Networking and Internet
Networking and Internet
The terms "networking" and "internet" refer to two forms of linking computers to each other
computing devices that are either physically located close to each other or are linked to each
other in different locations, exchanging data and sharing resources with each other. These
The Internet on the other hand, is a global network of interconnected computers, servers,
phones, and smart appliances all over the world that communicate with each other using the
transmission control protocol (TCP) standard to enable a fast exchange of information and
files. The Internet is technically a network as well, but on a much larger scale: various
networks are connected in a way that allows users to access the hosted servers of a website
for various uses. Accessing the internet is a computer or other device talking to a series of
People living in isolated areas of an archipelago or even in the depths of Africa can
ii. Easy to use: The software used to connect to the internet (web browser) is user-
iii. Compatible with other types of media: The internet provides a high level of
Page | 1
v. Flexible: Internet-based communication is highly adaptable. It supports text, audio,
and video communication. These services are available at both individual and
organizational levels.
COMPONENTS OF A NETWORK
Computer networks facilitate communication and data transfer between devices in today's
interconnected world. From local area networks (LANs) in homes and offices to wide area
working together seamlessly. The main components of a computer network and their
Hardware components form the physical infrastructure of a computer network, enabling the
services to clients, such as file storage, email, web hosting, and database management.
ii. Clients: are devices, such as desktop computers, laptops, tablets, and smartphones
Page | 2
iii. Network interface cards (NICs): NICs, also known as network adapters, enable
transmission.
iv. Switches: are network devices that receive and forward data packets to the intended
preventing collisions.
v. Routers connect multiple networks and enable data exchange using IP addresses,
vi. Modems are devices that convert digital signals from computers into analog signals
suitable for transmission over phone lines or cable lines, and vice versa, facilitating
vii. Cables and connectors: Physical cables, such as Ethernet cables, fiber optic cables,
and coaxial cables, are used to transmit data between network devices. Connectors,
such as RJ-45 connectors for Ethernet cables, ensure secure and reliable connections
SOFTWARE COMPONENTS
Software components provide the necessary functionality to manage and control network
Page | 3
i. Network operating systems (NOS): manage and control network resources and
services, enabling users to access shared resources, administer security protocols, and
ii. Network protocols: define the rules and standards for communication between devices
Transmission mode defines the direction of signal flow between two linked devices. There
only one can transmit and the other can only receive.
station can sent and receive but not at the same time.
iii. Full-Duplex: In Full-Duplex mode, both stations can transmit and receive
simultaneously.
receiver use the same time cycle for the transmission. We send bits one after another
without start/stop bits or gaps. It is the responsibility of the receiver to group the bits.
Bit stream is delivered with a fixed delay and given error rate. Each bit reaches the
destination with the same time delay after leaving the source.
at the beginning and one stop bit at the end of each byte. There may be a gap between
each byte. Bit stream is divided into packets. Packets are received with varying
delays, so packets can arrive out of order. Some packets are not received correctly.
Page | 4
3. BASED ON AUTHENTICATION
All the computers are equal and, therefore, are termed as peers. Normally, each
computer functions as both a client and a server. No one can control the other
computers.
ii. Server Based Connection: Most networks have a dedicated server. A dedicated
network clients. A server can control the clients for its services.
Two basic network types are local area networks (LANs) and wide area networks
(WANs).
i. Local Area Networks (LAN): LAN is a small high speed network. LANs
cables, fiber optics, or Wi-Fi) that transmit data rapidly. Home WiFi networks and
small business networks are common examples of LANs. LANs can also be fairly
large, although if they take up multiple buildings or spread over a city, it is usually
Page | 5
Source: Erik Mikac. December 7, 2023
ii. Wide Area Network (WAN): WAN is a collection of network (or LAN). This
network speed is slightly less than the LAN network speed. WAN network
connect systems indirectly. WAN spread over the world; may be spread over more
than one city, country or continent. Systems in this network are connected
Technically, any large network that spreads out over a wide geographic area is a
WAN. The internet itself is considered a WAN. WAN includes the following in
Page | 6
A bridge is a network device (LAN Switch) that connects two or more LANs (local area
networks) to form a larger LAN. Network bridging refers to the process of aggregating
networks. A bridge connects the various components, making them appear to be part of a
single network.
A point-to-point link is a type of network topology that connects two LANs or end nodes
through a dedicated and secure leased line. Old school broadband networks using dial-up
technology are a good example of point-to-point WAN. It can be used to connect remote
sites, data centers, and branch offices. Point-to-point WANs are commonly used in
businesses and organizations for transmitting data between multiple buildings and locations.
NETWOK TOPOLOGY
Topology refers to physical layout including computers, cables, and other resources; it
determines how components communicate with each other in a networking scenario. There
are several types of network topologies, however, today’s network designs are based on three
topologies:
segment
ii. StarSource:
connectshttps://www.shutterstock.com/search/bus-topology-diagram
computers via central connection point or hub.
Page | 7
Source: Dr. Roy Winkelman, 2013
iii. Ring connects computers to form a loop All computers, regardless of topology,
cable as electronic signals. Data is broken into packets and sent as electronic signals
that travel on the cable. Only the computer to which the data is addressed accepts it.
NETWORK ROUTING
Routing is the process of determining paths through a network for sending data packets.
Routing ensures that data moves effectively from source to destination, making the best use
of network resources and ensuring consistent communication. Routing is classified into Static
Routing, Default Routing, and Dynamic Routing. So basically, routing is the process of hosts
Page | 8
and routers forwarding IP packets while relying on the underlying LANs and WANs to
Another name for Static Routing is Nonadaptive Routing. Static routing is the process
Let's suppose our computer wants to connect with another computer, and there are ten
different networks between them. When we want to connect both the computers, we
have to give the information manually about the networks through which we want to
connect to the router, then only the exchange of data can be possible. This process is
automatically adjusts routes based on the current state of the route in the routing table.
Protocols are used in dynamic routing to discover network destinations and the routes
that will take them there. The best examples of dynamic routing protocols
are RIP and OSPF. If one of the network routes fails, it will make automatic
It is the method in which the router is set up to send all packets to a single router (next
hop). It makes no difference to which network the packet belongs to; it is forwarded
Page | 9
to the router that is set to default routing. It is typically used in conjunction with stub
routers. A stub router only has one route to all other networks.
It is set up for unknown locations or end locations. It is the least preferred Routing. It
NETWORK ADDRESSING
Network addressing is a fundamental system that assigns unique identifiers to each device on
between devices. Each device on the network uses a unique IP address to send and receive
data accurately and efficiently. Addressing is basically Addresses used to identify a packet's
network segment. MAC addresses are assigned by device manufacturers and serve as
a layer 2 (data link layer) identifier in the OSI networking model. The data link layer
ii. Logical addressing: Logical addressing is send to distinguish between source and
iii. Port Addressing: In networking, a port address is a numerical value that identifies a
specific endpoint or service on a host device in a network. It uses the port numbers
iv. Application-specific address: designed by users for some applications. For example,
used is used to find a document on the World Wide Web, forouzan@fhda.edu defines.
Page | 10
ADVANTAGES AND DISADVANTAGES OF COMPUTER NETWORKING
like security concerns, Server dependence, high setup costs, maintenance needs, and limited
resource capacities.
Internet Service Providers (ISPs) are companies that provide Internet access to consumers
and businesses. The Internet is provided through a variety of channels, including cable,
DSL, fiber optics, dial-up, and wireless, with most ISPs offering all options. Most large
telecommunication companies, such as mobile and cable companies are ISPs. Some of the
services of ISPs include: Email services, Web hosting services, Domain registration,
CLASSIFICATION OF ISPs
to connect users to their network. Available technologies have ranged from computer
wireless Ethernet (wi-fi), and fiber optics. For users and small businesses, traditional
options include copper wires to provide dial-up, DSL (typically asymmetric digital
subscriber line (ADSL), cable modem or Integrated Services Digital Network (ISDN)
hosting electronic mail domains with access to storage for mail boxes. It provides
email servers to send, receive, accept, and store email for end users or other
organizations. Many mailbox providers are also access providers, while others are not
(e.g., Yahoo! Mail, Outlook.com, Gmail, AOL Mail, Po box). The definition given in
Page | 11
RFC 6650 covers email hosting services, as well as the relevant department of
companies, universities, organizations, groups, and individuals that manage their mail
Transfer Protocol (SMTP) and possibly providing access to messages through Internet
proprietary protocol.
3. Hosting ISPs: Provides email, web-hosting, or online storage services. Other services
4. Transit ISP: These are ISPs that pay upstream ISPs in other to provide internet
access to their customers who pay them for Internet access, An upstream ISP usually
has a larger network than the contracting ISP or is able to provide the contracting ISP
with access to parts of the Internet the contracting ISP by itself has no access to.
5. Virtual ISPs: A Virtual ISP (VISP) is an operation that purchases services from
another ISP, sometimes called a wholesale ISP in this context, which allow the VISP's
customers to access the Internet using services and infrastructure owned and operated
by the wholesale ISP. VISPs resemble mobile virtual network operators and
6. Free ISPs: Free ISPs are Internet service providers that provide service free of
charge. Many free ISPs display advertisements while the user is connected; like
commercial television, in a sense they are selling the user's attention to the advertiser.
Other free ISPs, sometimes called freenets, are run on a nonprofit basis, usually with
volunteer staff.
provider with a network based on wireless networking. Technology may include Wi-
900 MHz, 2.4 GHz, 4.9, 5.2, 5.4, 5.7, and 5.8 GHz bands or licensed frequencies such
Page | 12
as 2.5 GHz (EBS/BRS), 3.65 GHz (NN) and in the UHF band (including the MMDS
1. Spectranet Ltd
received the operating license in 2009 to promote Internet services across Nigeria. Spectranet
was the first Internet Service Provider to launch 4G LTE internet service in Nigeria and aims
Tizeti is a fixed wireless broadband Internet service provider (ISP or WISP) operated by
Tizeti Inc, using Wireless to provide unlimited internet to residential and small business
customers in Africa. Tizeti currently operates within Lagos, Ogun, Edo, Port Harcourt, Benin,
Oyo, and Accra. Tizeti operates on the 5.4GHz Wi-Fi and 3.5GHz 4G LTE bands, connecting
companies, serving a multitude of needs across enterprises, small businesses and residents
industries and market segments using industry-leading technology (such as its very own
Fibre-To-The-Home (FTTH) cable technology) as the core access network infrastructure and
4. Astramix Ltd
With its office located at Zinna Court, 21 Mamman Nasir Street, Asokoro, FCT, Abuja
– Astramix Limited is working to become the major Internet Broadband and Data provider in
Nigeria. The company deploys first class communication technology for reliable,
Page | 13
uninterruptible and efficient top-of-the range data solutions in the market. With Grade ‘A’
brands as its exclusive sources of airtime, hardware and technology, Astramix is expanding
VDT is one of the most awarded Internet Service Providers in Nigeria. As a licensed Private
Network service provider, VDT specializes in the provision of Enterprise Wide Area
Network (WAN) and Metropolitan Area Network (MAN) link connectivity using Fiber Optic
and Wireless Communication infrastructure and access networks. VDT offers Broadband
communication service to corporate organizations with leased Fiber Optic trunks to the thirty-
six (36) states in Nigeria and the FCT, and counting with localised technical support staffers.
For more than 25 years Cyberspace Network has evolved from being just a startup providing
software solutions in the quest to solving as many problems as the team possibly can.
Through investing in people and technology in delivering exceptional customer service, its
mission had always been to distinguish itself as a complete solutions provider in the industry,
7. Cobranet Ltd
Cobranet currently offers corporate internet plans for organizations and medium sized
businesses over a state- of- the -art -radio network in Lagos, Abuja and Major Cities as well
as residential plans on a network topology which is rugged, dynamic and fully redundant with
negligible downtimes.
Page | 14
8. Radical Tech Network Ltd
Radical Technology Network Ltd was incorporated in Lagos, Nigeria on 08 Jan 2016 and
Dotmac Technologies Ltd is among the top Internet Service Providers in Nigeria. Operating
in Abuja, Dotmac Technologies delivers broadband internet via Fiber to the Home
services that are designed to improve and optimize the services of the clients.
Ngcom is a network company authorized by NCC to provide internet services across Nigeria.
Ngcom Network Solutions is one of Nigeria‘s leading Internet service providers offering
Unlimited Internet service to residential and business users. Its core business is to link you to
what matters most to you, by offering limitless Internet access with absolutely no data or time
MainOne is one of the top Internet Service Providers in Nigeria. MainOne, an Equinix
Company, is a leading West African data center and connectivity solutions provider with
presence in Nigeria, Ghana, and Côte d’Ivoire. MainOne provides highly reliable services to
major telecom operators, ISPs, government agencies, small to large enterprises, and
educational institutions. MDXi, a subsidiary of MainOne, builds and operates data centers
Services provider, wholly owned by the Federal Government of Nigeria. Galaxy Backbone
continues to operate, improve and upgrade its common services platform to meet
Page | 15
international standards. GBB’s initial major directive when it commenced operations in 2006
was to help reduce and completely eradicate the silos that had been in existence in
government as a result of the diverse and expensive manner in which technology operations
were delivered across the Ministries, Departments and Agencies. The company was also
charged with the responsibility of building a common services platform consisting of in-
country and offshore VSAT hubs, a data center, a Federal Capital metro fiber backbone and
group of companies partners with YahClick (powered by Hughes) notable as one of the oldest
names in the African Internet space, having achieved its license in Nigeria since 1997. Range
of services marketed include; Fiber optic and Vsat connectivity, Internet services consulting,
E-mail services, VOIP and PABX services, Web development and hosting, LAN and WAN
network Designs, Planning and Installation, Intranet and Virtual Private Network (VPN)
implementation, Mini Hub supply, ISP design and setup, Microwave – Wifi – WiMax and
Page | 16
3.5 FACTORS TO CONSIDER WHEN CHOOSING AN ISP
Some of the key factors to consider when choosing an ISP include the following:
1. Reliability
3. Availability
4. Security
5. Scalability
6. Pricing, etc.
(ISPs)
They offer advantages such as accessibility and a variety of services, but also present
disadvantages like costs and privacy concerns. Overall, ISPs play a significant role in our
Page | 17
CONCLUSION
It is evident that computer networking plays a critical role in the success of businesses. It
enhances communication, increases efficiency, enables remote work, and enhances security.
The Internet is the most unlimited source of information for everyone who can access it. Be it
communicating with people sitting at another corner of the world or addressing thousands of
people together, the internet has made it possible for all of us within seconds. ISPs enable us
connect to the internet via a modem in homes or businesses. Without an ISP, we would not be
able to access the wealth of information available online. ISPs provide us with fast and
REFRENCES
Page | 18
1. Md. Humayun Kabir. Data Communication and Computer Networking Lab
Manual. International Islamic University Chittagong. Report number: Lab
Manual 01
4. Alexandra Twin, Caitlin Clarke. Internet Service Provider (ISP): What They Do
and Examples: Update June 19, 2024.
6. Yen A.C. (2000). Internet Service Provider Liability for Subscriber Copy right
Infringement, Enterprise Liability, and the First Amendment, The Georgetown
Law Journal, Vol 8.
7. Van Eeten, M., Bauer, J., Asghari, H., Tabatabaie, S., Rand, D. (2010). The Role
of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based
on Spam Data.
Page | 19