BASIC CONCEPT OF NETWORK.
LAN,WAN
• Basics of Computer Networking
• Last Updated : 16 May, 2024
• Computer Networking is the practice of connecting computers
together to enable communication and data exchange between
them. In general, Computer Network is a collection of two or
more computers. It helps users to communicate more easily. In
this article, we are going to discuss the basics which everyone
must know before going deep into Computer Networking.
• How Does a Computer Network Work?
• Basics building blocks of a Computer network are Nodes and Links. A
Network Node can be illustrated as Equipment for Data Communication
like a Modem, Router, etc., or Equipment of a Data Terminal like
connecting two computers or more. Link in Computer Networks can be
defined as wires or cables or free space of wireless networks.
• The working of Computer Networks can be simply defined as rules or
protocols which help in sending and receiving data via the links which
allow Computer networks to communicate. Each device has an IP
Address, that helps in identifying a device.
• Basic Terminologies of Computer Networks
Types of Computer Network Architecture
Computer Network falls under these broad Categories:
•Client-Server Architecture: Client-Server Architecture is a type
of Computer Network Architecture in which Nodes can be
Servers or Clients. Here, the server node can manage the Client
Node Behaviour.
•Peer-to-Peer Architecture: In P2P (Peer-to-Peer) Architecture,
there is not any concept of a Central Server. Each device is free
for working as either client or server.
Network Devices
An interconnection of multiple devices, also known as hosts,
that are connected using multiple paths for the purpose of
sending/receiving data or media. Computer networks can also
include multiple devices/mediums which help in the
communication between two different devices; these are known
as Network devices and include things such as routers, switches,
hubs, and bridges.
network. When the signal becomes weak, they copy it bit by bit
and regenerate it at its star topology connectors connecting
following the original strength. It is a 2-port device.
2. Hub – A hub is a basically multi-port repeater. A hub connects
multiple wires coming from different branches, for example, the
connector in star topology which connects different stations.
Hubs cannot filter data, so data packets are sent to all
connected devices. In other words, the collision domain of all
hosts connected through Hub remains one. Also, they do not
have the intelligence to find out the best path for data packets
which leads to inefficiencies and wastage.
Bridge – A bridge operates at the data link layer. A bridge is a
repeater, with add on the functionality of filtering content by
reading the MAC addresses of the source and destination. It is
also used for interconnecting two LANs working on the same
protocol. It has a single input and single output port, thus
making it a 2 port device.
Switch – A switch is a multiport bridge with a buffer and a
design that can boost its efficiency(a large number of ports
imply less traffic) and performance. A switch is a data link layer
device. The switch can perform error checking before
forwarding data, which makes it very efficient as it does not
forward packets that have errors and forward good packets
selectively to the correct port only. In other words, the switch
Internet is a group of computer systems
connected from all around the world. The
Internet protocol suite is a framework defined
through the Internet standards. Methods are
divided right into a layered set of protocols on
this architecture. The Internet gives a huge
variety of statistics and communique offerings,
which includes forums, databases, email, and
hypertext. It is made of the neighborhood to
global personal, public networks connected
through plenty of digital, wireless, and
networking technologies.
Working of the internet: The internet is a global
computer network that connects various
devices and sends a lot of information and
media. It uses an Internet Protocol (IP) and
Transport Control Protocol (TCP)-based packet
What are mobile communications?
How do mobile communications work? What is meant by the mobile
communications standards GSM, UMTS and LTE? How high is the exposure to
high frequency electromagnetic fields from mobile communications base stations
and mobile terminals, the mobile phones, smartphones and tablet computers?
Here you get information on the basic aspects of mobile communications.
HIGH-FREQUENCY ELECTROMAGNETIC
FIELDS
• In mobile communications, high-frequency electromagnetic fields are used for wireless transmission of voice and
data. In free space they propagate as waves at the speed of light while being able to transmit energy and
information over long distances.
• Mobile terminals
•
Mobile terminals include classic mobile phones and smartphones in particular. Routers and tablet computers
also belong to this group of devices if they are able to establish and use mobile radio connections. The devices
generate high-frequency electromagnetic fields in order to communicate with a mobile phone base station. In
devices used today, the transmitter and receiver antennas are often incorporated into the devices and not visible
from the outside.
LTE is a digital mobile communications technology and is considered the successor to UMTS (Universal Mobile Telecommunications System). Like UMTS and its extensions HSPA (Hi
• 5G
• The next generation (5G) of mobile communications is available since 2020. Self-driving cars,
voice-activated assistants, and intelligent refrigerators are just a few examples of how the
higher data transmission rates of the new mobile phone technology could be used. However,
there are also some concerns. This includes, in particular, the question of whether the
expansion of 5G also entails a health risk. According to the current state of scientific
knowledge, the Federal Office for Radiation Protection (BfS) does not anticipate negative
health effects but does see some open questions.
• LTE – Long Term Evolution
LTE
• LTE is a digital mobile communications technology and is considered the successor to
UMTS (Universal Mobile Telecommunications System). Like UMTS and its extensions
HSPA (High Speed Packet Access) and HSPA+, also LTE is still allocated to the third
generation of mobile communications (3G). That is why the designation 3.9G is
sometimes used for LTE. Only its advancement, LTE-Advanced, meets all requirements
imposed on mobile communications technologies of the fourth generation (4G) by
standardisation bodies. In Germany, LTE has been available since the end of 2010
and LTE-Advanced was introduced in late 2014.
GSM
Between 1992 and 1995, the first completely digital
mobile telephone networks went into operation in
Germany. These networks, which are still used today,
operate according to the GSM standard (Global System
for Mobile Communications). They employ radio
frequencies in the range of 900 MHz and 1800 MHz
OSI MODEL
• Data flows through the OSI model in a step-by-step process:
• Application Layer: Applications create the data.
• Presentation Layer: Data is formatted and encrypted.
• Session Layer: Connections are established and managed.
• Transport Layer: Data is broken into segments for reliable delivery.
• Network Layer: Segments are packaged into packets and routed.
• Data Link Layer: Packets are framed and sent to the next device.
• Physical Layer: Frames are converted into bits and transmitted physically.
• Let’s look at it with an Example:
• Luffy sends an e-mail to his friend Zoro.
• Step 1: Luffy interacts with e-mail application like Gmail, outlook, etc. Writes his email to send. (This happens in Layer 7: Application layer)
• Step 2: Mail application prepares for data transmission like encrypting data and formatting it for transmission. (This happens in Layer 6:
Presentation Layer)
• Step 3: There is a connection established between the sender and receiver on the internet. (This happens in Layer 5: Session Layer)
• Step 4: Email data is broken into smaller segments. It adds sequence number and error-checking information to maintain the reliability of the
information. (This happens in Layer 4: Transport Layer)
• Step 5: Addressing of packets is done in order to find the best route for transfer. (This happens in Layer 3: Network Layer)
• Step 6: Data packets are encapsulated into frames, then MAC address is added for local devices and then it checks for error using error
detection. (This happens in Layer 2: Data Link Layer)
• Step 7: Lastly Frames are transmitted in the form of electrical/ optical signals over a physical network medium like ethernet cable or WiFi.
• After the email reaches the receiver i.e. Zoro, the process will reverse and decrypt the e-mail content. At last, the email will be shown on Zoro’s
email client.
TCP/IP MODEL