Computer Network Fundamentals Lecture Note.
Computer Network Fundamentals Lecture Note.
BY:
1|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
2|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
1.0 INTRODUCTION
Earlier computers used to be stand alone. Different computers
were used for information gathering, processing or distribution.
Due to rapid technological progress, the areas of information
gathering, processing and distribution are rapidly converging and
differences between them are quickly disappearing.
In this unit, we will learn the different types of networks,
their applications, networking models and topologies. We will
also examine references, the various layers and functions of each
layer.
4|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
5|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
6|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
7|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
2. SHARING HARDWARE
In a network, resources such as printers, scanners, fax
machines and modems can be shared among the users with
are on the same network.
8|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
3. SHARING SOFTWARE
Users on a network can access data stored on other
computers and on the internet. Known as Databases, these
systems are used in companies to hold information such as
customer, product or employee information. Database
information can be stored in-house on a computer server or
in the Cloud. Cloud Services allow companies to store their
data in large online servers using the internet. This makes
this data accessible anywhere once there is an internet
connection.
9|Page
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
10 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
12 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
1. ROUTER
A router is a networking device that connects a local network
to other local networks. At the Distribution Layer of the
network, routers direct traffic and perform other functions
critical to efficient network operation. Routers, like switches,
are able to decode and read the messages that are sent to
them. Unlike switches, which only decode (unencapsulate)
the frame containing the MAC address information, routers
decode the packet that is encapsulated within the frame.
13 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
2. SWITCH
Switch is a networking device that groups all the devices
over the network to transfer the data to another device. A
switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to the
device for which it belongs to. Therefore, we can say that
switch sends the message directly from source to the
destination.
3. MODEM
Modem is a device which is used to convert digital signals
generated by the computer into an analog signal to be
carried by a public access telephone line. It is also the device
that converts the analog signal received over a phone line
into digital signal usable by the computer. A modem derives
its meaning from a modulation, and demodulation is a
composite word that refers to two functional units that
make up a device.
4. HUB
Hub is a central device that splits the network connection
into multiple devices. When computer requests for
information from a computer, it sends the request to the
Hub. Hub distributes this request to all the interconnected
computers.
16 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
17 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
18 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
21 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
Coaxial Cable
Coaxial cable is usually constructed of either copper or
aluminum, and is used by cable television companies to
provide service. It is also used for connecting the various
components which make up satellite communication
systems.
Fiber Optic
Fiber optic cables are made of glass or plastic. They have a
very high bandwidth, which enables them to carry very large
amounts of data. Fiber is used in backbone networks, large
enterprise environments and large data centers. It is also
used extensively by telephone companies.
23 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
many other areas. Shielded cables (ScTP and F-UTP) are used
almost exclusively in European countries.
Therefore, for this class we only consider UTP.
UTP cable is inexpensive, offers a high bandwidth, and is
easy to install. This type of cable is used to connect
workstations, hosts and network devices. It can come with
many different numbers of pairs inside the jacket, but the
most common number of pairs is four. Each pair is identified
by a specific color code.
All Categories of data grade UTP cable are traditionally
terminated into an RJ-45 connector.
Coaxial Cable (Coax)
Like twisted pair, coaxial cable (or coax) also carries data in
the form of electrical signals. It provides improved shielding
compared to UTP, so has a lower signal-to-noise ratio and
can therefore carry more data. It is often used to connect a
TV set to the signal source, be it a cable TV outlet, satellite
TV, or conventional antenna. It is also used at NOCs to
connect to the cable modem termination system (CMTS)
and to connect to some high-speed interfaces.
Although coax has improved data carrying characteristics,
twisted pair cabling has replaced coax in local area
networking uses. Among the reasons for the replacement is
that - compared to UTP - coax is physically harder to install,
more expensive, and harder to troubleshoot.
24 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
25 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
The two schemes are similar except two of the four pairs are
reversed in the termination order. The graphic shows this
color-coding and how the two pairs are reversed.
On a network installation, one of the two wiring schemes
(T568A or T568B) should be chosen and followed. It is
important that the same wiring scheme is used for every
termination in that project. If working on an existing
network, use the wiring scheme already employed.
27 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
29 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
2. Class B Network
In a B class IP address, the binary addresses start with 10. In
this IP address, the class decimal number that can be between
128 to191. The number 127 is reserved for loopback, which is
used for internal testing on the local machine. The first 16 bits
(known as two octets) help you identify the network. The
other remaining 16 bits indicate the host within the network.
Subnet Mask
A subnet mask is a 32-bit number used in IPv4 (or 128-bit for
IPv6) that divides your IP address into network and host
portions. The network portion ensures that data packets reach
the right network, while the host portion identifies a specific
device on that network.
32 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
33 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
34 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
1. PHYSICAL LAYER:
The physical layer is a layer that manages physical hardware
and network components such as cables, switches, or
routers that transmit data.
In the context of data, layer 1 transmits data in the form
of ones and zeros. Technically, this layer picks up bits from
the sender end, encodes them into a signal, sends the signal
over the network, and decodes the signal at the receiver
end. Thus, without layer 1, communicating data bits across
network devices through physical media is not possible.
36 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
Key Functions
o Synchronizes data bits
o Enables modulation (conversion of a signal from one form
to another for data transmission)
o Defines data transmission rate (bits/sec)
o Outlines the arrangement of network devices across
different network topologies such as bus, tree, star, or
mesh topology
o Defines transmission modes such as simple or half-duplex
mode
o In summary, layer 1 is responsible for transmitting data bits
of 0s and 1s between network systems via electrical,
mechanical, or procedural interfaces.
3. NETWORK LAYER
The network layer enables the communication between
multiple networks. It receives data segments from the
layer above, further broken down into smaller packets at
the sender side. On the receiver side, this layer
reassembles the data together.
The network layer also handles routing functionality,
wherein the data transmission is accomplished by
choosing the best possible route or path that connects
different networks and ensures efficient data transfer.
This network layer uses internet protocol (IP) for data
delivery.
38 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
Key Functions
Handles routing to recognize suitable routes from sender to
receiver
Performs logical addressing that assigns unique names to
each device operating over the network
o In summary, layer 3 is responsible for dividing
segmented data into network packets, reassembling
them at the recipient’s side, and identifying the
shortest yet most suitable and secure path for
transmitting data packets.
4. TRANSPORT LAYER
The transport layer allows safe message transfer between
the sender and the receiver. It divides the data received
from the layer above into smaller segments. It also
reassembles the data at the receiver side to allow the
session layer to read it.
Layer 4 performs two critical functions: flow control and
error control. Flow control implies regulating data transfer
speeds. It ensures that the communicating device with a
good network connection does not send data at higher
rates, which is difficult for devices with slower connections
to handle. Error control refers to the error-checking
functionality to ensure the completeness of data. In
incomplete data cases, this layer requests the system to
resend the incomplete data.
39 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
Key Functions
Ensures completeness of each message exchanged between
source and destination
Maintains proper data transmission through flow control
and error control
Performs data segmentation and reassembling of data
o In summary, layer 4 is responsible for transmitting an
entire message from a sender application to a receiver
application.
5. SESSION LAYER
The session layer establishes a communication session
between communicating entities. The session is maintained
at a sufficient time interval to ensure efficient data
transmission and avoid wasting computing resources.
This OSI layer is also responsible for data synchronization to
maintain smooth data flow. This implies that in situations
where large volumes of data are sent at once, layer 5 can
break down the data into smaller chunks by adding
checkpoints.
40 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
Key Functions
Opens maintains, and closes communication sessions
Enables data synchronization by adding checkpoints to
data streams
In summary, layer 5 establishes, maintains, synchronizes,
and terminates sessions between end-user applications.
6. PRESENTATION LAYER
The presentation layer is often referred to as a syntax or
translation layer as it translates the application data into a
network format. This layer also encrypts and decrypts data
before transmitting it over the network.
Key Functions
Performs data translation based on the application’s data
semantics
Encrypts and decrypts sensitive data transferred over
communication channels
Performs data compression to reduce the number of bits in
exchanged data
41 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
7. APPLICATION LAYER
The application layer is the topmost layer in the OSI model.
The layer establishes communication between the
application on the network and the end user using it by
defining the protocols for successful user interaction. An
excellent example of this layer is that of web browsers.
Application layer protocols allow the software to direct data
flow and present it to the user. Some of the known protocols
include Hypertext Transfer Protocol (HTTP), Simple Mail
Transfer Protocol (SMTP), and File Transfer Protocol (FTP).
Key functions:
The application layer provides user interfaces (UI) that are
key to user interaction
Supports a variety of applications such as e-mail and
remote file transfer
In summary, layer 7 ensures effective communication between
applications on different computing systems and networks.
42 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
14.0 Exercises
1. Define computer network.
2. List 4 and explain 2 classifications of computer network with
the help of diagram.
3. List 5 and explain 3 advantage and disadvantage of
computer network
4. List 7 and explain 3 functions of computer network devices.
5. Computer network help us in so many ways list 3 and explain
how.
6. Convert the following 4 octets IP address from Decimal to
binary
a. 192.168.1.1
b. 140.179.220.X (Let X be your last 2 digit of your
registration number)
7. Convert the following binary to 4 octets decimal IP address
a. 11000000.10101000.00000001.01101010
b. 11111111.11111111.10000000.00000000
8. List and explain 2 the computer network topologies, with the
help of diagram and example of each topology.
9. What are the 3 switching techniques?
10. List and explain 7 OSI Reference Models with example of
each layer.
11. Which layer does the Router operates?
a. Transport layer
b. Network layer
c. Application layer
d. Session layer.
43 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
15.0 CONCLUSION
In this course the students learned how to define computer
network, and its classifications.
However, the students learned the benefits of computer
network, advantages and disadvantages of computer network
and the components of computers network. Then, the students
learned the classification of IP Address and subnet mask.
Therefore, the students learned the four types of network
topology, network architecture and the three types of switching
technique, OSI Model and characteristics of the OSI Model.
44 | P a g e
CIT-201_COMPUTER NETWORK FUNDAMENTALS LECTURE NOTE
References
Hayward, D. (2016, April 17). How to secure your home network from hackers. Retrieved from
Trusted Reviews: http://www.trustedreviews.com/how-tos/how-to-secure-your-home-
network-from-hackers
Network Topologies. (2016, November 15). Retrieved from Edraw Visualization Solutions:
https://www.edrawsoft.com/Network-Topologies.php
Sanchez, M. (2010, December 9). The 10 most common security threats explained. Retrieved
from
Blogs.cisco.com/: http://blogs.cisco.com/smallbusiness/the-10-most-common-security-
threats-explained
Woodford, C. (2016, March 18). Computer Networks. Retrieved from Explain that stuff!:
http://www.explainthatstuff.com/howcomputernetworkswork.html
45 | P a g e