0% found this document useful (0 votes)
6 views

Networking Notes Capter 1

A computer network is a system of interconnected devices that communicate and share resources using communication protocols. The document outlines the history, benefits, components, types, advantages, applications, and key network devices associated with computer networks, as well as the OSI and TCP/IP models. It emphasizes the importance of network software and the functionalities of various network components in facilitating efficient communication and management.

Uploaded by

shreya.d2829
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Networking Notes Capter 1

A computer network is a system of interconnected devices that communicate and share resources using communication protocols. The document outlines the history, benefits, components, types, advantages, applications, and key network devices associated with computer networks, as well as the OSI and TCP/IP models. It emphasizes the importance of network software and the functionalities of various network components in facilitating efficient communication and management.

Uploaded by

shreya.d2829
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

What is a Computer Network?

A computer network is a system of interconnected computing devices, such as computers,


servers, printers, and other hardware, communicating and sharing resources over a
transmission medium. These devices use predefined rules, called communication protocols,
to exchange information efficiently and reliably.
History:
1950s:
Early computers operated in isolation, with no interconnected systems.
1960s:
ARPANET developed in 1969, pioneering packet switching and becoming the
foundation of the Internet.
1970s:
Introduction of TCP/IP protocols and Ethernet, standardizing communication and
enabling local area networks (LANs).
1980s:
Expansion of academic networks like USENET and CSNET.
The Domain Name System (DNS) simplified addressing with domain names.
1990s:
Birth of the modern Internet and the World Wide Web (WWW) by Tim Berners-Lee.
High-speed connections like ISDN and DSL gained popularity.
2000s:
Wi-Fi and mobile networks (3G, 4G) became widespread.
Cloud computing services emerged.
2010s - Present:
5G networks, IoT, and advanced technologies like SDN and edge computing
revolutionized networking.
Definition:
A computer network is a group of interconnected devices communicating and sharing
resources, such as data, hardware, and software, using communication protocols over a
transmission medium.
Benefits of Computer Networking
Resource Sharing:
Devices like printers, scanners, and storage can be shared among multiple users.
Data Sharing:
Enables the transfer of files and data between devices quickly and efficiently.
Improved Communication:
Facilitates instant communication through emails, messaging, and video
conferencing.
Cost Efficiency:
Reduces the cost of hardware by sharing resources.
Centralized Management:
Simplifies management through centralized control of data, security, and updates.
Components of a Computer Network
Nodes:
Devices in a network, such as computers, servers, printers, or smartphones.
Links:
Physical or wireless connections that enable communication between nodes.
Protocols:
Rules and conventions for communication, such as TCP/IP.
Network Interface Card (NIC):
A hardware component that connects a device to the network.
Switches and Hubs:
Devices are used to connect multiple devices in a network.
Routers:
Direct data packets between networks and enable internet connectivity.
Cables and Wireless Media:
Transmission media for data transfer, such as Ethernet cables, fiber optics, and Wi-Fi.
Types of Computer Networks
Based on Size:
LAN (Local Area Network):
Covers a small area, such as an office or home.
Example: A home Wi-Fi network.
MAN (Metropolitan Area Network):
Covers a city or town.
Example: Cable TV networks.
WAN (Wide Area Network):
Covers a large geographical area, often using leased lines.
Example: The Internet.
PAN (Personal Area Network):
Covers a very small area, such as a single user’s devices.
Example: Bluetooth devices.
Based on Topology:
Bus Topology:
Devices are connected to a single communication line.
Star Topology:
Devices are connected to a central hub.
Ring Topology:
Devices form a closed loop.
Mesh Topology:
Devices are interconnected.
Hybrid Topology:
A combination of two or more topologies.
Based on Functionality:
Client-Server Network:
Centralized control with a server and client devices.
Peer-to-Peer Network:
All devices are equal and share resources directly.

Advantages of Computer Networks


Increased Productivity:
Enables collaboration and faster data sharing.
Data Redundancy:
Centralized backups ensure data is not lost.
Improved Security:
Firewalls and encryption secure sensitive data.
Global Connectivity:
The Internet connects users and businesses worldwide.

Applications of Computer Networks


Business:
Shared access to databases, email communication, and real-time collaboration.
Education:
Access to online resources, virtual classrooms, and shared learning platforms.
Entertainment:
Streaming services like Netflix and online gaming.
Healthcare:
Telemedicine, centralized patient records, and remote diagnostics.
Network Devices / Components and Their Functions
Hub:
Function: Broadcasts data to all connected devices, regardless of the intended
recipient.
Key Feature: Operates at the physical layer and is less efficient compared to a switch.
Example: Suitable for small networks with minimal traffic.
Repeater:
Function: Amplifies and retransmits signals to extend the range of a network.
Key Feature: Operates at the physical layer, ensuring signals remain strong over long
distances.
Example: Used in a long Ethernet cable setup to prevent signal degradation.
Bridge:
Function: Connects two separate LANs to function as a single network.
Key Feature: Operates at the data link layer and forwards data based on MAC
addresses.
Example: Linking an old network with a new one.
Switch:
Function: Connects devices within a Local Area Network (LAN).
Key Feature: Forwards data specifically to the device with the matching MAC address,
enhancing efficiency.
Example: Used in office networks for device interconnectivity.
Multilayer Switch:
Function: Combines the functionalities of a switch (operating at the data link layer)
and a router (operating at the network layer).
Key Feature: Forwards data within a LAN based on MAC addresses (switching).
Routes data between different networks using IP addresses (routing).
Example: Used in enterprise networks to improve performance by handling both
switching and routing tasks efficiently.
Router:
Function: Directs data packets between different networks.
Key Feature: Determines the best path for data to reach its destination.
Example: Connecting a home network to the Internet.
Brouter (Bridge Router):
Function: Combines the functions of a bridge and a router.
Key Feature: Acts as a bridge to connect two LANs.
Functions as a router to route data between networks.
Example: Used in a network where devices need both routing and bridging
functionality for efficient communication.
Access Point (AP):
Function: Extends wireless connectivity within a network.
Key Feature: Connects wireless devices (e.g., laptops, smartphones) to a wired
network.
Example: Provides Wi-Fi in a home or office.
Gateway:
Function: Translates communication between different network protocols.
Key Feature: Operates as a bridge between two dissimilar networks (e.g., LAN to
WAN).
Example: Converting email messages from one format to another.
Firewall:
Function: Protects a network by monitoring and controlling incoming and outgoing
traffic based on predefined security rules.
Key Feature: Acts as a barrier between a trusted internal network and untrusted
external networks (e.g., the Internet).
Can be hardware-based, software-based, or a combination of both.
Example: Blocks unauthorized access attempts while allowing legitimate
communication, such as in corporate networks.
Network Interface Card (NIC):
Function: Enables a device to connect to a network.
Key Feature: Acts as a hardware interface between a computer and the network.
Can be wired (Ethernet NIC) or wireless (Wi-Fi NIC).
Example: Every desktop or laptop typically has a NIC to connect to the Internet or
LAN.
Network Software Concept
Network software refers to programs and protocols that facilitate communication,
management, and operation of computer networks. It works in tandem with hardware to
ensure smooth data transfer, efficient resource sharing, and secure operations.
Importance of Network Software
• Acts as the brain of a network, managing communication and operations.
• Provides security to protect sensitive data.
• Enhances network performance and reliability.
• Simplifies network management, reducing the workload for administrators.
Key Components of Network Software
Operating Systems with Networking Capabilities:
Examples: Windows Server, Linux, macOS, Cisco IOS.
Provide built-in support for networking features like file sharing, printer sharing, and
Internet connectivity.
Protocols:
Define rules and standards for communication between devices.
Common Protocols:
TCP/IP: Foundation of Internet communication.
HTTP/HTTPS: For accessing web pages.
FTP: For transferring files.
SMTP/IMAP/POP3: For email communication.
Network Management Software:
Tools for monitoring, controlling, and troubleshooting networks.
Examples: SolarWinds, Nagios, PRTG.
Functions: Bandwidth monitoring, error logging, and performance optimization.
Security Software:
Protects networks from threats like malware, hackers, and unauthorized access.
Examples:
Antivirus/Antimalware: Norton, McAfee.
Firewalls: Zone Alarm, Sophos.
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS).
Virtual Private Network (VPN) Software:
Enables secure remote access to a private network over the Internet.
Examples: OpenVPN, Cisco AnyConnect.
Network Virtualization Software:
Creates virtualized network components for enhanced flexibility and scalability.
Examples: VMware NSX, Microsoft Hyper-V.
Network Configuration Software:
Automates and simplifies network setup and management.
Examples: Ansible, Puppet, Cisco DNA Center.
File and Print Sharing Software:
Enables sharing of files and printers over a network.
Examples: Samba (for Linux), Windows File Sharing.
Functions of Network Software
Data Transmission:
Ensures reliable and efficient data exchange between devices.
Resource Sharing:
Manages shared access to hardware (e.g., printers) and software (e.g., applications).
Network Security:
Implements measures like encryption, authentication, and access control.
Error Detection and Recovery:
Identifies network issues and applies corrective actions to maintain communication.
Traffic Management:
Balances network load and prioritizes data flow for critical tasks.

OSI Model:
The Open Systems Interconnection (OSI) Model is a conceptual framework that standardizes
the functions of a telecommunication or networking system into seven distinct layers. Each
layer serves a specific purpose and interacts with the layers directly above and below it.

How the OSI Model Works


Data moves downward from Layer 7 (Application) to Layer 1 (Physical) at the sender’s side,
where it is transmitted over the network. At the receiver’s end, data moves upward from
Layer 1 to Layer 7, reconstructing the original message. Each layer wraps the data with its
header (and sometimes trailer) before passing it to the next layer.
The 7 Layers of the OSI Model
Physical Layer (Layer 1)
Function: Transmits raw binary data (bits) over a physical medium.
Key Responsibilities:
Defines hardware specifications like cables, connectors, and signal types.
Manages the transmission and reception of unstructured data.
Examples: Ethernet cables, fiber optics, hubs, repeaters.
Data Link Layer (Layer 2)
Function: Provides reliable data transfer by handling errors in the physical layer.
Key Responsibilities:
Divides data into frames for transmission.
Adds MAC (Media Access Control) addresses for device identification.
Manages error detection (e.g., cyclic redundancy check).
Examples: Switches, bridges, MAC addresses.
Sub-Layers:
MAC Layer: Controls access to the physical medium.
LLC Layer (Logical Link Control): Ensures error-free delivery.
Network Layer (Layer 3)
Function: Determines the best path for data to travel from source to destination.
Key Responsibilities:
Logical addressing (IP addresses).
Routing and forwarding data packets.
Fragmentation and reassembly of packets.
Examples: Routers, IP (IPv4, IPv6), ICMP, ARP.
Transport Layer (Layer 4)
Function: Ensures complete and reliable data transfer between devices.
Key Responsibilities:
Flow control to prevent data overflow.
Error correction and retransmission.
Segmentation of data into smaller chunks.
Port addressing to identify specific applications.
Protocols:
TCP (Transmission Control Protocol): Reliable and connection-oriented.
UDP (User Datagram Protocol): Faster but connectionless.
Session Layer (Layer 5)
Function: Establishes, manages, and terminates communication sessions.
Key Responsibilities:
Synchronization and dialogue control between devices.
Maintains sessions during data exchange.
Examples: NetBIOS, PPTP, SMB.
Presentation Layer (Layer 6)
Function: Ensures data is in a readable and usable format for the application layer.
Key Responsibilities:
Data translation (e.g., converting ASCII to EBCDIC).
Data encryption and decryption for security.
Data compression to reduce file size.
Examples: SSL/TLS, JPEG, GIF, MPEG.
Application Layer (Layer 7)
Function: Provides services directly to the end user or applications.
Key Responsibilities:
Interacts with software applications for data exchange.
Ensures proper communication using application protocols.
Examples: HTTP, FTP, SMTP, DNS, Telnet.
Benefits of the OSI Model
Standardization: Provides a universal framework for understanding and implementing
networking protocols.
Modularity: Each layer operates independently, making troubleshooting easier.
Interoperability: Ensures devices from different vendors can communicate seamlessly.
Scalability: Simplifies the addition of new technologies without disrupting existing systems.

TCP/IP Model:
The TCP/IP Model (Transmission Control Protocol/Internet Protocol) is a set of
communication protocols used to interconnect devices on the Internet. It is the foundational
model for the Internet and networking, and it works as a simplified alternative to the OSI
model. The TCP/IP model has four layers, each corresponding to a different set of tasks and
responsibilities.

How the TCP/IP Model Works


Data Encapsulation:
Just like the OSI model, the TCP/IP model uses data encapsulation, where data is passed
down from the Application Layer to the Transport Layer, then to the Internet Layer, and
finally to the Link Layer for transmission. Each layer adds its header (or trailer) containing
control information.
Data Transmission:
The sender’s device prepares the data at the Application Layer and sends it down the stack
to the Link Layer, where it is transmitted over the physical network. At the receiver’s side, the
process happens in reverse: the data is received at the Link Layer and passed up through the
stack until it reaches the Application Layer for processing.
The 4 Layers of the TCP/IP Model
Link Layer (Network Interface Layer)
Function: Defines how data is physically transmitted over a network.
Key Responsibilities:
Handles all the hardware and lower-level protocols for communication.
Deals with the actual transmission of data over physical devices like cables, wireless
channels, and network adapters.
Responsible for framing, addressing, and error detection.
Examples: Ethernet, Wi-Fi, ARP (Address Resolution Protocol).
Equivalent to OSI Layers: Physical Layer + Data Link Layer.
Internet Layer
Function: Routes data packets across networks and handles logical addressing.
Key Responsibilities:
Responsible for addressing, packaging, and routing the data to its destination across
diverse networks.
Implements logical addressing using IP addresses and routing to find the best path.
Fragmentation of data to fit network constraints.
Protocols:
IP (Internet Protocol): Responsible for addressing and routing packets.
ICMP (Internet Control Message Protocol): Used for error reporting and diagnostics
(e.g., ping).
ARP (Address Resolution Protocol): Resolves IP addresses to MAC addresses.
Equivalent to OSI Layer: Network Layer.
Transport Layer
Function: Ensures reliable data transfer between two devices by managing data flow,
error detection, and retransmission.
Key Responsibilities:
Provides end-to-end communication between devices.
Ensures that data is delivered reliably and in the correct order.
Performs error detection, flow control, and retransmission of lost data.
Protocols:
TCP (Transmission Control Protocol): Reliable, connection-oriented protocol that
ensures the data arrives correctly.
UDP (User Datagram Protocol): Unreliable, connectionless protocol that offers faster
transmission with no guarantee of delivery.
Equivalent to OSI Layer: Transport Layer.
Application Layer
Function: Provides application services and user interfaces.
Key Responsibilities:
Defines the protocols and services that applications use for network communication.
Interfaces directly with end-user software, such as web browsers, email clients, and
file transfer tools.
Protocols:
HTTP/HTTPS: Used for web communication.
FTP (File Transfer Protocol): Used for file transfers.
SMTP (Simple Mail Transfer Protocol): For email communication.
DNS (Domain Name System): Resolves domain names to IP addresses.
Equivalent to OSI Layer: Application Layer, Presentation Layer, and Session Layer.
Key Advantages of the TCP/IP Model
Simplicity:
The TCP/IP model has fewer layers, which simplifies networking protocols and
system implementation.
Flexibility:
It supports a variety of hardware and network technologies.
Scalability:
The model is highly scalable and can handle networks of all sizes, from local area
networks (LANs) to large-scale global networks like the Internet.
Robustness:
TCP/IP is designed to be fault-tolerant, meaning it can recover from network failures.
Difference between TCP/IP and OSI Model:

You might also like