0% found this document useful (0 votes)
24 views7 pages

Computer Network and Security (Study Material)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views7 pages

Computer Network and Security (Study Material)

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer Network and Security

What is a Network?
• Communication of devices to transmit data (connect devices together)
• Wireless Access Point (Wi-Fi)
• Wired and Wireless network can be part of the same network
• Network’s goal is to move information from one device to another
• Receiver and sender must speak the same LANGUAGE to understand each other.
Language in network is called a PROTOCOL.

Network Types
• SOHO Network (Small Office Home Office Network)
o A small network
o Router is used to connect to the internet
• Enterprise Network
o May cover several floors in a building
o May also cover office building in different cities or even across different
countries
• Service Provider Network
o Provide internet access
o Offer services to connect their customers together
• Local Area Network (LAN)
o Devices are collected into a local area network
o Small network or may be part of a bigger network
• Wide Area Network (WAN)
o Networks that are far apart and joined together e.g. across countries.

Cabling Devices
• Wired (late 1960s) – uses cables to connect devices
• Wireless (early 1990s) – no cables
• Cables can be copper or fiber copper

Copper Cables Fiber Copper Cables


Made from Copper Made from Glass
Uses Electrical Signals Uses Light Signals
Used for Short Distances Used for Longer Distances
Affected by Interferences No Outside Interferences
Cheaper More Expensive
Ethernet Protocol (Designed by IEEE)

• Physical Part (Cabling and Speed)


• Media Access Control (How data should be formatted and sent)
Devices can connect regardless of speed
802 – LAN technologies
802.3 – Ethernet Standards
802.3i – 10 Mbps
802.3u – 100 Mbps
802.3ab – 1 Gbps
802.3an – 10 Gbps
Baseband – uses digital signal
Broadband – uses analog signal

Unshielded Twisted Pair (UTP)


• 4 pairs of wire
o Cat5 – 100 Mbps
o Cat5e – 1Gbps
o Cat6 – 10 Gbps (up to 55m)
o Cat6a – 10 Gbps (up to 100m)
o Cat7 – 40 Gbps (up to 50m) and 10 Gbps (up to 100m)
• Cables above have backward compatibility

UTP Setup

• Straight Through
o Wires go straight through from one end to another
o Transmitting and receiving data
o Connect host to a switch (not the same devices)
• Crossover
o Swaps pairs on one end, transmit lines up with receive
o Connect switch to another switch (same devices)
Auto-MDIx – can detect when wrong cable is used
• Full duplex – both ends can send/receive data simultaneously
o Dual core
• Half-duplex – both ends can send/receive data one at a time
o Single core

Types of Fiber

• Single Mode Fiber (SMF)


o Laser light
o Used for >2km distance
o More expensive
• MultiMode Fiber (MMF)
o LED light
o Used for 500m distance
o Cheaper
Attenuation - signal degrading or loss
LC Connector – common in switches and routers (dual core, can be single core)
SC Connector – older and larger

Wireless (Wi-Fi) by IEEE

• 802.11 (Wi-Fi) Standard


Network Addresses – each device on a network has an address
MAC Address
• each host has at least one MAC Address
• guaranteed to be unique
• used when one device needs to communicate with another device in the same LAN
segment

HOW the OSI Model Works


OSI Model – not specific technologies but how they fit into the network stack

OSI Model Mnemonics


Please Physical Layer
Lower layers
Do Data-Link Layer
Not Network
Throw Transport
Sausage Session
Pizza Presentation Upper Layers
Away Application

Application Layer
• where network APIs and apps that access the network live
• includes FTP and web browsing
• accessing emails
• transferring files
• management session (ssh, telnet, RTP)
Presentation Layer

• data should be in format that can easily be understood


• formats such as image and video files
• data conversion and formatting
• include encryption and decryption
Session Layer
• tracks application processes
• remote procedure calls and service requests
• create session between applications
• includes request to remote services
• session control protocol
Transport Layer

• data is broken into manageable chunks


• and if there’s a problem with the data, only one chunk needs to be resent, not the
entire file
• apps can take turn in sending chunks of data (multiplexing)
• transport data between endpoints
• TCP/UDP (common in this layer)
• Breaks data into segments
o TCP – blocks are called segments
o UDP – blocks are called datagram
Network Layer

• add more information, adding destination address


• add information to the front is called header
• add information to the back is called trailer
• add network addresses
• add routing
• data are called packets
Data-Link Layer
• data get bigger and bigger as it moves through the network stack
• creates a logical link between devices
• adds local addresses
• block is now called a frame
• contains LLC and MAC sublayers
Physical Layer

• data is transmitted over cable or wireless to a remote host


• manages physical network components
• encodes data into physical signals

Then the process is reversed.


Layers can communicate with layers above or below them

Types of IP Addresses
IPV4 – more common (example: 192.168.0.100)
IPV6 – newer (example: FD3B:F15C:C672:34B8::100)

192.168.0.100
• Each of these numbers are separated by a dot.
• Each is called an Octet (8-bit)
• Range from 0 – 255
• Range of Addresses are called IP Space
IP Addresses are two addresses in one
1. Host Address
2. Network Address
Five Classes of IP Address
A: Devices
B: Devices
C: Devices
D: Multicast
E: Reserved

Class A – Large Networks


- first octet is network addresses and the rest is host addresses
- work like the old method, first bit of the network is always 0 that leaves seven bits for us
to allocate to out networks
- means there 128 class A networks with more than 16 million possible host IPs per network.
- range from 0.0.0.0 – 127.0.0.0 (but 0 and 127 are reserved, usable class A space is
1.0.0.0 – 126.0.0.0)
Class B -Medium Networks
- first two octets are used for the network and the second two are used for host addresses
- first two bits of the network is always 1 0 which leaves 14 bits or 16384 possible networks
and can have over 65000 hosts
- IP space range from 128.0.0.0 – 191.255.0.0
Class C – Small Networks
- first three octets are just for the networks and are always 1 1 0 leaving 21 network bits
or a little over 2 million networks
- last octet is host and only 256 host Ips
- IP space range from 192.0.0.0 – 223.255.255.0
Networks = 2^n
Hosts = 2^h

Classless Networks and Subnets


1993 – New Method was introduced called Classless Inter-Domain Routing (CIDR)
CIDR – has the ability to break a large network into small ones (subnetting)
Subnet Mask – also made up of 4 octets
CIDR Notation - 172.16.1.0 /24
/24 – 255.255.255.0
This means that the first 24 bits of the subnet mask are turned on

Joining Networks is supernetting


192.168.0.0 /24 + 192.168.1.0 /24
= 192.168.0.0 /23

Variable Length

You might also like