01 Computer Network Introduction
Table of Contents
Overview
A computer network is a collection of interconnected computing devices that exchange data and share resources. Networks form the foundation of modern computing infrastructure including the internet, enterprise systems, cloud computing, and IoT ecosystems.
Key Characteristics
Connectivity
Physical (Ethernet, fiber) and logical (VPNs, virtual networks) connections
Resource Sharing
Hardware, software, and data sharing across devices
Scalability
Support for network growth from PANs to global networks
Reliability
Fault tolerance through redundancy and error correction
Primary Functions
Data Communication
Transfer information between devices
TCP/IP, UDP protocols
Resource Sharing
Shared access to resources
File/print servers
Distributed Processing
Divide tasks across nodes
Cloud computing, distributed systems
Reliability
Maintain operations despite failures
Redundancy, failover mechanisms
Network Architecture
Network architecture defines the structure and design of a network, including physical and logical components.
Network Edges and Core
Network Edge Components:
End Devices: Clients, servers, IoT devices, edge computing nodes
Access Networks: DSL, cable, FTTH, Ethernet, Wi-Fi, cellular (4G/5G)
Access Points: Switches, wireless APs, modems, SOHO routers
Network Core Components:
Core Routers: High-capacity packet switches (Tbps throughput)
Backbone Networks: Fiber optic links (10G, 40G, 100G, 400G Ethernet)
ISP Hierarchy:
Tier 1: Global reach, peer with other Tier 1, no transit payments
Tier 2: Regional/national, purchase transit from Tier 1
Tier 3: Local access, purchase transit from Tier 2
IXPs: Direct peering infrastructure between ISPs
Network Services: DNS, DHCP, CDNs, firewalls
Network Types and Topologies
Classification by Scope
PAN
0-10m
Personal devices, low power
Bluetooth, USB, NFC
LAN
10m-1km
Single building/campus, high speed
Ethernet, Wi-Fi
MAN
1-50km
City-wide, fiber backbone
Metro Ethernet
WAN
50km+
Long distance, interconnects LANs
Internet, MPLS
Common Topologies
Bus Topology:
Pros: Simple, low cost
Cons: Single point of failure, limited scalability
Star Topology:
Pros: Easy management, fault isolation
Cons: Central device is single point of failure
Ring Topology:
Pros: Predictable performance
Cons: Break disrupts entire network
Mesh Topology:
Pros: High reliability, multiple paths
Cons: Complex, expensive
Data Switching Methods
Circuit Switching
Establishes a dedicated communication path for the entire connection duration.
Characteristics:
Connection-oriented with call setup
Reserved bandwidth for entire duration
Constant delay, guaranteed QoS
Inefficient resource utilization (idle periods waste capacity)
Examples: PSTN, ISDN
Packet Switching
Data divided into packets, independently routed through the network.
Characteristics:
Connectionless (datagram) or connection-oriented (virtual circuit)
Statistical multiplexing (shared resources)
Store-and-forward at routers
Variable delay, efficient resource use
Packet Structure:
Examples: Internet (TCP/IP), Ethernet
Comparison
Connection
Dedicated
Shared
Resource Allocation
Fixed (entire duration)
Dynamic (on-demand)
Efficiency
Low (idle resources wasted)
High (statistical multiplexing)
Delay
Constant, predictable
Variable (congestion-dependent)
Setup
Required
Minimal/none
Best For
Voice, continuous data
Bursty data (web, email)
Failure Impact
Entire call disrupted
Packets reroute
Network Performance Metrics
Latency
Total time for data to travel from source to destination.
Components:
1. Transmission Delay: Time to push bits onto link
Example: 1500 bytes, 100 Mbps → 0.12 ms
2. Propagation Delay: Time for signal to travel through medium
Propagation speeds:
Copper/Fiber: ~2 × 10⁸ m/s (2/3 speed of light)
Wireless: ~3 × 10⁸ m/s (speed of light)
Example: 3000 km fiber → 15 ms
3. Processing Delay: Router processing time (μs to ms)
4. Queueing Delay: Wait time in router queues (most variable)
Round-Trip Time (RTT): Time for packet + acknowledgment return
Throughput
Actual data transfer rate achieved.
Bottleneck Link: Slowest link limits end-to-end throughput
Factors affecting throughput:
Bandwidth, latency, packet loss
Protocol overhead
Network congestion
TCP window size
Bandwidth
Maximum data transfer capacity of a link.
Bandwidth-Delay Product (BDP):
Represents amount of data "in flight" on the network.
Example: 100 Mbps × 50 ms = 625 KB in flight
Packet Loss and Jitter
Packet Loss: Percentage of packets that fail to reach destination
Causes: Buffer overflow, transmission errors, routing failures
Jitter: Variation in packet delay over time
Important for real-time applications (VoIP, video conferencing)
Protocol Layers
OSI Model (7 Layers)
TCP/IP Model (4 Layers)
Model Comparison
Layers
7
4
Origin
Theoretical (ISO)
Practical (Internet)
Adoption
Less common
Dominant
Encapsulation
Data gains headers as it moves down the protocol stack:
Each layer adds its header; receiving end reverses the process (decapsulation).
Network Security Fundamentals
Security Objectives:
Confidentiality: Encryption (SSL/TLS, IPsec)
Integrity: Checksums, digital signatures
Authentication: Certificates, passwords
Availability: DDoS protection, redundancy
Non-repudiation: Digital signatures
Common Threats:
Eavesdropping
Traffic interception
Encryption
Man-in-the-Middle
Intercept and alter
Authentication + encryption
Denial of Service
Resource exhaustion
Rate limiting, filtering
IP Spoofing
Forge source address
Ingress filtering
Security Mechanisms:
Firewalls: Packet filtering, stateful inspection
VPNs: Encrypted tunnels over public networks
IDS/IPS: Intrusion detection/prevention
Encryption: SSL/TLS, IPsec, WPA2/WPA3
Summary
Computer networks enable communication and resource sharing between distributed devices. Key concepts:
Architecture:
Network edge: end devices and access networks
Network core: routers, ISPs, backbone links
Hierarchical ISP structure (Tier 1/2/3)
Switching:
Circuit switching: dedicated path, constant delay, inefficient
Packet switching: shared resources, variable delay, efficient
Performance:
Latency: sum of transmission, propagation, processing, queueing delays
Throughput: limited by bottleneck link
Bandwidth: maximum link capacity
Packet loss and jitter affect quality
Protocol Layers:
OSI: 7-layer theoretical model
TCP/IP: 4-layer practical model
Encapsulation: adding headers at each layer
Security:
Objectives: confidentiality, integrity, authentication, availability
Threats: eavesdropping, MITM, DoS, spoofing
Mechanisms: firewalls, VPNs, encryption, IDS/IPS
References
Course Materials:
CSEE 4119: An Introduction to Computer Networks - Columbia University
Textbooks:
Kurose, James F., and Keith W. Ross. Computer Networking: A Top-Down Approach. 8th Edition, Pearson, 2021.
Standards:
RFC 791: Internet Protocol
RFC 793: Transmission Control Protocol
RFC 768: User Datagram Protocol
ISO/IEC 7498-1: OSI Reference Model
Last updated