Networking
Networking
a
4.2.2. Wireless Technologies: .................................................................................................................... 9
4.3. Wireless Communication with LANs .................................................................................................. 9
• 4.3.1. Introduction: ....................................................................................................................... 9
• 4.3.2. Wireless Switches/Hubs: ..................................................................................................... 9
• 4.3.3. Wireless NIC (Network Interface Card): ............................................................................ 10
Demystifying Network Data Transfer: A Look at Network Models ............................................................. 11
5.1. OSI Model (Open Systems Interconnection) .................................................................................... 11
• 5.1.1. Physical Layer: ................................................................................................................... 11
• 5.1.2. Data Link Layer: ................................................................................................................. 11
• 5.1.3. Network Layer: .................................................................................................................. 11
• 5.1.4. Transport Layer: ................................................................................................................ 11
• 5.1.5. Session Layer: .................................................................................................................... 11
• 5.1.6. Presentation Layer: ........................................................................................................... 11
• 5.1.7. Application Layer:.............................................................................................................. 11
5.2. TCP/IP Model (Transmission Control Protocol/Internet Protocol) ................................................... 12
• 5.2.1. Application Layer:.................................................................................................................. 12
• 5.2.2. Transport Layer: .................................................................................................................... 12
• 5.2.3. Network Layer: ...................................................................................................................... 12
• 5.2.4. Physical or Link-Layer: ........................................................................................................... 12
Navigating the Digital World: Understanding IP Addresses ........................................................................ 13
6.1. What is an IP Address? ..................................................................................................................... 13
Why Use IP Addresses? ........................................................................................................................... 13
6.2. IPv4 (Internet Protocol Version 4) .................................................................................................... 13
IP Address Classes (Historical):................................................................................................................ 13
6.3. Introduction to IPv6 (Internet Protocol Version 6)........................................................................... 14
Why was IPv6 Introduced?...................................................................................................................... 14
IPv6 Address Length: ............................................................................................................................... 14
The Language of Networks: Understanding Protocols ................................................................................ 15
7.1. Definition: Protocols ........................................................................................................................ 15
7.2. Types of Protocols ............................................................................................................................ 15
7.3. Routed Protocols .............................................................................................................................. 16
7.4. Routing Protocols ............................................................................................................................. 16
• RIP (Routing Information Protocol): ............................................................................................ 16
b
• OSPF (Open Shortest Path First):................................................................................................. 16
• BGP (Border Gateway Protocol): ................................................................................................. 16
7.5. Common Protocols ........................................................................................................................... 16
• 7.5.1. TCP/IP (Transmission Control Protocol/Internet Protocol): .............................................. 16
• 7.5.2. UDP (User Datagram Protocol): ........................................................................................ 16
• 7.5.3. FTP (File Transfer Protocol): .............................................................................................. 16
• 7.5.4. HTTPS (Hypertext Transfer Protocol Secure):.................................................................... 16
c
Dedicated To
To My Beloved Students,
This book is a labor of love,
woven together with threads of
imagination, passion, and
countless late nights. As you
turn these pages, I hope you
find solace, inspiration, and
perhaps a touch of magic.
Thank you for embarking on
this journey with me. Your
curiosity and open hearts are
the wind beneath my writer’s
wings.
With gratitude,
Muddassir Iftikhar
Page |1
1.1.1 Definition:
A communication model is a visual or conceptual framework that outlines the key elements involved in
transmitting and receiving information. It helps us understand how information flows from one person or
device to another.
• Example: In a phone call, you (the person) are the sender. You encode your message (thoughts
and ideas) into spoken words.
1.1.3 Media:
The media is the channel through which the message travels from the sender to the receiver. It's the
pathway that carries the encoded information.
• Types of Media:
o Wireless media: Radio waves, microwaves, or infrared signals used in Wi-Fi or Bluetooth
communication.
• Example: During a phone call, the telephone wire acts as the media, carrying your voice as
electrical signals.
1.1.4 Message:
The message is the actual content being communicated. It's the information the sender wants to convey
and can be expressed in various forms like spoken words, written text, images, videos, or data.
• Example: In a phone call, the message is the specific information you're sharing with the other
person.
1.1.5 Protocol:
A protocol is a set of rules that govern how data is formatted, transmitted, and received. Think of it as a
common language that both the sender and receiver understand to ensure proper communication.
Protocols define things like data structure, error correction, and handshaking (establishing
communication between devices).
Page |2
• Example: In a phone call, the person you're calling is the receiver. They decode your spoken
words and understand your message.
Page |3
• Bus Topology:
o Imagine a single main cable acting as a central highway for all devices.
o Each device connects to this bus cable through a connector called a transceiver.
o Information travels from one device to all other devices on the bus, and the intended
recipient filters out messages not addressed to it.
• Star Topology:
o The central device acts as a message relay station, receiving data from one device and
forwarding it only to the intended recipient.
o Disadvantages: Requires more cables compared to bus topology. Reliance on the central
device can be a bottleneck if it malfunctions.
• Ring Topology:
Page |4
o Data travels in one direction around the ring, passing through each device until it
reaches its destination.
o Disadvantages: A single cable failure can disrupt the entire network. Adding or removing
devices can be more complex.
• Hybrid Topology:
o Combines two or more different basic topologies (e.g., star and bus) to create a more
complex network layout.
• Mesh Topology:
o Data can travel through multiple paths, providing redundancy and fault tolerance.
o Advantages: Highly reliable as data can take alternate routes if a connection fails.
• Wi-Fi Topology:
o The router acts as a central hub, facilitating communication between devices within its
range.
• Satellite Topology:
o Devices communicate with a satellite orbiting the earth, which acts as a relay station.
o This topology is useful for covering wide geographic areas or reaching remote locations.
o Disadvantages: Higher latency (delay) due to longer signal travel distances. Equipment
costs can be higher.
Page |5
o Advantages: Simple to set up and can be used for creating ad-hoc networks.
3.1. Node
• Definition: In a network, a node refers to any device that can connect and communicate with
other devices. This includes computers, printers, servers, smartphones, tablets, and any
network-enabled device.
• Think of it as: An individual participant in a conversation. Each node has a unique identifier
(often an IP address) that allows it to be recognized and communicate with other nodes on the
network.
• Think of it as: A translator and communicator for your computer. The NIC converts data from
your computer into electrical signals that can be transmitted over the network cable and vice
versa. It also has a unique MAC address that helps identify your device on the network.
3.3. Modem
• Definition: A modulator-demodulator, commonly referred to as a modem, is a device that
converts digital signals from your computer into analog signals for transmission over a telephone
line or cable connection, and vice versa.
• Think of it as: An adapter that allows your computer to speak the language of the internet.
Modems are typically used for dial-up or cable internet connections.
3.4. Hub
• Definition: A hub is a relatively simple networking device that acts as a central connection point
for devices in a star topology network.
• Think of it as: A multi-way splitter cable. Devices are connected to the hub using cables, and any
data transmitted by one device is broadcasted to all other devices connected to the hub.
3.5. Switch
• Definition: A network switch is a more intelligent device compared to a hub. It functions like a
central connection point in a star topology network but operates at a higher level.
• Think of it as: A smart traffic director. A switch learns the MAC addresses of connected devices
and forwards data only to the intended recipient, improving network performance and reducing
congestion.
Page |7
• 3.6.1. Access Point (AP): An access point (AP) acts as a central hub for a wireless network.
Devices connect to the AP to access the network and the internet.
• Think of it as: A Wi-Fi hotspot. The AP broadcasts a wireless signal within a specific range,
allowing devices to connect.
• 3.6.2. Wireless Modem: A wireless modem combines the functionalities of a traditional modem
and an access point. It receives the internet signal from your internet service provider (ISP) and
converts it into a wireless signal for your devices.
• 3.6.3. Wireless USB Antenna: A wireless USB antenna is an external device that can be plugged
into a computer to enhance its Wi-Fi reception capabilities.
• Think of it as: A signal booster. It can be helpful for devices with weak built-in Wi-Fi adapters.
• Think of it as: A complex traffic control system. The router determines the most efficient path for
data to travel between your network and the internet, considering factors like network
congestion and security policies. Many routers also include Wi-Fi capabilities, acting as a wireless
access point.
• 3.7.2. Switch (mentioned earlier): While primarily used in wired networks, switches can also be
part of a larger network solution that includes a router for internet connectivity. In this scenario,
the switch connects devices within your network, and the router manages data flow between
your network and the internet.
Page |8
▪ Cat 4, Cat 5, Cat 6: Designed for data transmission, with Cat 6 offering the
highest performance among these.
o UTP cables use connectors called RJ-45 (Registered Jack-45) for connecting to network
devices.
o Wi-Fi (Wireless Fidelity): Uses radio waves to create a local area network (LAN) for
device connectivity.
o Bluetooth: Offers short-range wireless connectivity for data transfer between devices.
o Microwave: Uses high-frequency radio waves for long-distance data transmission, often
used for backhaul connections between network towers.
o Radio Waves: A broad term encompassing various wireless technologies that utilize
radio waves for communication.
• 4.3.1. Introduction: WLANs enable devices to connect to a network and access resources
without the need for cables.
• 4.3.2. Wireless Switches/Hubs: Act as central connection points in a WLAN, similar to their
wired counterparts. Wireless switches offer more intelligent management of data flow
compared to hubs.
P a g e | 10
• 4.3.3. Wireless NIC (Network Interface Card): A device installed in a computer to enable
wireless communication. It allows the computer to connect to a wireless network.
P a g e | 11
Here's a breakdown of the OSI model layers, starting from the bottom:
• 5.1.1. Physical Layer: The foundation, responsible for the physical transmission of data bits over
the network media (cables or wireless signals). This layer deals with things like connectors,
cables, and signal encoding/decoding.
• 5.1.2. Data Link Layer: Packages data into frames, adds error detection mechanisms, and
manages physical addressing of devices on the network (like MAC addresses).
• 5.1.3. Network Layer: Handles logical addressing (IP addresses) and routing of data packets
across networks. This layer determines the most efficient path for data to reach its destination.
• 5.1.4. Transport Layer: Provides reliable data transfer services. It can break large data streams
into smaller packets for transmission and ensure they arrive in the correct order at the recipient.
Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at
this layer.
• 5.1.5. Session Layer: Establishes, manages, and terminates sessions between communicating
applications. This layer ensures proper coordination and data exchange between applications on
different devices.
• 5.1.6. Presentation Layer: Deals with data formatting and presentation. It ensures data is
presented in a way that the receiving application can understand, regardless of the underlying
hardware or software differences.
• 5.1.7. Application Layer: Provides network services to applications. This is where user
applications like web browsers, email clients, and file transfer programs interact with the
network to exchange data.
The OSI model serves as a reference model for understanding network communication, but it's not a
strict protocol itself. The actual implementation of network protocols often combines functionalities
from different OSI layers.
P a g e | 12
• 5.2.1. Application Layer: Similar to the OSI model, this layer provides network services to
applications.
• 5.2.2. Transport Layer: Also similar to the OSI model, this layer manages reliable data transfer
using protocols like TCP and UDP.
• 5.2.3. Network Layer: Equivalent to the OSI network layer, this layer handles logical
addressing (IP addresses) and routing of data packets.
• 5.2.4. Physical or Link-Layer: Combines the functionalities of the OSI data link layer and
physical layer. It deals with physical media transmission and addressing of devices on the
network.
The TCP/IP model is a simpler and more practical model compared to the OSI model. It focuses on the
core functionalities required for internet communication and has become the de facto standard for
network protocols.
P a g e | 13
• Class C: Used for small networks (e.g., home networks). The first number ranges from
192 to 223.
• Class D: Used for multicast networking (sending data to a group of devices).
• Class E: Reserved for future use (not assigned).
6.3. Introduction to IPv6 (Internet Protocol Version 6)
With the tremendous growth of the internet and the increasing number of connected devices,
IPv4 addresses are becoming depleted. IPv6 is the next-generation IP addressing protocol
designed to address this limitation.
Why was IPv6 Introduced?
• Exhaustion of IPv4 Addresses: The limited pool of IPv4 addresses was nearing
exhaustion due to the ever-growing number of internet users and devices.
• Increased Demand: The rise of the Internet of Things (IoT) with billions of connected
devices requires a vast address space.
• Enhanced Security: IPv6 offers improved security features compared to IPv4.
IPv6 Address Length:
IPv6 addresses are 128 bits long, providing a significantly larger address space compared to
IPv4's 32 bits. This vast address space ensures enough unique addresses for all foreseeable
internet devices.
P a g e | 15