer Networks (20)

Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer Network Theory Part1
 Computer Network Theory Part1 Computer Network Theory Part1
Computer Network Theory Part1
 
1834902548 nafisa raihana mubasshira (1)
1834902548 nafisa raihana mubasshira (1)1834902548 nafisa raihana mubasshira (1)
1834902548 nafisa raihana mubasshira (1)
 
Computer network
Computer networkComputer network
Computer network
 
Introduction of computer networks
Introduction of computer networksIntroduction of computer networks
Introduction of computer networks
 
Assignment1
Assignment1Assignment1
Assignment1
 
Computer network
Computer networkComputer network
Computer network
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Assignment 1,computer networks-317
Assignment 1,computer networks-317Assignment 1,computer networks-317
Assignment 1,computer networks-317
 
Dc assignment
Dc assignmentDc assignment
Dc assignment
 
Sample elements of computer networking
Sample elements of computer networkingSample elements of computer networking
Sample elements of computer networking
 
Class Note
Class NoteClass Note
Class Note
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Computer network note
Computer network noteComputer network note
Computer network note
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
Note1
Note1Note1
Note1
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 

Note: Introduction to Computer Networks

  • 1. Note 1 Introduction to Computer Networks Course Title: Computer Networks Theory Course Code: CSE 317 Submitted To Pranab Bandhu Nath Senior Lecturer, Department Of CSE City University, Dhaka Submitted By Hasibul Islam Nirob ID: 182482526 BSc in CSE (Day) Batch: 49th
  • 2. What is Computer Network? A computer network is any group of interconnected computing devices capable of sending or receiving data. You can establish a network connection using either cable or wireless media. Advantages of computer networking: File sharing - you can easily share data between different users, or access it remotely if you keep it on other connected devices. Resource sharing - using network-connected peripheral devices like printers, scanners and copiers, or sharing software between multiple users, saves money. Sharing a single internet connection - it is cost-efficient and can help protect your systems if you properly secure the network. Increasing storage capacity - you can access files and multimedia, such as images and music, which you store remotely on other machines or network-attached storage devices. Goals of Computer Network: Resource sharing: is the main objective of the computer network. The goal is to provide all the program, date and hardware is available to everyone on the network without regard to the physical location of the resource and the users. Reliability: The second objective is to provide the high Reliability. It is achieved by replicating the files on two or more machines, so in case of unavailability (due to fail of hardware) the other copies can be used. Scalability: Computer network have provided means to increase system performance as the work load increases (load balancing). In the days of mainframe when the system was full it was to replace with the other large mainframe computer, usually at and expensive rate not convenience for user. Performance: Another closely related goal is to increase the systems performance as the work load increases by just adding more processors. With central mainframes, when the system is full, it must be replaced by a larger one, usually at great expense and with even greater disruption to the users. Security: Only authorized user can access resource in a computer network. Users are authenticated by their username and password. Hence it is not possible to access the data without proper account. This increases security.
  • 3. Application of Computer Networks • Business Applications • Communication Medium • e-commerce • Home Applications • Electronic commerce • Mobile Users Network Hardware & Software There are three components of Computer Network 1. Hardware Equipment 2. Software 3. Cables and Connectors Hardware Equipment’s Network Interface Card (NIC): The interface card which is used to connect one device to another is called Network interface card or NIC. Nowadays, it is attached to all computer’s motherboard. It has a unique 48-bit code. This code is called MAC Address. Modem: The word Modem is sort form of the words Modulator and Demodulator. Modulator converts digital signal to analog signal and Demodulator converts analog signal to Digital signal. Server: A server is a computer that provides data to other computers. It may serve data to systems on a local area network (LAN) or a wide area network (WAN) over the Internet. Client: A client is any device that communicates with a server. Businesses have clients and servers have clients. In both instances, there exists a one-to-many relationship. Just like a business may have several clients, a server can communicate with multiple clients. In computer networking, this is called the client-server model. Peers: On the same level or providing the same function. In networking, a peer is a node that provides the same functionality as another. Peer to Peer." In a P2P network, the "peers" are computer systems which are connected to each other via the Internet. Files can be shared directly between systems on the network without the need of a central server. In other words, each computer on a P2P network becomes a file server as well as a client.
  • 4. Transmission: Data transmission is the process of sending digital or analog data over a communication medium to one or more computing, network, communication or electronic devices. It enables the transfer and communication of devices in a point-to-point, point-to- multipoint and multipoint-to-multipoint environment Medium: A medium is a third-party or element through which a message is communicated. This seems to apply to information technology as well as to seances. In information technology, a medium can be: 1. A physical transmission medium such as optical fiber 2. A presentation medium (and thus the terms multimedia and advertising media) Router: Network routing is the process of selecting a path across one or more networks. The principles of routing can apply to any type of network, from telephone networks to public transportation. In packet-switching networks, such as the Internet, routing selects the paths for Internet Protocol (IP) packets to travel from their origin to their destination. Bridge: A bridge operates at data link layer. A bridge is a repeater, with add on the functionality of filtering content by reading the MAC addresses of source and destination. It is also used for interconnecting two LANs working on the same protocol. It has a single input and single output port, thus making it a 2-port device. Types of Bridges Transparent Bridges: These are the bridge in which the stations are completely unaware of the bridge’s existence i.e., whether or not a bridge is added or deleted from the network, reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e., bridge forwarding and bridge learning. Source Routing Bridges: In these bridges, routing operation is performed by source station and the frame specifies which route to follow. The host can discover frame by sending a special frame called discovery frame, which spreads through the entire network using all possible paths to destination.
  • 5. Hub: A hub is basically a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology which connects different stations. Hubs cannot filter data, so data packets are sent to all connected devices Types of Hub Active Hub: These are the hubs which have their own power supply and can clean, boost, and relay the signal along with the network. It serves both as a repeater as well as wiring center. These are used to extend the maximum distance between nodes. Passive Hub: These are the hubs which collect wiring from nodes and power supply from active hub. These hubs relay signals onto the network without cleaning and boosting them and can’t be used to extend the distance between nodes. Intelligent Hub: It work like active hubs and include remote management capabilities. They also provide flexible data rates to network devices. It also enables an administrator to monitor the traffic passing through the hub and to configure each port in the hub. Switch: Switch is a network device that connects other devices to ethernet networks through twisted pair cables. It uses packet switching technique to receive, store and forward data packets on the network. The switch maintains a list of network addresses of all the devices connected to it Gateway: Gateway is a network device used to connect two or more dissimilar networks. In networking, networks that use different protocols are dissimilar networks. A gateway usually is a computer with multiple NICs connected to different networks. A gateway can also be configured completely using software. Wi-Fi Card: Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless connection to any network. Wi-Fi card is a card used to connect any device to the local network wirelessly. The physical area of the network which provides internet access through Wi-Fi is called Wi-Fi hotspot. Repeater: A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak or corrupted so as to
  • 6. extend the length to which the signal can be transmitted over the same network. An important point to be noted about repeaters is that they do not amplify the signal. When the signal becomes weak, they copy the signal bit by bit and regenerate it at the original strength. It is a 2-port device. Software: • Network Operating System, • Protocols Switches (TCP/IP, OSI) • Client Software Cables and Connectors: • Twisted pair cable • Coaxial cable • Fiber-optic cable References https://whatis.techtarget.com/definition/medium https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:the- internet/xcae6f4a7ff015e7d:connecting-networks/a/computer-networks-overview https://www.guru99.com/basic-computer-network.html#1 https://www.nibusinessinfo.co.uk/content/benefits-computer- networks#:~:text=Advantages%20of%20computer%20networking&text=Resource%20sharing% 20%2D%20using%20network%2Dconnected,you%20properly%20secure%20the%20network. https://www.techmesto.com/computer-networks/ https://www.ques10.com/p/9412/what-is-a-network-what-are-its-goals-and-applica-1/ https://techterms.com/definition/server https://techterms.com/definition/nic https://techterms.com/definition/client https://www.pcmag.com/encyclopedia/term/peer https://techterms.com/definition/p2p https://www.techopedia.com/definition/9756/data-transmission https://www.geeksforgeeks.org/network-devices-hub-repeater-bridge-switch-router- gateways/ https://en.wikipedia.org/wiki/Gateway_%28telecommunications%29 https://en.wikipedia.org/wiki/Router_%28computing%29 https://en.wikipedia.org/wiki/Network_switch