Facebook Pixel
Searching...
English
EnglishEnglish
EspañolSpanish
简体中文Chinese
FrançaisFrench
DeutschGerman
日本語Japanese
PortuguêsPortuguese
ItalianoItalian
한국어Korean
РусскийRussian
NederlandsDutch
العربيةArabic
PolskiPolish
हिन्दीHindi
Tiếng ViệtVietnamese
SvenskaSwedish
ΕλληνικάGreek
TürkçeTurkish
ไทยThai
ČeštinaCzech
RomânăRomanian
MagyarHungarian
УкраїнськаUkrainian
Bahasa IndonesiaIndonesian
DanskDanish
SuomiFinnish
БългарскиBulgarian
עבריתHebrew
NorskNorwegian
HrvatskiCroatian
CatalàCatalan
SlovenčinaSlovak
LietuviųLithuanian
SlovenščinaSlovenian
СрпскиSerbian
EestiEstonian
LatviešuLatvian
فارسیPersian
മലയാളംMalayalam
தமிழ்Tamil
اردوUrdu
Computer Networks and Internets

Computer Networks and Internets

by Douglas E. Comer 1996 768 pages
3.74
100+ ratings
Listen
Listen to Summary

Key Takeaways

1. Networking's Complexity Stems from Rapid Evolution and Diverse Technologies

Because computer networking is an active and rapidly changing field, the subject seems complex.

Constant Change. The dynamic nature of computer networking, characterized by continuous technological advancements and the emergence of new commercial products and services, contributes significantly to its perceived complexity. This constant flux makes it challenging to establish a stable theoretical framework.

Lack of Unifying Theory. The absence of a single, overarching theory that seamlessly integrates all aspects of networking further exacerbates the complexity. Multiple organizations have developed standards, some of which are incompatible, leading to a fragmented landscape.

Terminology Challenges. The field suffers from inconsistent terminology, with various groups coining their own terms, often driven by marketing or research interests. This results in a confusing mix of synonyms, misused terms, and product-specific jargon, making it difficult for newcomers to navigate the subject.

2. Mastering Networking Requires a Broad Understanding of Key Aspects

To master the complexity in networking, it is important to gain a broad background that includes five key aspects of the subject.

Five Pillars of Networking. A comprehensive grasp of computer networking necessitates a solid foundation in five core areas: network applications and programming, data communications, packet switching and networking technologies, internetworking with TCP/IP, and additional networking concepts and technologies.

Applications and Programming. Understanding how applications utilize network services and the underlying programming interfaces is crucial. Knowledge of network mechanisms enables programmers to create more efficient and robust applications.

Data Communications Foundation. Data communications provides the fundamental concepts and vocabulary upon which networking is built. Understanding bandwidth, modulation, multiplexing, and other low-level details is essential for comprehending higher-level protocols and technologies.

3. The Internet's Public and Private Nature Dictates Access and Security

A network is said to be private if use of the network is restricted to one group.

Public vs. Private. The Internet comprises both public networks, owned by service providers and available to subscribers, and private networks, controlled by specific groups or organizations. This distinction influences access policies and security measures.

Private Network Categories. Private networks are further categorized based on size and purpose:

  • Consumer: Small networks for individual use.
  • SOHO (Small Office/Home Office): Networks connecting a few devices in a home or small office.
  • SMB (Small-to-Medium Business): Networks supporting multiple offices and production facilities.
  • Large Enterprise: Extensive networks spanning geographic sites and supporting major corporations.

Security Implications. While public networks offer broad accessibility, they also necessitate stringent security measures to protect data from unauthorized access. Private networks, on the other hand, can implement tailored security policies based on the specific needs and resources of the controlling group.

4. Standards and Protocols Ensure Interoperability in Computer Networks

To ensure that entities can interoperate correctly, rules for all aspects of communication are written down.

Interoperability is Key. Successful communication requires all entities in a network to adhere to a common set of rules and specifications. This ensures interoperability, the ability of different systems to communicate without misunderstandings.

Communication Protocols. These specifications, known as communication protocols, define the details for various aspects of network communication, from electrical voltages to message formats. Protocols also address error handling and unexpected situations.

Protocol Suites and Layering Models. To manage complexity and ensure efficient communication, protocols are organized into suites or families, following a layering model. This model divides communication tasks into distinct layers, each handling a specific aspect of the process.

5. The Internet's Evolution Reflects a Shift from Resource Sharing to Multimedia

The availability of high-speed computation and communication technologies shifted the focus of the Internet from resource sharing to general-purpose communication.

Early Focus on Resource Sharing. Early computer networks, including the ARPANET, were primarily designed to facilitate resource sharing among expensive, centralized computers. This allowed researchers to access specialized hardware and software remotely.

Shift to General-Purpose Communication. The advent of powerful personal computers and high-speed communication technologies led to a shift in focus from resource sharing to general-purpose communication. This enabled new applications and services that catered to a broader audience.

Multimedia Revolution. The type of data transmitted over the Internet has evolved from static text to rich multimedia content, including graphics, audio, and video. This transition has been fueled by increasing bandwidth and advancements in compression technologies.

6. Internet Applications Rely on Client-Server and Peer-to-Peer Models

Although it provides basic communication, the Internet does not initiate contact with, or accept contact from, a remote computer; application programs known as clients and servers handle all services.

Client-Server Paradigm. The client-server model is a fundamental interaction pattern in network applications. A server program waits passively for connections from client programs, which initiate communication to request services.

Client and Server Characteristics. Clients are typically user-facing applications that request services from servers. Servers, on the other hand, are specialized programs that provide services to multiple clients concurrently.

Peer-to-Peer (P2P) Architecture. An alternative to the client-server model, P2P architectures distribute data and processing tasks among a network of interconnected peers. This approach can improve scalability and resilience by eliminating central bottlenecks.

7. Data Communications Provides the Foundation for Networking Technologies

Although it deals with many low-level details, data communications provides a foundation of concepts on which the rest of networking is built.

Bridging the Physical and Digital Worlds. Data communications focuses on the low-level mechanisms and technologies used to transmit information across physical media. This includes understanding signal characteristics, transmission media, and modulation techniques.

Essential Concepts. Despite its low-level focus, data communications introduces several key concepts that are crucial for understanding networking. These include bandwidth, multiplexing, error detection and correction, and modulation.

Influence on Protocol Design. The principles of data communications directly influence the design of communication protocols. For example, the concept of bandwidth limitations informs the design of congestion control mechanisms.

8. Packet Switching Enables Efficient Data Transmission Over Shared Networks

Because each network technology is created to meet various requirements for speed, distance, and economic cost, many packet switching technologies exist.

Revolutionizing Data Communications. Packet switching revolutionized data communications by enabling multiple senders to transmit data over a shared network without establishing dedicated circuits. This approach divides data into small blocks called packets, each containing destination information.

Network Devices and Routing. Devices within the network use the destination information to choose a path for each packet, ensuring it eventually reaches its intended recipient. This dynamic routing allows for efficient use of network resources.

Variety of Technologies. The flexibility of packet switching has led to the development of numerous network technologies, each optimized for specific requirements. These technologies differ in packet size, addressing schemes, and methods for coordinating access to the shared medium.

9. TCP/IP Internetworking Achieves Universal Service Through Virtualization

Internetworking is substantially more powerful than a single networking technology because the approach permits new technologies to be incorporated at any time without requiring the wholesale replacement of old technologies.

Interconnecting Heterogeneous Networks. Internetworking, exemplified by the TCP/IP protocol suite, enables the interconnection of diverse packet switching networks into a functioning whole. This approach avoids the limitations of relying on a single networking technology.

Virtualization and Network Independence. TCP/IP achieves universal service by defining a network-independent packet format and addressing scheme. This virtualization approach allows data to be transmitted across any underlying network, regardless of its specific characteristics.

Continual Evolution. The Internet's ability to incorporate new packet switching technologies without disrupting existing networks is a major driver of innovation. This allows engineers to experiment with new technologies and adapt to evolving needs.

10. The OSI Model Offers an Alternative Perspective on Network Layers

Eventually, it became clear that TCP/IP technology was technically superior to OSI, and in a matter of a few years, efforts to develop and deploy OSI protocols were terminated.

ISO's Seven-Layer Model. The International Organization for Standardization (ISO) developed the Open Systems Interconnection (OSI) Seven-Layer Reference Model as an alternative to the TCP/IP model. This model divides network communication into seven distinct layers.

TCP/IP's Dominance. Despite the efforts to promote the OSI model, TCP/IP technology proved to be technically superior and gained widespread adoption. The OSI protocols were eventually abandoned.

Enduring Influence. Although the OSI protocols failed to gain traction, the seven-layer model remains a valuable conceptual tool for understanding network communication. Many professionals still use the model to describe applications and protocols, even within the TCP/IP framework.

Last updated:

Review Summary

3.74 out of 5
Average of 100+ ratings from Goodreads and Amazon.

Computer Networks and Internets receives mixed reviews, with an overall rating of 3.74 out of 5. Some readers find it an excellent introduction to networks and the internet, praising its engaging writing style and comprehensive coverage. Others criticize it as dated and dry, suggesting it's better suited for those with prior knowledge. The book is noted for its code examples and ability to explain complex concepts. While some find it too simplified, others appreciate its accessibility for beginners. Overall, it's considered a valuable resource for understanding network fundamentals.

Your rating:

About the Author

Douglas E. Comer is an expert in computer networks and internetworking. As the author of "Computer Networks and Internets," he has established himself as a leading authority in the field. Comer's work focuses on explaining complex networking concepts in an accessible manner, making it suitable for both beginners and experienced professionals. His approach combines theoretical knowledge with practical examples, including code snippets, to enhance understanding. Comer's expertise extends beyond this book, as he has authored numerous publications on computer science and networking topics. His contributions have significantly influenced the way computer networks and internet technologies are taught and understood in academic and professional settings.

0:00
-0:00
1x
Dan
Andrew
Michelle
Lauren
Select Speed
1.0×
+
200 words per minute
Home
Library
Get App
Create a free account to unlock:
Requests: Request new book summaries
Bookmarks: Save your favorite books
History: Revisit books later
Recommendations: Get personalized suggestions
Ratings: Rate books & see your ratings
Try Full Access for 7 Days
Listen, bookmark, and more
Compare Features Free Pro
📖 Read Summaries
All summaries are free to read in 40 languages
🎧 Listen to Summaries
Listen to unlimited summaries in 40 languages
❤️ Unlimited Bookmarks
Free users are limited to 10
📜 Unlimited History
Free users are limited to 10
Risk-Free Timeline
Today: Get Instant Access
Listen to full summaries of 73,530 books. That's 12,000+ hours of audio!
Day 4: Trial Reminder
We'll send you a notification that your trial is ending soon.
Day 7: Your subscription begins
You'll be charged on Apr 26,
cancel anytime before.
Consume 2.8x More Books
2.8x more books Listening Reading
Our users love us
100,000+ readers
"...I can 10x the number of books I can read..."
"...exceptionally accurate, engaging, and beautifully presented..."
"...better than any amazon review when I'm making a book-buying decision..."
Save 62%
Yearly
$119.88 $44.99/year
$3.75/mo
Monthly
$9.99/mo
Try Free & Unlock
7 days free, then $44.99/year. Cancel anytime.
Scanner
Find a barcode to scan

Settings
General
Widget
Appearance
Loading...
Black Friday Sale 🎉
$20 off Lifetime Access
$79.99 $59.99
Upgrade Now →