Cyber Security Module 1 Lesson 1 Notes
Cyber Security Module 1 Lesson 1 Notes
Cyber Security Module 1 Lesson 1 Notes
Exploring the
Fundamentals
of Networking
Module 1 Lesson 1
Summary Notes
2 www.shawacademy.com
Contents
3 Introduction
Lesson outcomes
Introduction to networking
7 Network topologies
10 Conclusion
11 References
Lesson outcomes
By the end of this lesson, you should be able to:
Introduction
The first lesson in this course is an introduction to the fundamentals of computer networking.
A computer network is a telecommunications network that enables the sharing of resources and information using either
cable or wireless media and a system of digital rules to exchange data.
Introduction to networking
History of computer networking
The earliest concept of computer network was proposed by Leonard Kleinrock in 1961, where the concept of ARPANET
(Advanced Research Projects Agency Network) was first conceived. ARPANET was one of the first wide-area networks to
transfer data connecting two nodes at UCLA (University of California, Los Angeles) and SRI (Stanford Research Institute).
Common terminology
Some of the more commonly-used networking terms:
Internet - a global computer pool of interconnected networks that provides resources and information. This pool
comprises interconnected networks and uses standardised communication protocols to transmit data, resources to other
web servers, and ISP (internet service provider).
World wide web (www) - a subset of the internet consisting of web pages hosted on a web server that are readily
accessible over the internet and that can send resources and information over HTTP (Hypertext Transfer Protocol) and
HTTPS (Hypertext Transfer Protocol Secure).
Internet Messaging program (IMP) - a web-based email system that facilitates the upload of data to an existing web
server. IMP was first used when data was transmitted on ARPANET.
Ethernet - a standardised technology for connecting devices in a Local Area Network (LAN) or Wide Area Network (WAN)
with Ethernet cables.
Router - a device with the ability to forward data packets from one subnet to another subnet.
For example: Data sent from 192.168.1.8 to 192.168.2.10.
Switches - network devices that transmit data within the same subnet.
For example: Data sent from 192.168.1.8 to 192.168.1.9 .
Domain Name System (DNS) - a hierarchical naming system that translates domain names to IP addresses with the help
of the Fully Qualified Domain Name (FQDN).
Firewall - the first line of defence in a network that monitors, and if necessary, blocks, incoming and outgoing traffic.
Protocols - a set of rules and regulations used by connected devices to communicate over the network.
Some examples:
• Transmission Cl protocol (TCP) uses a three-way handshake to verify connectivity before data is sent. It is used in
email, filesharing and downloading.
• User Datagram Protocol (UDP) is used in networking where a higher speed of transmission is required, and data
loss tolerance is low, such as voice calls, DNS lookup and video streaming.
• Internet Protocol (IP) works as a unique identifier for a network device - the data (packet) is enclosed with the
sender IP and the recipient IP addresses to make it easier to locate the recipient address.
• Internet Control Messages Protocol (ICMP) is one of the most commonly-used protocols when it comes to error
checking and communication reports between two hosts.
• Network Time Protocol (NTP) helps to keep track of time and a record of communications in a network using a port
123.
• Point-to-Point Protocol (PPP) is a convenient means for transporting multi-protocol datagrams over point-to-point
links, for example trunking between switches or routers.
• Netware Core Protocol (NCP) is a file-sharing protocol that enables the communication between point-to-point
protocol.
• File Transfer Protocol (FTP) aids the provision for uploading and downloading files and data from a remote host
running on an FTP server.
• Hypertext Transfer Protocol (HTTP) is another commonly-used protocol that runs on port 80 and aids the use of
text, images, graphics, multimedia, and the downloading of information(data) from a client to a web server
• Hypertext Transfer Protocol Secure (HTTPS) is an updated version of the HTTP (Hypertext Transfer Protocol) that
runs on port 433 with more security features for the transmission of data(information).
• Simple Mail Transfer Protocol (SMTP) runs on a default port 25 and uses TCP connectivity to verify error during
transmission.
• Secure File Transfer Protocol (SFTP) is an updated version of the FTP with more security to encrypt data between
client and server communication.
• Remote Desktop Protocol (RDP) is used to create a remote session between two hosts.
• Voice-over Internet Protocol (VoIP) is the transmission of voice data in the form of network packets as opposed to
using traditional cabling.
Data encapsulation refers to data binding when a packet is created. A logical bit of data is altered to form a PDU (protocol
data unit) which comprises of the user's data. An additional TCP segment is added to PDU (protocol data unit), followed by
an IP packet segment and lastly an Ethernet frame to form a complete packet that is sent from web server to web client.
Data de-encapsulation is the reverse of the encapsulation process where the PDU (protocol data unit) is removed one after
the other to get the raw data.
Network topologies
Introduction to network topology
Network topology is the way a network is arranged, and it can be physical or logical.
The physical network topology reflects the tangible connections such as wires, cables, devices, etc. It shows how the
network is structured.
The logical network topology is the conceptual and strategic structure of the network. It shows how data(information)
will be transmitted.
Star topology
ADVANTAGES DISADVANTAGES
• Easily managed • If central hub goes down, entire
• In the case of a network network goes offline
attack, if one of the • Bandwidth and performance
connected devices goes limited by the centralised node
offline, the other part of the configurations
network is still functional
• Easily scalable by
connecting more devices to
the centralised node
Bus topology
• Has a visual representation where devices are connected along a single cable,
running from one to the other on the network
• Common way of describing bus topology is a line topology where data is
transmitted from one to another on a line
ADVANTAGES DISADVANTAGES
• Structure makes it very cost- • Very vulnerable - if the cable
effective in design connected to the node is faulty
implementation all devices will lose their
• Topology makes it easy for connection
growth expansion - if more • Topology mostly suitable for
devices are needed to be smaller networks
added they are simply
connected to the line
connected to the node
Ring topology
ADVANTAGES DISADVANTAGES
• Greatly reduces the risk of • Very vulnerable to network
collision on the network - failure
only one node can transmit • Requires a lot of monitoring to
data at a time be able to detect network
• Good structure of flow of failure
data, i.e. data flow in a • Not easily scalable because all
circular path until it gets to the connected devices share
its destination bandwidth
• Is cost-effective and cheap
to install and manage
Dual-ring topology
• Very similar topology to the ring topology, but in this case, data only travels in
one direction at a time
• Dual ring is seen as half-duplex because of its nature
ADVANTAGE DISADVANTAGE
Main advantage is redundancy - Main drawback is the cost - being
if the topology is structured to able to implement the logical and
be more efficient, traffic mainly physical structure of this topology
travels in both directions in the costs a lot of funds and resources
network
Tree topology
• Gets its name from the visual representation of the network, where the
centralised node is directly connected to a secondary node, and devices in the
network are connected to the secondary node
• There is a form of trunking from the centralised node to the secondary node
ADVANTAGES DISADVANTAGES
• Good management • If centralised node goes offline,
efficiency entire branch loses its
• Growth expansion is easy connectivity
• Not cheap to implement
Mesh topology
ADVANTAGE DISADVANTAGES
More stable and reliable due to • Not very cost-effective
its structure - in a case of • Very complex to set up- have to
network failure on the link, there link (cables) interconnecting all
is another link to the traffic to devices in the network
fall back on
Hybrid topology
ADVANTAGE DISADVANTAGES
Main benefit of implementing • The more types of topology
this topology is flexibility - more added to the network, the
than one of the types of harder it becomes to manage
topology can be added to create • Not cost-efficient
the structure a company or
organisation wants
Conclusion
As an introduction to computer networking, we have looked at some common terminology and hardware. We delved a bit
deeper into network data transmission by examining two models and we explored various network typologies.
References
• WANG, J. and PROVAN, G. (2009). TOPOLOGICAL ANALYSIS OF SPECIFIC SPATIAL COMPLEX
NETWORKS. Advances in Complex Systems, 12(01), pp.45–71.
• ZHU, L. and HAN, D. (2013). Topological evolution on synchronization of dynamic complex
networks. Journal of Computer Applications, 32(2), pp.330–334.
• Call for Papers Computer Networking Symposium. (1981). Computer, 14(5), pp.117–117.
• Bird, D. and Harwood, M. (2005). Network+. Indianapolis, Ind.: Que.
• Boecking, S. (2000). Object-oriented network protocols. Harlow, England; New York: Addison-
Wesley.
• Miry, Abbas. (2020). Computer Network Chapter (3) Network Layer: Logical Addressing.
• 10.13140/RG.2.2.10058.11208.jmexclusives (2019). Albert Einstein Modern Physics Master. [online]
jmexclusives. Available at: https://josephmuciraexclusives.com/albert-einstein/ [Accessed 17 Sep.
2020].
• Gaur, K. (n.d.). Characteristics of a Computer Network: Topology. [online] TurboFuture -
• Technology. Available at: https://turbofuture.com/computers/Characteristics-of-a-computer
network#:~:text=A%20network%20topology%20can%20be [Accessed 20 Sep. 2020].
• Software Reviews, Opinions, and Tips - DNSstuff. 2020. What Is Network Topology? Best Guide to
Types & Diagrams - Dnsstuff. [online] Available at: <https://www.dnsstuff.com/what-is-
network-topology> [Accessed 20 September 2020].