Module 1 Lesson 1 EC3 - Introduction To Networking
Module 1 Lesson 1 EC3 - Introduction To Networking
Module 1 Lesson 1 EC3 - Introduction To Networking
PROGRAM OUTCOMES:
In pursuance of the above-stated mission, the objectives of the College are as follows:
COURSE DESCRIPTION:
This course is a detailed introduction to the basic hardware and software, architectural components for
computer communications in local area networks. The components that are focused upon include
understanding the basics of computer networks, switching, routing, protocols and security.
Module 1
Introduction to Computer Networking
Module Learning Outcomes:
At the end of the module, the students will be able to:
1. Build an understanding of the fundamental concepts of computer networking.
2. Familiarize the student with the basic taxonomy and terminology of the computer networking area.
3. Introduce the student to advanced networking concepts, preparing the student for entry Advanced courses in
computer networking.
4. Allow the student to gain expertise in some specific areas of networking such as the design and maintenance of
individual networks.
Pre: Test
Multiple Choice. Encircle the correct answer.
1. It is a free software package or mobile app that lets you view web pages, graphics, and most
online content.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
2. It is what you see in your browser when you are on the internet.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
3. Are the web browser addresses of internet pages and files.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
4. This indicates that the webpage has a special layer of encryption added to hide your personal
information and passwords from others.
A. URL B. WEBPAGE C. BROWSER D. HTTPS
5. It is the company or government organization that plugs you into the vast internet.
A. SPAM B. EMAIL C. ISP D. ROUTER
6. It is the hardware device that acts as the traffic cop for network signals arriving at your home or
business from your ISP.
A. SPAM B. EMAIL C. ISP D. ROUTER
7. It is the sending and receiving of typewritten messages from one screen to another.
A. SPAM B. EMAIL C. ISP D. ROUTER
8. It is the jargon name of unwanted and unsolicited email.
A. SPAM B. EMAIL C. ISP D. ROUTER
9. It is the broad term for any online tool that enables users to interact with thousands of other users.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
10. The transaction of business selling and buying online.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
11. It is the mathematical scrambling of data so that it is hidden from eavesdroppers.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
12. It is a broad term that describes transferring something you find on the internet.
A. E-COMMERCE B. DOWNLOADING C. ENCRYPTION D. SOCIAL MEDIA
13. It is the broad term to describe any malicious software designed by hackers.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN
14. It is a generic term to describe a barrier against destruction.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN
15. It is the use of convincing-looking emails and web pages to lure you into typing your account
numbers and passwords/PINs.
A. FIREWALL B. PHISING C. MALWARE D. TROJAN
Lesson Map
Lesson 1
Computer Networks
Introduction
A system of interconnected computers and computerized peripherals such as printers is called computer network.
This interconnection among computers facilitates information sharing among them. Computers may connect to
each other by either wired or wireless media.
A network consists of two or more computers that are linked in order to share resources (such as
printers and CD-ROMs), exchange files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Computer networks may be classified by many criteria, for example, the transmission medium used to
carry signals, bandwidth, communications protocols to organize network traffic, the network size, the
topology, traffic control mechanism, and organizational intent.
Computer networks support many applications and services, such as access to the World Wide
Web, digital video, digital audio, shared use of application and storage servers, printers, and fax
machines, and use of email and instant messaging applications.
History
Computer networking may be considered a branch of computer science, computer engineering,
and telecommunications, since it relies on the theoretical and practical application of the related
disciplines. Computer networking was influenced by a wide array of technology developments and
historical milestones.
In the late 1950s, early networks of computers included the U.S. military radar system Semi-
Automatic Ground Environment (SAGE).
In 1959, Christopher Strachey filed a patent application for time-sharing and John McCarthy initiated
the first project to implement time-sharing of user programs at MIT.[1][2][3][4] Stratchey passed the
concept on to J. C. R. Licklider at the inaugural UNESCO Information Processing Conference in Paris
that year.[5] McCarthy was instrumental in the creation of three of the earliest time-sharing systems
(Compatible Time-Sharing System in 1961, BBN Time-Sharing System in 1962, and Dartmouth Time
Sharing System in 1963).
In 1959, Anatolii Ivanovich Kitov proposed to the Central Committee of the Communist Party of the
Soviet Union a detailed plan for the re-organisation of the control of the Soviet armed forces and of
the Soviet economy on the basis of a network of computing centres, the OGAS.[6]
In 1959, the MOS transistor was invented by Mohamed Atalla and Dawon Kahng at Bell Labs.[7] It
later became one of the basic building blocks and "work horses" of virtually any element
of communications infrastructure.[8]
In 1960, the commercial airline reservation system semi-automatic business research
environment (SABRE) went online with two connected mainframes.
In 1963, J. C. R. Licklider sent a memorandum to office colleagues discussing the concept of the
"Intergalactic Computer Network", a computer network intended to allow general communications
among computer users.
Throughout the 1960s, Paul Baran and Donald Davies independently developed the concept
of packet switching to transfer information between computers over a network. Davies pioneered
the implementation of the concept with the NPL network, a local area network at the National
Physical Laboratory (United Kingdom) using a line speed of 768 kbit/s.[9][10][11]
In 1965, Western Electric introduced the first widely used telephone switch that implemented
computer control in the switching fabric.
In 1969, the first four nodes of the ARPANET were connected using 50 kbit/s circuits between
the University of California at Los Angeles, the Stanford Research Institute, the University of
California at Santa Barbara, and the University of Utah.[12] In the 1970s, Leonard Kleinrock carried
out mathematical work to model the performance of packet-switched networks, which underpinned
the development of the ARPANET.[13][14] His theoretical work on hierarchical routing in the late 1970s
with student Farouk Kamoun remains critical to the operation of the Internet today.
In 1972, commercial services using X.25 were deployed, and later used as an underlying
infrastructure for expanding TCP/IP networks.
Year Event
1961 The idea of ARPANET, one of the earliest computer networks, was proposed by Leonard
Kleinrock in 1961, in his paper titled "Information Flow in Large Communication Nets."
1965 The term "packet" was coined by Donald Davies in 1965, to describe data sent between
computers over a network.
1969 ARPANET was one of the first computer networks to use packet switching. Development of
ARPANET started in 1966, and the first two nodes, UCLA and SRI (Standford Research
Institute), were connected, officially starting ARPANET in 1969.
1969 The first RFC surfaced in April 1969, as a document to define and provide information about
computer communications, network protocols, and procedures.
1969 The first network switch and IMP (Interface Message Processor) was sent to UCLA on August
29, 1969. It was used to send the first data transmission on ARPANET.
1969 The Internet was officially born, with the first data transmission being sent between UCLA and
SRI on October 29, 1969, at 10:30 p.m.
1970 Steve Crocker and a team at UCLA released NCP (NetWare Core Protocol) in 1970. NCP is a file
sharing protocol for use with NetWare.
1971 ALOHAnet, a UHF wireless packet network, is used in Hawaii to connect the islands together.
Although it is not Wi-Fi, it helps lay the foundation for Wi-Fi.
1973 Ethernet is developed by Robert Metcalfe in 1973 while working at Xerox PARC.
1973 The first international network connection, called SATNET, is deployed in 1973 by ARPA.
1973 An experimental VoIP call was made in 1973, officially introducing VoIP technology and
capabilities. However, the first software allowing users to make VoIP calls was not available
until 1995.
1974 The first routers were used at Xerox in 1974. However, these first routers were not
considered true IP routers.
1976 Ginny Strazisar developed the first true IP router, originally called a gateway, in 1976.
1978 Bob Kahn invented the TCP/IP protocol for networks and developed it, with help from Vint
Cerf, in 1978.
1981 Internet Protocol version 4, or IPv4, was officially defined in RFC 791 in 1981. IPv4 was the
first major version of the Internet protocol.
1981 BITNET was created in 1981 as a network between IBM mainframe systems in the United
States.
1981 CSNET (Computer Science Network) was developed by the U.S. National Science Foundation
in 1981.
1983 Paul Mockapetris and Jon Postel implement the first DNS in 1983.
1986 The NSFNET (National Science Foundation Network) came online in 1986. It was a backbone
for ARPANET, before eventually replacing ARPANET in the early 1990s.
1986 BITNET II was created in 1986 to address bandwidth issues with the original BITNET.
1988 WaveLAN network technology, the official precursor to Wi-Fi, was introduced to the market
by AT&T, Lucent, and NCR in 1988.
1988 Details about network firewall technology was first published in 1988. The published paper
discussed the first firewall, called a packet filter firewall, that was developed by Digital
Equipment Corporation the same year.
1990 Kalpana, a U.S. network hardware company, developed and introduced the first
network switch in 1990.
1996 IPv6 was introduced in 1996 as an improvement over IPv4, including a wider range of IP
addresses, improved routing, and embedded encryption.
1997 The first version of the 802.11 standard for Wi-Fi is introduced in June 1997, providing
transmission speeds up to 2 Mbps.
1999 The 802.11a standard for Wi-Fi was made official in 1999, designed to use the 5 GHz band and
provide transmission speeds up to 25 Mbps.
1999 802.11b devices were available to the public starting mid-1999, providing transmission speeds
up to 11 Mbps.
1999 The WEP encryption protocol for Wi-Fi is introduced in September 1999, for use with 802.11b.
2003 802.11g devices were available to the public starting in January 2003, providing transmission
speeds up to 20 Mbps.
2003 The WPA encryption protocol for Wi-Fi is introduced in 2003, for use with 802.11g.
2003 The WPA2 encryption protocol is introduced in 2004, as an improvement over and
replacement for WPA. All Wi-Fi devices are required to be WPA2 certified by 2006.
2009 The 802.11n standard for Wi-Fi was made official in 2009. It provides higher transfer speeds
over 802.11a and 802.11g, and it can operate on the 2.4 GHz and 5 GHz bandwidths.
2018 The Wi-Fi Alliance introduced WPA3 encryption for Wi-Fi in January 2018, which includes
security enhancements over WPA2.
A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited
to a geographic area such as a writing lab, school, or building. Rarely are
LAN computers more than a mile apart.
A Metropolitan Area Network (MAN) covers larger geographic areas, such as cities or school districts. By
interconnecting smaller networks within a large geographic area.
Wide Area Networks (WANs) connect larger geographic areas, such as Florida, the United States, or the
world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of network.
Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of minutes, without
paying enormous phone bills. A WAN is complicated. It uses multiplexers to connect local and
metropolitan networks to global communications networks like the Internet. To users, however, a WAN
will not appear to be much different than a LAN or a MAN.
Expensive to Install.
Requires Administrative Time.
File Server May Fail.
Wireless Local Area Network – This is a LAN which works using wireless network technology such as Wi-
Fi. This type of network is becoming more popular as wireless technology is further developed and is
used more in the home and by small businesses. It means devices do not need to rely on physical cables
and wires as much and can organise their spaces more effectively.
Storage Area Network – This network connects servers directly to devices which store amounts of data
without relying on a LAN or WAN network to do so. This can involve another type of connection known
as Fibre Channel, a system similar to Ethernet which handles high-performance disk storage for
applications on a number of professional networks.
1. File Servers
A file server stands at the heart of most networks. It is a very fast computer with a large amount of RAM
and storage space, along with a fast network interface card. The network operating system software
resides on this computer, along with any software applications and data files that need to be shared.
2. Workstations
All of the computers connected to the file server on a network are called workstations. A typical
workstation is a computer that is configured with a network interface card, networking software, and
the appropriate cables. Workstations do not necessarily need floppy disk drives or hard drives because
files can be saved on the file server. Almost any computer can serve as a network workstation.
The three most common network interface connections are Ethernet cards, LocalTalk connectors, and
Token Ring cards.
Ethernet Cards
Ethernet cards are usually purchased separately from a computer, although many computers (such as
the Macintosh) now include an option for a pre-installed Ethernet card. Ethernet cards contain
connections for either coaxial or twisted pair cables (or both) (See fig. 1). If it is designed for coaxial
cable, the connection will be BNC. If it is designed for twisted pair, it will have a RJ-45 connection.
Token Ring network cards look similar to Ethernet cards. One visible difference is the type of connector
on the back end of the card. Token Ring cards generally have a nine pin DIN type connector to attach the
card to the network cable.
4. Concentrators/Hubs
5. Repeaters
6. Bridges
A router translates information from one network to another; it is similar to a superintelligent bridge.
Routers select the best path to route a message, based on the destination address and origin. The router
can direct traffic to prevent head-on collisions, and is smart enough to know when to direct traffic along
back roads and shortcuts.
If you have a school LAN that you want to connect to the Internet, you will need to purchase a router. In
this case, the router serves as the translator between the information on your LAN and the Internet. It
also determines the best route to send the data over the Internet. Routers can:
Circle the best answer for each of the following multiple choice questions. (2 points each)
3. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing
5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
_____ 1. Route messages between linear bus, star, and star-wired ring topologies.
_____ 2. Routers select the best path to route a message, based on the destination address and origin.
_____ 3. A bridge is a device that allows you to segment a large network into two smaller, more efficient
networks.
_____ 4. Repeaters can be separate devices or they can be incorporated into a concentrator.
_____ 5. Token Ring cards generally have a nine pin DIN type connector to attach the card to the
network cable.
_____ 6. NIC provides the physical connection between the network and the computer workstation.
Most NICs are internal, with the card fitting into an expansion slot inside the computer.
_____ 8. WAN connect larger geographic areas, such as Florida, the United States, or the world.
_____9. MAN covers larger geographic areas, such as cities or school districts.
_____ 10. LAN is a network that is confined to a relatively small area.
Topic Summary
1. Introduction to computer networks
2. Different types of network devices
3. History of networks
4. Advantage and dis advantage of using topology
References:
1. https://www.goodreads.com/book/show/39303126-introduction-to-
computer-networking 2016
2. https://www.quora.com/How-do-I-get-this-book-Data-Communication-
And-networking-by-Behrouz-A-Forouzan-and-Firouz-Mosharraf
3. https://www.visual-paradigm.com/tutorials/how-to-create-network-
diagram/
4. https://www.elsevier.com/books/computer-networks/peterson/978-0-12-
818200-0