









Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A network is a set of devices that are connected with a physical media link. In a network, two or more nodes are connected by a physical link or two or more networks are connected by one or more nodes. A network is a collection of devices connected to each other to allow the sharing of data.
Typology: Lecture notes
1 / 16
This page cannot be seen from the preview
Don't miss anything!
● Network : A network is a set of devices that are connected with a physical media link. In a network, two or more nodes are connected by a physical link or two or more networks are connected by one or more nodes. A network is a collection of devices connected to each other to allow the sharing of data. ● Network Topology : Network topology specifies the layout of a computer network. It shows how devices and cables are connected to each other. Types of Network Topology : ● Star : ● Star topology is a network topology in which all the nodes are connected to a single device known as a central device. ● Star topology requires more cable compared to other topologies. Therefore, it is more robust as a failure in one cable will only disconnect a specific computer connected to this cable. ● If the central device is damaged, then the whole network fails. ● Star topology is very easy to install, manage and troubleshoot. It is commonly used in office and home networks. ● Ring :
● Bus :
● PAN (Personal Area Network) : Its range limit is up to 10 meters. It is created for personal use. Generally, personal devices are connected to this network. For example computers, telephones, fax, printers, etc. ● LAN (Local Area Network) : It is used for a small geographical location like office, hospital, school, etc. ● HAN (House Area Network) : It is actually a LAN that is used within a house and used to connect homely devices like personal computers, phones, printers, etc. ● CAN (Campus Area Network) : It is a connection of devices within a campus area which links to other departments of the organization within the same campus. ● MAN (Metropolitan Area Network) : It is used to connect the devices which span to large cities like metropolitan cities over a wide geographical area. ● WAN (Wide Area Network) : It is used over a wide geographical location that may range to connect cities and countries. ● GAN (Global Area Network) : It uses satellites to connect devices over the global area. ● VPN (Virtual Private Network) : VPN or the Virtual Private Network is a private WAN (Wide Area Network) built on the internet. It allows the creation of a secured tunnel (protected network) between different networks using the internet (public network). By using the VPN, a client can connect to the organization’s network remotely. ● Advantages of VPN :
● Access VPN: Access VPN is used to provide connectivity to remote mobile users and telecommuters. It serves as an alternative to dial-up connections or ISDN (Integrated Services Digital Network) connections. It is a low-cost solution and provides a wide range of connectivity. ● Site-to-Site VPN: A Site-to-Site or Router-to-Router VPN is commonly used in large companies having branches in different locations to connect the network of one office to another in different locations. There are 2 sub-categories as mentioned below: ● Intranet VPN: Intranet VPN is useful for connecting remote offices in different geographical locations using shared infrastructure (internet connectivity and servers) with the same accessibility policies as a private WAN (wide area network). ● Extranet VPN: Extranet VPN uses shared infrastructure over an intranet, suppliers, customers, partners, and other entities and connects them using dedicated connections. ● IPv4 Address : An IP address is a 32-bit dynamic address of a node in the network. An IPv4 address has 4 octets of 8-bit each with each number with a value up to 255. IPv classes are differentiated based on the number of hosts it supports on the network. There are five types of IPv4 classes and are based on the first octet of IP addresses which are classified as Class A, B, C, D, or E.
● Error control : It detects and corrects the error occurred during the transmission from source to destination. ● Addressing : Data-link layers attach the physical address with the data frames so that the individual machines can be easily identified. ● Link management : Data-link layer manages the initiation, maintenance and termination of the link between the source and destination for the effective exchange of data.
3. Network Layer ● Network layer converts the logical address into the physical address. ● The routing concept means it determines the best route for the packet to travel from source to the destination. Functions of network layer : ● Routing : The network layer determines the best route from source to destination. This function is known as routing. ● Logical addressing : The network layer defines the addressing scheme to identify each device uniquely. ● Packetizing : The network layer receives the data from the upper layer and converts the data into packets. This process is known as packetizing. ● Internetworking : The network layer provides the logical connection between the different types of networks for forming a bigger network. ● Fragmentation : It is a process of dividing the packets into fragments.. 4. Transport Layer ● It delivers the message through the network and provides error checking so that no error occurs during the transfer of data. ● It provides two kinds of services : ○ Connection-oriented transmission : In this transmission, the receiver sends the acknowledgement to the sender after the packet has been received.
○ Connectionless transmission : In this transmission, the receiver does not send the acknowledgement to the sender.
5. Session Layer ● The main responsibility of the session layer is beginning, maintaining and ending the communication between the devices. ● Session layer also reports the error coming from the upper layers. ● Session layer establishes and maintains the session between the two users. 6. Presentation Layer ● The presentation layer is also known as a Translation layer as it translates the data from one format to another format. ● At the sender side, this layer translates the data format used by the application layer to the common format and at the receiver side, this layer translates the common format into a format used by the application layer. Functions of presentation layer: ○ Character code translation ○ Data conversion ○ Data compression ○ Data encryption 7. Application Layer ● Application layer enables the user to access the network. ● It is the topmost layer of the OSI reference model. ● Application layer protocols are file transfer protocol, simple mail transfer protocol, domain name system, etc. ● The most widely used application protocol is HTTP(Hypertext transfer protocol ). A user sends the request for the web page using HTTP.
Important Protocols A protocol is a set of rules which is used to govern all the aspects of information communication.The main elements of a protocol are: ● Syntax : It specifies the structure or format of the data. It also specifies the order in which they are presented. ● Semantics : It specifies the meaning of each section of bits. ● Timing : Timing specifies two characteristics: When data should be sent and how fast it can be sent. ● DHCP : DHCP is the Dynamic Host Configuration Protocol. It is an application layer protocol used to auto-configure devices on IP networks enabling them to use the TCP and UDP-based protocols. The DHCP servers auto-assign the IPs and other network configurations to the devices individually which enables them to communicate over the IP network. It helps to get the subnet mask, IP address and helps to resolve the DNS. It uses port 67 by default. ● FTP : FTP is a File Transfer Protocol. It is an application layer protocol used to transfer files and data reliably and efficiently between hosts. It can also be used to download files from remote servers to your computer. It uses port 27 by default. ● ICMP : ICMP is the Internet Control Message Protocol. It is a network layer protocol used for error handling. It is mainly used by network devices like routers for diagnosing the network connection issues and crucial for error reporting and testing if the data is reaching the preferred destination in time. It uses port 7 by default. ● ARP : ARP is Address Resolution Protocol. It is a network-level protocol used to convert the logical address i.e. IP address to the device's physical address i.e. MAC address. It can also be used to get the MAC address of devices when they are trying to communicate over the local network. ● RIP :RIP stands for Routing Information Protocol. It is accessed by the routers to send data from one network to another. RIP is a dynamic protocol which is used to find the best route from source to the destination over a network by using the hop count
Important Key Points
1. What happens when you enter google.com in the web browser? (Most Imp) Steps : ● Check the browser cache first if the content is fresh and present in the cache display the same. ● If not, the browser checks if the IP of the URL is present in the cache (browser and OS) if not then requests the OS to do a DNS lookup using UDP to get the corresponding IP address of the URL from the DNS server to establish a new TCP connection. ● A new TCP connection is set between the browser and the server using three-way handshaking. ● An HTTP request is sent to the server using the TCP connection. ● The web servers running on the Servers handle the incoming HTTP request and send the HTTP response. ● The browser processes the HTTP response sent by the server and may close the TCP connection or reuse the same for future requests. ● If the response data is cacheable then browsers cache the same. ● Browser decodes the response and renders the content. 2. Hub: Hub is a networking device which is used to transmit the signal to each port (except one port) to respond from which the signal was received. Hub is operated on a Physical layer. In this packet filtering is not available. It is of two types: Active Hub, Passive Hub. Switch: Switch is a network device which is used to enable the connection establishment and connection termination on the basis of need. Switch is operated on the Data link layer. In this packet filtering is available. It is a type of full duplex transmission mode and it is also called an efficient bridge. 3. A subnet is a network inside a network achieved by the process called subnetting which helps divide a network into subnets. It is used for getting a higher routing efficiency and enhances the security of the network. It reduces the time to extract the host address from the routing table.
4. The reliability of a network can be measured by the following factors : ● Downtime: The downtime is defined as the required time to recover. ● Failure Frequency: It is the frequency when it fails to work the way it is intended. ● Catastrophe: It indicates that the network has been attacked by some unexpected event such as fire, earthquake. 5. There are mainly two criteria which make a network effective and efficient : ● Performance : performance can be measured in many ways like transmit time and response time. ● Reliability: reliability is measured by frequency of failure. ● Robustness : robustness specifies the quality or condition of being strong and in good condition. ● Security: It specifies how to protect data from unauthorized access and viruses. 6. Node and Link : A network is a connection setup of two or more computers directly connected by some physical mediums like optical fiber or coaxial cable. This physical medium of connection is known as a link, and the computers that it is connected to are known as nodes. 7. Gateway and router : A node that is connected to two or more networks is commonly known as a gateway. It is also known as a router. It is used to forward messages from one network to another. Both the gateway and router regulate the traffic in the network. Differences between gateway and router : A router sends the data between two similar networks while gateway sends the data between two dissimilar networks.
13. Ping : The "ping" is a utility program that allows you to check the connectivity between the network devices. You can ping devices using its IP address or name.
unicasting. This is commonly used in networks to establish a new connection. Anycasting: If the message is sent to any of the nodes from the source then it is known as anycasting. It is mainly used to get the content from any of the servers in the Content Delivery System. Multicasting: If the message is sent to a subset of nodes from the source then it is known as multicasting. Used to send the same data to multiple receivers. Broadcasting: If the message is sent to all the nodes in a network from a source then it is known as broadcasting. DHCP and ARP in the local network use broadcasting.