Chapte 1 (Introduction To Computer Network)
Chapte 1 (Introduction To Computer Network)
8th Edition
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not
be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Introduction to Computer
Networks
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not
be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Objectives
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
An Overview of Computer Concepts
• Most devices encountered when working with a network
involve a computer
• Most obvious devices are workstations and network
servers running operating systems such as:
• Windows, Linux, UNIX, and Mac OS
• Also includes routers and switches
• Specialized computers used to move data from
computer to computer and network to network
• You will learn more about them in later chapters
• Nontraditional computers include:
• Smartphones, smart watches, home assistants like
Amazon Echo and Google Home, and smart “things”
such as appliances, and thermostats
• Smart things are collectively referred to as
Internet of Things (IOT) devices
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Basic Functions of a Computer (1 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Basic Functions of a Computer (2 of 4)
• Input Components
• Includes user controlled devices such as keyboards, microphones, Webcams, and
scanners
• External interfaces, such as serial, FireWire, and USB ports can also be used to get
input from external devices.
• Input is also generated by storage devices such as hard disks and CDs/DVDs
• Inputs to a computer can include timers that cause programs to run periodically
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Basic Functions of a Computer (3 of 4)
• Processing Components
• The CPU is a computer’s main processing component
• CPUs execute instructions from computer programs, such as word processors and
from the computer’s operating system
• Current CPUs are composed of two or more processors called cores
• A multicore CPU is like a person with two brains
• Multicore CPUs enable computers to carry out multiple instructions simultaneously
▶ Results in better overall performance
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Basic Functions of a Computer (4 of 4)
• Output Components
• The most obvious are monitors and printers
• Also include storage devices, network cards, and sound cards
• External interfaces
• For example, a disk drive connected to a USB port allows reading files from the disk
(input) and writing files to the disk (output)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage Components (1 of 5)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage Components (2 of 5)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage Components (3 of 5)
• Long-Term Storage
• Long-term storage maintains its data even when there’s no power
• Examples:
• Hard disks
• CDs/DVDs
• Solid state drives (SSDs)
• USB flash drives
• Long-term storage is used to store document and multimedia files
• As well as application and OS files
• The amount of storage a computer needs depends on the type and quantity of files to be
stored
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage Components (4 of 5)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Storage Components (5 of 5)
Prefix) Value
Kilo (K) Thousand (103)
Mega (M) Million (106)
Giga (G) Billion (109)
Tera (T) Trillion (1012)
Peta (P) Quadrillion (1015)
Exa (E) Quintillion (1018)
Zeta (Z) Sextillion (1021)
Yotta (Y) Septillion (1024)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (1 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (2 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (3 of 7)
Component Description
PCI Express bus Used to add functionality to a PC by adding expansion cards that have a PCIe
expansion slots connector. The larger slots are suitable for high-performance expansion cards, such
as graphics cards and disk controllers. Smaller slots are best suited to sound cards
and network interface cards.
PCI bus expansion slots This older expansion card standard is rarely found on new computers.
Chipset with heat sinks The chipset consists of two chips referred to as the Northbridge and the
Southbridge. These chips control data transfers between memory, expansion slots,
I/O devices, and the CPU. The heat sink sits on top of the chipset to prevent
overheating.
SATA connectors Used for connecting hard drives and CD/DVD drives that use the SATA specification.
IDE connector Used for connecting IDE hard drives and CD/DVD-ROM drives.
Main power connector This connector is where the motherboard receives power from the system power
supply.
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (4 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (5 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (6 of 7)
• RAM Fundamentals
• RAM is the main short-term storage component on a computer
• Because RAM requires continuous power to store data it is referred to as “volatile
memory”
• RAM has no moving parts so accessing data in RAM is much faster than accessing data
on a hard drive
• In general, the more RAM your system has the faster it will run
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Personal Computer Hardware (7 of 7)
• Firmware Fundamentals
• Firmware is a computer program stored in nonvolatile memory such as ROM or flash
memory
• It is located on the motherboard and is executed when the computer is powered on
• Firmware on most PCs is called the basic input/output system (BIOS) or Unified
Extensible Firmware Interface (UEFI)
• Tells the CPU to perform certain tasks when power is first applied to the computer
• One of those instructions is to perform a power-on self test (POST)
• When a computer boots, the firmware program offers a chance to run the Setup utility in
order to configure hardware components
• This configuration is stored in a type of memory called complementary metal oxide
semiconductor (CMOS)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Computer Boot Procedure
To take a computer from a powered-off state to running an OS, the following steps must take
place:
1. Power is applied to the motherboard
2. The CPU starts
3. The CPU carries out the BIOS startup routines, including the POST
4. Boot devices, as specified in the BIOS configuration, are searched for an OS
5. The OS is loaded into RAM
6. OS services are started
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
The Fundamentals of Network Communication
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Components (1 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Components (2 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Components (3 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Components (4 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Steps of Network Communication
• Steps taken at the server side are essentially the reverse of those on the client side
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layers of the Network Communication Process (1
of 3)
• Each step required for a client to access network resources is referred to as a “layer”
• Each layer has a task and all layers work together
• Figure 1-7 depicts this process
• Table 1-4 maps the resource access steps
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layers of the Network Communication Process (2
of 3)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Layers of the Network Communication Process (3
of 3)
2 Client software detects the attempt to access the network and Network client or server software
passes the message on to the network protocol.
3 The protocol packages the message in a format suitable for the Network protocol
network and sends it to the NIC driver.
4 The NIC driver sends the data in the request to the NIC, which Network interface
converts the data into the necessary signals to be transmitted
across the network medium.
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
How Two Computers Communicate on a LAN:
Some Details (1 of 3)
• TCP/IP is the most common protocol (language) used on networks
• TCP/IP uses 2 addresses to identify devices
• Logical address (IP address)
• Physical address (MAC address)
• Just as a mail person needs an address to deliver mail, TCP/IP needs an address in order
to deliver data to the correct device on a network
• Think of the Logical address as a zip code and the Physical address as a street address
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
How Two Computers Communicate on a LAN:
Some Details (2 of 3)
1. A user at Comp A types ping 10.1.1.2 at a command prompt
2. Network software creates a ping message
3. The network protocol packages the message by adding IP address of sending and
destination computers and acquires the destination computer’s MAC address
4. The network interface software adds MAC addresses of sending and destination
computers
5. Comp B receives message, verifies that the addresses are correct and then sends a reply
to Comp A using Steps 2 – 4
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
How Two Computers Communicate on a LAN:
Some Details (3 of 3)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Terms Explained
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (1 of 7)
• Local area network (LAN) is a small network, limited to a single collection of machines and
connected by one or more interconnecting devices in a small geographic area
• An internetwork is a networked collection of LANs tied together by devices such as routers
• Reasons for creation:
• Two or more groups of users and their computers need to be logically separated but still
need to communicate
• Number of computers in a single LAN has grown and is no longer efficient
• The distance between two groups of computers exceeds the capabilities of most LAN
devices
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (2 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (3 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (4 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (5 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (6 of 7)
• Wide area networks (WANs) use the services of third-party communication providers to
carry network traffic from one location to another
• Metropolitan area networks (MANs) use WAN technologies to interconnect LANs in a
specific geographic region, such as a county of city
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
LANs, Internetworks, WANs, and MANs (7 of 7)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Internet, Intranet, and Extranet
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Packets and Frames (1 of 2)
• Computers transfer information across networks in shorts bursts of about 1500 bytes of
data
• Reasons data is transferred this way:
• Pause between bursts allows other computers to transfer data during pauses
• Allows the receiving computer to process received data
• Allows the receiving computer receive data from other computers at the same time
• Gives the sending computer an opportunity to receive data from other computers and
perform other processing tasks
• If an error occurs during transmission of a large file, only the chunks of data involved in
the error have to be sent again
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Packets and Frames (2 of 2)
• Packets
• Chunks of data sent across the network are usually called “packets” or “frames”, with
packets being the more well-known term
• Packet is a chunk of data with a source and destination IP address added to it
• Using the U.S. mail analogy, you can look at a packet as an envelope that has had the zip
code added to the address but not the street address
• Frames
• Frame is a packet with the source and destination MAC addresses added to it
• The packet is “framed” by the MAC addresses on one end and an error-checking code on
the other
• The process of adding IP addresses and MAC addresses to chunks of data is called
encapsulation
• Information added to the front of the data is called a header and information added to the
end is called a trailer
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Clients and Servers (1 of 2)
• A client can be a workstation running a client OS or it can refer to the network software on a
computer that requests network resources from a server
• Client
• The word “client” is usually used in these three contexts:
• Client operating - system is the OS installed on a computer
• Client computer - primary role is to run user applications and access network
resources
• Client software - software that requests network resources from server software on
another computer
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Clients and Servers (2 of 2)
• Server
• A computer becomes a server when software is installed on it that provides a network
service to client computers
• The term “server” is also used in three contexts:
• Server operating system – OS installed on a computer designed to share network
resources and provide other network services
• Server computer – a computer’s primary role in the network is to give client
computers access to network resources and services
• Server software – responds to requests for network resources from client software
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Network Models
• A network model defines how and where resources are shared and how access to these
resources is regulated
• Network models fall into two major types:
• Peer-to-peer network – most computers function as clients or servers (no centralized
control over who has access to network resources)
• Server-based network – certain computers take on specialized roles and function
mainly as servers, and ordinary users’ machines tend to function mainly as clients
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Peer-to-Peer/Workgroup Model
• Computers on a peer-to-peer network can take both a client and a server role
• Any user can share resources on his/her computer with any other user’s computer
• Every user must act as the administrator of his/her computer
• Can give everyone else unlimited access to their resources or grant restricted access to
other users
• Usernames and passwords (credentials) are used to control that access
• Problems with peer-to-peer networks:
• Must remember multiple sets of credentials to access resources on several computers
• Desktop PCs and the OS installed on them aren’t made to provide network services as
efficiently as dedicated network servers
• Data organization
• If every machine can be a server, how can users keep track of what information is
stored on which machine?
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Server/Domain-Based Model (1 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Server/Domain-Based Model (2 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Server/Domain-Based Model (3 of 4)
• Table 1-6 on the following slide summarizes the strengths and weaknesses of peer-to-peer
and server-based networks
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Server/Domain-Based Model (4 of 4)
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter Summary (1 of 2)
• All computers perform three basic tasks: input, processing, and output
• Storage is a major part of a computer’s configuration
• PC hardware consists of four major components: motherboard, hard drive, RAM, and
BIOS/CMOS
• Components needed to make a stand-alone computer a networked computer include a NIC,
a network medium, and usually an interconnecting device
• Also client/server software, protocols, and NIC driver
• The layers of the network communication process can be summarized as user application,
network software, network protocol, and network interface
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Chapter Summary (2 of 2)
• The four terms used to describe networks of different scope are LAN, Internetwork, WAN,
and MAN
• Packets and frames are the units of data handled by different network components
• Packets have the source and destination IP address added and are processed by the
network protocol
• Frames have the MAC addresses and an error code added and are processed by the
network interface
• A client is the computer or network software that requests network data and a server is the
computer or network software that makes the network data available to requesting clients
• A peer-to-peer network model has no centralized authority over resources while a server-
based network usually uses as directory service to provide centralized resource
management
Greg Tomsho, Guide to Networking Essentials, 8th Edition. © 2020 Cengage. All Rights Reserved. May not be scanned,
copied or duplicated, or posted to a publicly accessible website, in whole or in part.