Understanding Computer Networks

tl;dr

The Internet and computer networks form the backbone of modern communication, enabling data transfer, online services, and global connectivity. This blog explores the fundamental concepts of computer networks, covering the Internet, network structure, protocols, security, and history.

Table of Contents

What is the Internet?

The Internet is a vast, decentralized network of interconnected devices that communicate using a common set of rules called protocols. It enables information exchange through websites, emails, file transfers, and more.

How Does the Internet Work?

  • Devices (computers, smartphones, IoT) connect via an Internet Service Provider (ISP).
  • Data travels in packets through routers and networks.
  • Each device has a unique IP address for identification.
  • Protocols like HTTP, DNS, and TCP/IP govern communication.

Example: When you search for something on Google, your request is broken into packets, sent through multiple routers, processed by Google’s servers, and the response packets return to you.

Network Edge: End Systems, Access Networks, and Links

The network edge refers to devices and connections that allow users to access the Internet.

End Systems (Hosts)

These are devices connected to the Internet:

  • Computers, smartphones, IoT devices
  • Identified by unique IP addresses
  • Communicate using protocols (HTTP, FTP, SMTP, etc.)

Access Networks

The network that connects end systems to the Internet:

  • Wired (DSL, Fiber Optics, Ethernet) – Faster, reliable
  • Wireless (Wi-Fi, Cellular 4G/5G, Satellite) – More flexible

Example: Your mobile data (5G) or home broadband (Fiber) is your access network.

Links

The physical connections that carry data:

  • Fiber-optic cables (fast, long-distance communication)
  • Copper cables (Ethernet) (local area networks)
  • Wireless signals (Wi-Fi, Bluetooth, Satellite)

Network Core: Packet Switching, Circuit Switching, and Network Structure

The network core is the backbone of the Internet that enables efficient data transfer.

Packet Switching vs. Circuit Switching

FeaturePacket SwitchingCircuit Switching
MethodData is broken into packetsDedicated path is reserved
EfficiencyMore efficient, used in the InternetLess efficient, used in telephony
ExampleEmail, web browsingTraditional telephone calls

Example: The Internet uses packet switching, where messages are divided into packets and sent independently. In contrast, a telephone call uses circuit switching, where a dedicated line is established.

Network Structure

The Internet follows a hierarchical structure with different levels of Internet Service Providers (ISPs):

  • Tier-1 ISPs – Global providers (e.g., AT&T, Tata Communications)
  • Tier-2 ISPs – Regional providers connecting Tier-1 and local ISPs
  • Tier-3 ISPs – Local providers offering home/business connections

Delay, Loss, and Throughput in Networks

Types of Delays

  1. Processing Delay – Time to examine packet headers at routers.
  2. Queuing Delay – Time packets wait in a queue before forwarding.
  3. Transmission Delay – Time taken to push a packet onto the link.
  4. Propagation Delay – Time taken for a packet to travel physically.

Example: A slow website load might be due to high queuing delay at a busy router.

Packet Loss

Occurs when packets are dropped due to congestion or errors, requiring retransmission.

Example: During video calls, lost packets cause buffering or glitches.

Throughput

The rate at which data is successfully transmitted (measured in Mbps/Gbps).

Example: A 100 Mbps broadband connection means you can download 100 megabits per second.

Protocol Layers & Service Models

To manage complexity, networks use a layered architecture.

OSI Model (7 Layers) vs. TCP/IP Model (4 Layers)

OSI ModelTCP/IP ModelFunction
PhysicalNetwork InterfacePhysical connections (Wi-Fi, Ethernet)
Data LinkError detection, MAC addresses
NetworkInternetRouting (IP addresses)
TransportTransportReliable data transfer (TCP, UDP)
SessionEstablishing and managing connections
PresentationEncryption, data format conversion
ApplicationApplicationUser services (HTTP, FTP, DNS, SMTP)

Common Protocols

  • HTTP/HTTPS – Web browsing
  • DNS – Converts domain names to IP addresses
  • SMTP/IMAP/POP3 – Email protocols
  • TCP/UDP – Data transport

Networks Under Attack: Security

Common Cybersecurity Threats

  1. DoS/DDoS Attacks – Overloading a server to crash it.
  2. MITM (Man-in-the-Middle) – Intercepting communications.
  3. Phishing & Malware – Fraudulent emails, malicious software.

Security Measures

  • Encryption (AES, SSL/TLS, VPNs) – Protects data.
  • Firewalls & Intrusion Detection Systems (IDS) – Blocks unauthorized access.
  • Multi-Factor Authentication (MFA) – Adds security layers.

Example: HTTPS encrypts data, preventing MITM attacks.

History of Computer Networks

1960s:

  • ARPANET (the first network) is developed by the US Department of Defense.

1970s:

  • TCP/IP protocol is introduced.
  • Ethernet is invented, enabling local networks.

1980s:

  • The Domain Name System (DNS) is introduced.
  • Personal computers gain popularity.

1990s:

  • The World Wide Web (WWW) is invented by Tim Berners-Lee.
  • ISPs grow, making the Internet publicly accessible.

2000s – Present:

  • Cloud computing, 5G, AI-driven networks emerge.

more from