NETWORKING
NETWORKING
Networking, in the context of computers, refers to the practice of connecting computers and other
devices together to share resources and communicate. This can include the sharing of files, internet access,
printers, and other peripherals, as well as the ability to communicate via email, messaging, or other protocols.
1. Network Types
LAN (Local Area Network): Connects computers within a small geographic area, such
as a single building or campus.
WAN (Wide Area Network): Connects LANs over large geographical areas, such as
cities, countries, or continents.
MAN (Metropolitan Area Network): Covers a larger geographic area than a LAN but
smaller than a WAN, typically within a city.
PAN (Personal Area Network): Connects devices within the range of an individual,
usually within a few meters (e.g., Bluetooth connections).
2. Networking Devices
Networking devices are hardware components that facilitate the communication and interaction
between different devices on a network.
1. Router
Function: Connects different networks and routes data packets between them. Routers
direct traffic based on IP addresses.
Use Case: Connecting a home network to the internet, linking office networks to each other
and to the internet.
Types: Home routers, enterprise routers, edge routers, core routers.
2. Switch
Function: Connects devices within the same network and uses MAC addresses to forward
data to the correct destination.
Use Case: Connecting computers, printers, and servers within a local area network (LAN).
3. Hub
Function: Basic device that connects multiple Ethernet devices, making them act as a single
network segment. It broadcasts data to all connected devices.
Use Case: Simple and small networks where bandwidth efficiency and collision domains are
not major concerns.
Types: Active hub (amplifies the signal), passive hub (does not amplify the signal).
4. Modem
Function: Modulates and demodulates signals for transmission over telephone lines, cable
systems, or satellite connections, allowing digital data to be sent over these mediums.
Types: DSL modem, cable modem, satellite modem, fiber optic modem.
An access point (AP) in networking refers to a device that allows wireless devices to connect
to a wired network using Wi-Fi, Bluetooth, or other wireless communication standards. Here
are the key aspects and functionalities of an access point:
Function: Provides wireless connectivity to a wired network, allowing Wi-Fi enabled devices
to connect.
Use Case: Extending wireless coverage within a home, office, or public space.
Types: Standalone access points, controller-based access points, mesh access points.
6. Gateway
Function: Acts as a node that connects two different networks, often involving different
protocols.
Use Case: Connecting a company’s network to external networks, such as the internet.
7. Repeater
Use Case: Extending the reach of a network in large buildings or over long distances.
8. Bridge
In networking, a bridge is a device that connects and filters traffic between two or more
network segments, allowing them to function as a single network. Here are the key aspects
and functionalities of a network bridge:
Function: Connects two separate networks and filters traffic between them based on MAC
addresses.
Use Case: Segmenting a large network into smaller, more manageable sections to reduce
traffic.
9. Firewall
Function: Monitors and controls incoming and outgoing network traffic based on
predetermined security rules. It acts as a barrier between a trusted network and an
untrusted network.
Use Case: Protecting an internal network from unauthorized access and cyber threats.
Use Case: Providing network connectivity for desktop computers, laptops, and servers.
Use Case: Improving the performance and reliability of websites, databases, and
applications.
Function: Acts as an intermediary for requests from clients seeking resources from other
servers. It provides anonymity, content filtering, and improved performance.
Use Case: Enhancing security, controlling internet usage, and speeding up access to
frequently visited sites.
Function: Convert voice signals into digital data for transmission over IP networks.
Function: Connects printers to client computers over a network, allowing multiple users to
share printers.
Use Case: Data storage and sharing in homes, offices, and enterprises.
3. Protocols
HTTP/HTTPS (HyperText Transfer Protocol/Secure): Used for transferring web pages on the
internet.
FTP (File Transfer Protocol): Used for transferring files between computers on a network.
IEEE 802.2 Standard for the data link layer in the OSI Reference Model
IEEE 802.4 Token passing bus access methods and physical layer specifications. –
MAC Layer
IEEE 802.5 Token ring access methods and physical layer specifications. – MAC
Layer
Data transfer mode refers to the method by which data is transmitted between devices or
over a network. There are several modes of data transfer, each with its characteristics and use
cases:
1. Simplex: In simplex mode, data flows in only one direction, from the sender to the
receiver. There is no feedback mechanism, and communication is unidirectional.
Examples include keyboards and monitors, where data flows in only one direction.
2. Half Duplex: In half-duplex mode, data can flow in both directions, but not
simultaneously. Communication alternates between sending and receiving. It's like a
walkie-talkie, where one party speaks while the other listens, and then they switch
roles. Ethernet using CSMA/CD (Carrier Sense Multiple Access with Collision
Detection) is an example of half-duplex communication.
3. Full Duplex: Full-duplex mode allows simultaneous bidirectional communication,
where data can be transmitted and received simultaneously. This mode offers higher
throughput compared to half-duplex. It's like a telephone conversation, where both
parties can speak and listen at the same time. Modern Ethernet networks typically
operate in full-duplex mode.
Network Topologies
Mesh Topology: Devices are interconnected, providing multiple pathways for data.
IP Addressing
Networking Concepts
Firewall: A network security device that monitors and filters incoming and outgoing
network traffic.
VPN (Virtual Private Network): Creates a secure connection over the internet to a private
network.
Encryption: The process of converting data into a code to prevent unauthorized access.
Wireless Networking
5G: The fifth generation of mobile network technology, offering higher speeds and lower
latency.
IoT (Internet of Things): Network of physical objects embedded with sensors and software
to exchange data.
Edge Computing: Bringing computation and data storage closer to the location where it is
needed to improve response times.
Practical Networking Skills
Configuring Firewalls and VPNs: Setting up security measures to protect the network.
Network Models
· Physical Layer:
The Data Link Layer is responsible for node-to-node communication, ensuring that
data packets are delivered error-free and in sequence.
It provides error detection and correction, as well as framing, addressing, and flow
control.
Divided into two sublayers: LLC (Logical Link Control) and MAC (Media Access
Control).
· Network Layer:
The Network Layer is responsible for routing packets from the source to the
destination across multiple network nodes.
It handles logical addressing, such as IP addressing, and determines the best path for
data transmission.
Key protocols include IP (Internet Protocol) and ICMP (Internet Control Message
Protocol).
· Transport Layer:
· Session Layer:
· Presentation Layer:
· Application Layer:
The Application Layer provides network services directly to end-users and application
processes.
It enables communication between different applications and supports various
network applications and protocols.
Examples of protocols at this layer include HTTP (Hypertext Transfer Protocol), FTP
(File Transfer Protocol), and SMTP (Simple Mail Transfer Protocol).