Computer networks facilitate the interconnection of systems for the purpose of exchanging digital information. Essentially, they comprise a collection of devices linked together through various connections. Distributed processing is employed in computer networks, wherein tasks are divided among multiple computers. However, one of the most pressing challenges faced by networks is the threat of resource attacks.This research paper delves into the fundamental concepts of computer networks, which are essentially a collection of devices interconnected via links. These devices, or nodes, encompass a variety of entities ranging from personal computers and phones to servers and networking hardware. Computer networks enable various applications to access resources such as the World Wide Web, shared application and storage servers, printers, fax machines, as well as email and instant messaging applications. They play a pivotal role in facilitating information sharing across diverse tasks.Computer networks can be classified into two types: open systems and closed systems. Open systems are easily connected to networks and are primed for communication. Conversely, closed systems require proper authentication and are not as readily connected to other networks..
Introduction
I. INTRODUCTION
A computer network, also known as a data network, is a telecommunications infrastructure enabling computers to exchange data through data connections. These connections, established via cable or wireless media, facilitate the transmission of information between networked computing devices. Examples of such devices include personal computers, phones, servers, and networking hardware. The Internet serves as one of the most prominent examples of a computer network. Network nodes within these systems originate, route, and terminate data, supporting a wide array of applications such as web browsing, shared use of servers and printers, as well as email and instant messaging. The design and implementation of computer networks involve considerations such as transmission signals, communications protocols for organizing network traffic, and factors like size, topology, and organizational intent.
II. COMPONENTS OF A COMPUTER NETWORK
A. National Interface card (NIC)
The Network Interface Card (NIC) facilitates communication between a computer and other devices. It stores hardware addresses, which data-link layer protocols use to identify systems on the network and ensure accurate data transfer to the intended destination. There are two types of NIC: Wireless NICs, which modern laptops commonly use, establish connections via antennas utilizing radio wave technology; and Wired NICs, which transfer data through cables.
A Hub, also known as a central device, divides network connections among multiple devices. When a computer requests information, it sends the request to the Hub, which then distributes it to all interconnected devices.
A Router links Local Area Networks (LANs) to the internet, enabling connections between different networks or connecting multiple computers to the internet.
A Modem facilitates internet connection via existing telephone lines. It's a separate component typically inserted into a PC slot on the motherboard, as the motherboard doesn't come integrated with a modem.
Switches organize devices on a network to efficiently transfer data. Unlike Hubs, switches don't broadcast messages across the network; instead, they send messages directly from the source to the intended recipient, improving network performance.
Cables serve as transmission media for communication signals. There are three types: Coaxial cables, resembling TV installation cables, offer high-speed data transmission despite being more expensive than twisted pair cables; Twisted pair cables, capable of transmitting data at over 1Gbps, are cost-effective and commonly used for high-speed connections; and Fibre optic cables, which transmit data using light beams, provide the highest data transmission speeds and are typically used in government installations despite being the most expensive option.
III. APPLICATION OF COMPUTER NETWORK
Resource Sharing: Facilitates the sharing of files, data, and various information types among authorized users in a networked environment, enabling access to resources stored on other computers within the network.
Interpersonal Communications: Enables easy and efficient communication through various means such as email, instant messaging, chat rooms, telephone, video calls, and video conferencing, fostering interpersonal connections across distances.
Server-Client Model: In computer networking, the server-client model involves a central server responsible for storing and managing information, accessible remotely by client machines seeking to retrieve data or services.
E-commerce: Computer networks play a vital role in modern businesses, facilitating online transactions and operations. Platforms like Amazon.com exemplify e-commerce, conducting business activities over the internet.
Communication Medium: Computer networks serve as communication mediums, connecting multiple users within an organization. For instance, a company's email system enables employees to engage in daily communication, enhancing collaboration and information exchange.
A. Advantages Of Computer Network
Easy to install and expand.
Requires minimal cables, reducing costs.
Suited for small organizations like schools.
Utilizes repeaters for extended coverage..
B. Disadvantages Of Computer Network
Heavy network traffic slow down the network bus.
Proper termination is required.
Sometime complex to implement.
Fault in the cable stops all transmission.
IV. TOPOLOGY IN COMPUTER NETWORK
Topology defines how devices are interconnected within a network. It can be categorized into two types: physical and logical. Physical topology focuses on the geometric arrangement of network nodes, representing the actual layout of devices within the network.
Conclusion
This paper conducts an analytical examination of various fundamental network topologies, offering concise insights into their respective attributes. Assessing these topologies for factors like reliability, scalability, flexibility, and effectiveness reveals their diverse strengths and limitations. While topologies play a crucial role in enabling communication and resource sharing, they also pose challenges such as intricate design complexities and high infrastructure costs, especially when combining multiple topologies. Computer networks have profoundly transformed human lifestyles, serving as integral platforms for work, leisure, and communication. As networks continue to evolve, driven by the emergence of new protocols, standards, and applications, their significance in facilitating seamless communication and resource sharing among connected entities remains paramount. Without networks, the efficient sharing of resources among organizations would be severely hindered. Despite ongoing advancements, our understanding of complex network properties remains nascent, suggesting vast potential for electronic communication to become an even more potent networking tool, particularly when accessible to large communities sharing common interests.
References
[1] A. Mangen, B. R. Walgermo, and K. Brønnick, “Reading linear texts on paper versus computer screen: Effects on reading comprehension,” Int. J. Educ. Res., 2013, doi: 10.1016/j.ijer.2012.12.002.
[2] M. Jammal, T. Singh, A. Shami, R. Asal, and Y. Li, “Software defined networking: State of the art and research challenges,” Computer Networks. 2014, doi: 10.1016/j.comnet.2014.07.004.
[3] M. N. O. Sadiku and C. M. Akujuobi, “Computer networks,” in Computers, Software Engineering, and Digital Devices, 2005.
[4] W. Liu, Z. Wang, X. Liu, N. Zeng, Y. Liu, and F. E. Alsaadi, “A survey of deep neural network architectures and their applications,” Neurocomputing, 2017, doi: 10.1016/j.neucom.2016.12.038.
[5] G. Edwards, “Methods Review paper Mixed-Method Approaches to Social Network Analysis,” ESRC Natl. Cent. Res. Methods, 2010, doi: 10.1108/17465640910978391.
[6] A. Hakiri, A. Gokhale, P. Berthou, D. C. Schmidt, and T. Gayraud, “Software-defined networking: Challenges and research opportunities for future internet,” Computer Networks. 2014, doi: 10.1016/j.comnet.2014.10.015.
[7] R. P. Richner, “Research Collection,” Brisk Bin. Robust Invariant Scalable Keypoints, 2011, doi: 10.3929/ethz-a-010782581.
[8] C. Szegedy et al., “Going deeper with convolutions,” in Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2015, doi: 10.1109/CVPR.2015.7298594.
[9] A. Graves et al., “Hybrid computing using a neural network with dynamic external memory,” Nature, 2016, doi: 10.1038/nature20101.
[10] N. M. M. K. Chowdhury and R. Boutaba, “A survey of network virtualization,” Comput. Networks, 2010, doi: 10.1016/j.comnet.2009.10.017.
[11] IEEE Computer Society, “IEEE Standard for Ethernet - Section Two,” IEEE Stand. Ethernet, 2012, doi: 10.1109/IEEESTD.2012.6419735.