0% found this document useful (0 votes)
31 views21 pages

Networking

A Comptehensive Networking Text Book For DIT Students

Uploaded by

mccndays
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views21 pages

Networking

A Comptehensive Networking Text Book For DIT Students

Uploaded by

mccndays
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

7/15/2024 Computer Networks

DIT Part-I (2nd Edition)

MUDDASSIR IT SOLUTIONS ABBOTTABAD


Contents
Basic Terminologies for Understanding Communication and Networks ...................................................... 1
1.1 Components of a Communication Model ........................................................................................... 1
1.1.1 Definition:..................................................................................................................................... 1
1.1.2 Host / Sender: .............................................................................................................................. 1
1.1.3 Media: .......................................................................................................................................... 1
1.1.4 Message: ...................................................................................................................................... 1
1.1.5 Protocol: ....................................................................................................................................... 1
1.1.6 Destination / Receiver: ................................................................................................................. 2
Demystifying Network Topologies: A Guide to Network Layouts ................................................................. 3
2.1. Definition: Network Topology ............................................................................................................ 3
2.2. Types of Topologies ............................................................................................................................ 3
2.2.1 Wired Topologies ......................................................................................................................... 3
2.2.2 Wireless Topologies...................................................................................................................... 4
Demystifying Networking Devices: A Guide to Network Components ......................................................... 6
3.1. Node ................................................................................................................................................... 6
3.2. NIC (Network Interface Card) ............................................................................................................. 6
3.3. Modem ............................................................................................................................................... 6
3.4. Hub ..................................................................................................................................................... 6
3.5. Switch ................................................................................................................................................. 6
3.6. Wireless Devices ................................................................................................................................ 7
3.7. WAN / Internet Connectivity .............................................................................................................. 7
Transmission Media: The Lifeblood of Network Communication ................................................................. 8
4.1. Wired Media (Guided Media) ............................................................................................................ 8
4.1.1. Coaxial Cable: .............................................................................................................................. 8
4.1.2. BNC Connector: ........................................................................................................................... 8
4.1.3. Twisted Pair Cable: ...................................................................................................................... 8
4.1.4. Unshielded Twisted-Pair (UTP):................................................................................................... 8
4.1.5. Shielded Twisted-Pair (STP): ........................................................................................................ 8
4.1.6. Fiber Optic Cable: ........................................................................................................................ 8
Understanding Wireless Media ..................................................................................................................... 9
4.2. Wireless Media .................................................................................................................................. 9
4.2.1. Why Use Wireless Media? .......................................................................................................... 9

a
4.2.2. Wireless Technologies: .................................................................................................................... 9
4.3. Wireless Communication with LANs .................................................................................................. 9
• 4.3.1. Introduction: ....................................................................................................................... 9
• 4.3.2. Wireless Switches/Hubs: ..................................................................................................... 9
• 4.3.3. Wireless NIC (Network Interface Card): ............................................................................ 10
Demystifying Network Data Transfer: A Look at Network Models ............................................................. 11
5.1. OSI Model (Open Systems Interconnection) .................................................................................... 11
• 5.1.1. Physical Layer: ................................................................................................................... 11
• 5.1.2. Data Link Layer: ................................................................................................................. 11
• 5.1.3. Network Layer: .................................................................................................................. 11
• 5.1.4. Transport Layer: ................................................................................................................ 11
• 5.1.5. Session Layer: .................................................................................................................... 11
• 5.1.6. Presentation Layer: ........................................................................................................... 11
• 5.1.7. Application Layer:.............................................................................................................. 11
5.2. TCP/IP Model (Transmission Control Protocol/Internet Protocol) ................................................... 12
• 5.2.1. Application Layer:.................................................................................................................. 12
• 5.2.2. Transport Layer: .................................................................................................................... 12
• 5.2.3. Network Layer: ...................................................................................................................... 12
• 5.2.4. Physical or Link-Layer: ........................................................................................................... 12
Navigating the Digital World: Understanding IP Addresses ........................................................................ 13
6.1. What is an IP Address? ..................................................................................................................... 13
Why Use IP Addresses? ........................................................................................................................... 13
6.2. IPv4 (Internet Protocol Version 4) .................................................................................................... 13
IP Address Classes (Historical):................................................................................................................ 13
6.3. Introduction to IPv6 (Internet Protocol Version 6)........................................................................... 14
Why was IPv6 Introduced?...................................................................................................................... 14
IPv6 Address Length: ............................................................................................................................... 14
The Language of Networks: Understanding Protocols ................................................................................ 15
7.1. Definition: Protocols ........................................................................................................................ 15
7.2. Types of Protocols ............................................................................................................................ 15
7.3. Routed Protocols .............................................................................................................................. 16
7.4. Routing Protocols ............................................................................................................................. 16
• RIP (Routing Information Protocol): ............................................................................................ 16

b
• OSPF (Open Shortest Path First):................................................................................................. 16
• BGP (Border Gateway Protocol): ................................................................................................. 16
7.5. Common Protocols ........................................................................................................................... 16
• 7.5.1. TCP/IP (Transmission Control Protocol/Internet Protocol): .............................................. 16
• 7.5.2. UDP (User Datagram Protocol): ........................................................................................ 16
• 7.5.3. FTP (File Transfer Protocol): .............................................................................................. 16
• 7.5.4. HTTPS (Hypertext Transfer Protocol Secure):.................................................................... 16

c
Dedicated To
To My Beloved Students,
This book is a labor of love,
woven together with threads of
imagination, passion, and
countless late nights. As you
turn these pages, I hope you
find solace, inspiration, and
perhaps a touch of magic.
Thank you for embarking on
this journey with me. Your
curiosity and open hearts are
the wind beneath my writer’s
wings.
With gratitude,
Muddassir Iftikhar
Page |1

Unit 1: Understanding Networks


Basic Terminologies for Understanding Communication and Networks
1.1 Components of a Communication Model
Effective communication relies on a well-defined structure, similar to a recipe with specific ingredients
and steps. This structure is known as a communication model.

1.1.1 Definition:
A communication model is a visual or conceptual framework that outlines the key elements involved in
transmitting and receiving information. It helps us understand how information flows from one person or
device to another.

1.1.2 Host / Sender:


The sender, also referred to as the source or host, initiates the communication process. This can be a
person, a computer, or any device capable of generating a message. The sender has the information they
want to convey and takes steps to encode it into a transmittable format.

• Example: In a phone call, you (the person) are the sender. You encode your message (thoughts
and ideas) into spoken words.

1.1.3 Media:
The media is the channel through which the message travels from the sender to the receiver. It's the
pathway that carries the encoded information.

• Types of Media:

o Wired media: Physical cables like telephone wires or ethernet cables.

o Wireless media: Radio waves, microwaves, or infrared signals used in Wi-Fi or Bluetooth
communication.

• Example: During a phone call, the telephone wire acts as the media, carrying your voice as
electrical signals.

1.1.4 Message:
The message is the actual content being communicated. It's the information the sender wants to convey
and can be expressed in various forms like spoken words, written text, images, videos, or data.

• Example: In a phone call, the message is the specific information you're sharing with the other
person.

1.1.5 Protocol:
A protocol is a set of rules that govern how data is formatted, transmitted, and received. Think of it as a
common language that both the sender and receiver understand to ensure proper communication.
Protocols define things like data structure, error correction, and handshaking (establishing
communication between devices).
Page |2

• Example: TCP/IP (Transmission Control Protocol/Internet Protocol) is a widely used protocol


suite that governs communication on the internet.

1.1.6 Destination / Receiver:


The destination, also referred to as the receiver, is the entity that receives the message sent by the
source. The receiver decodes the message back into its original form and interprets the information.

• Example: In a phone call, the person you're calling is the receiver. They decode your spoken
words and understand your message.
Page |3

Unit 2: Network Topologies


Demystifying Network Topologies: A Guide to Network Layouts
In the world of computer networks, a network topology refers to the way different devices (computers,
printers, servers, etc.) are arranged and interconnected. It's essentially the blueprint that defines how
information flows within your network.

2.1. Definition: Network Topology


A network topology is the physical or logical layout that defines how devices in a network are
interconnected and communicate with each other. It determines how data travels from one device to
another, influencing factors like performance, scalability, and troubleshooting complexity.

2.2. Types of Topologies


Network topologies can be categorized into two main types: wired and wireless.

2.2.1 Wired Topologies


Wired topologies rely on physical cables to connect devices within a network. Here's a breakdown of
some common wired topologies:

• Bus Topology:

o Imagine a single main cable acting as a central highway for all devices.

o Each device connects to this bus cable through a connector called a transceiver.

o Information travels from one device to all other devices on the bus, and the intended
recipient filters out messages not addressed to it.

o Advantages: Simple to set up and inexpensive.

o Disadvantages: Limited network performance due to potential collisions (multiple


devices trying to transmit data simultaneously). A single cable failure can disrupt the
entire network.

• Star Topology:

o Devices are connected individually to a central hub or switch.

o The central device acts as a message relay station, receiving data from one device and
forwarding it only to the intended recipient.

o Advantages: Offers better performance and easier troubleshooting compared to bus


topology. A single device failure won't affect the entire network.

o Disadvantages: Requires more cables compared to bus topology. Reliance on the central
device can be a bottleneck if it malfunctions.

• Ring Topology:
Page |4

o Devices are connected in a closed loop, forming a ring-like structure.

o Data travels in one direction around the ring, passing through each device until it
reaches its destination.

o Advantages: Data transmission is more orderly compared to bus topology.

o Disadvantages: A single cable failure can disrupt the entire network. Adding or removing
devices can be more complex.

• Hybrid Topology:

o Combines two or more different basic topologies (e.g., star and bus) to create a more
complex network layout.

o This offers flexibility to suit specific network requirements.

• Mesh Topology:

o Devices are interconnected with each other, creating a web-like structure.

o Data can travel through multiple paths, providing redundancy and fault tolerance.

o Advantages: Highly reliable as data can take alternate routes if a connection fails.

o Disadvantages: More complex to set up and manage compared to other topologies.


Requires more cabling.

2.2.2 Wireless Topologies


Wireless topologies eliminate the need for physical cables, relying on radio waves or infrared signals for
communication. Here are some common wireless topologies:

• Wi-Fi Topology:

o Devices connect to a wireless router or access point using radio waves.

o The router acts as a central hub, facilitating communication between devices within its
range.

o Advantages: Offers mobility and flexibility for device placement.

o Disadvantages: Susceptible to interference from other wireless signals. Security can be a


concern on open Wi-Fi networks.

• Satellite Topology:

o Devices communicate with a satellite orbiting the earth, which acts as a relay station.

o This topology is useful for covering wide geographic areas or reaching remote locations.

o Advantages: Provides connectivity in areas where wired infrastructure is impractical.

o Disadvantages: Higher latency (delay) due to longer signal travel distances. Equipment
costs can be higher.
Page |5

• Radio Wave Topology:

o Devices communicate directly with each other using radio waves.

o This topology is often used in sensor networks or for short-range communication


between devices.

o Advantages: Simple to set up and can be used for creating ad-hoc networks.

o Disadvantages: Limited range and susceptible to interference.


Page |6

Unit 3: Networking Devices


Demystifying Networking Devices: A Guide to Network Components
Now that you understand network topologies, let's delve into the essential building blocks that make
them function: networking devices. These devices play a crucial role in connecting computers,
transmitting data, and facilitating communication within a network.

3.1. Node
• Definition: In a network, a node refers to any device that can connect and communicate with
other devices. This includes computers, printers, servers, smartphones, tablets, and any
network-enabled device.

• Think of it as: An individual participant in a conversation. Each node has a unique identifier
(often an IP address) that allows it to be recognized and communicate with other nodes on the
network.

3.2. NIC (Network Interface Card)


• Definition: A Network Interface Card (NIC), also known as an Ethernet card, is a hardware
component installed inside a computer that allows it to connect to a network.

• Think of it as: A translator and communicator for your computer. The NIC converts data from
your computer into electrical signals that can be transmitted over the network cable and vice
versa. It also has a unique MAC address that helps identify your device on the network.

3.3. Modem
• Definition: A modulator-demodulator, commonly referred to as a modem, is a device that
converts digital signals from your computer into analog signals for transmission over a telephone
line or cable connection, and vice versa.

• Think of it as: An adapter that allows your computer to speak the language of the internet.
Modems are typically used for dial-up or cable internet connections.

3.4. Hub
• Definition: A hub is a relatively simple networking device that acts as a central connection point
for devices in a star topology network.

• Think of it as: A multi-way splitter cable. Devices are connected to the hub using cables, and any
data transmitted by one device is broadcasted to all other devices connected to the hub.

3.5. Switch
• Definition: A network switch is a more intelligent device compared to a hub. It functions like a
central connection point in a star topology network but operates at a higher level.

• Think of it as: A smart traffic director. A switch learns the MAC addresses of connected devices
and forwards data only to the intended recipient, improving network performance and reducing
congestion.
Page |7

3.6. Wireless Devices


Wireless devices connect to a network using radio waves instead of physical cables. Here are some key
components for wireless networking:

• 3.6.1. Access Point (AP): An access point (AP) acts as a central hub for a wireless network.
Devices connect to the AP to access the network and the internet.

• Think of it as: A Wi-Fi hotspot. The AP broadcasts a wireless signal within a specific range,
allowing devices to connect.

• 3.6.2. Wireless Modem: A wireless modem combines the functionalities of a traditional modem
and an access point. It receives the internet signal from your internet service provider (ISP) and
converts it into a wireless signal for your devices.

• 3.6.3. Wireless USB Antenna: A wireless USB antenna is an external device that can be plugged
into a computer to enhance its Wi-Fi reception capabilities.

• Think of it as: A signal booster. It can be helpful for devices with weak built-in Wi-Fi adapters.

3.7. WAN / Internet Connectivity


• 3.7.1. Router: A router is a versatile networking device that connects your network to a Wide
Area Network (WAN), typically the internet. It acts as a central traffic director, managing data
flow between your network and the internet.

• Think of it as: A complex traffic control system. The router determines the most efficient path for
data to travel between your network and the internet, considering factors like network
congestion and security policies. Many routers also include Wi-Fi capabilities, acting as a wireless
access point.

• 3.7.2. Switch (mentioned earlier): While primarily used in wired networks, switches can also be
part of a larger network solution that includes a router for internet connectivity. In this scenario,
the switch connects devices within your network, and the router manages data flow between
your network and the internet.
Page |8

Unit 4: Transmission Media


Transmission Media: The Lifeblood of Network Communication
In the realm of computer networks, transmission media acts as the vital pathway for data transmission.
It's the communication channel through which information travels between devices on a network. Just
like a highway carries vehicles, transmission media carries the digital signals that represent our data.

4.1. Wired Media (Guided Media)


Wired media utilizes physical cables to transmit data. These cables act as guided paths, ensuring the
signals travel in a controlled manner. Here's a breakdown of some common wired media types:

4.1.1. Coaxial Cable:


o An older type of cable with a single copper conductor surrounded by insulation, a
braided metal shield, and an outer jacket.

o Used in earlier Ethernet standards (10Base2, 10Base5, 10BaseT).

4.1.2. BNC Connector:


o A specific type of connector used to terminate coaxial cables for network connections.

4.1.3. Twisted Pair Cable:


o The most common type of wired media today. It consists of two insulated copper wires
twisted together in a helical pattern.

o This twisting helps reduce crosstalk (interference between cables).

4.1.4. Unshielded Twisted-Pair (UTP):


o A type of twisted pair cable without a metal shield.

o It's cost-effective and widely used in various categories:

▪ Cat 2, Cat 3: Primarily used for voice communication.

▪ Cat 4, Cat 5, Cat 6: Designed for data transmission, with Cat 6 offering the
highest performance among these.

o UTP cables use connectors called RJ-45 (Registered Jack-45) for connecting to network
devices.

4.1.5. Shielded Twisted-Pair (STP):


o A type of twisted pair cable with a metal shield around each twisted pair and an overall
outer shield.

o This shielding provides better protection against interference compared to UTP.

4.1.6. Fiber Optic Cable:


o Uses light pulses instead of electrical signals for data transmission.

o Offers several advantages:


Page |9

▪ High bandwidth: Enables transmission of large amounts of data.

▪ Low signal loss: Less susceptible to interference over long distances.

▪ Security: Difficult to tap due to the nature of light pulses.

o Comes in two main types:

▪ Single-mode: Uses a single light source for longer distances.

▪ Multi-mode: Uses multiple light sources for shorter distances.

Understanding Wireless Media


4.2. Wireless Media
Wireless media eliminates the need for physical cables, offering flexibility and mobility for connecting
devices. Here's a look at some common wireless technologies:

4.2.1. Why Use Wireless Media?


o Convenience: Provides mobility and eliminates cable clutter.

o Scalability: Easier to add or remove devices compared to wired networks.

o Deployment: Feasible in areas where cable installation is impractical.

4.2.2. Wireless Technologies:


o Satellite: Uses satellites orbiting the earth to transmit signals over large geographical
areas.

o Wi-Fi (Wireless Fidelity): Uses radio waves to create a local area network (LAN) for
device connectivity.

o Bluetooth: Offers short-range wireless connectivity for data transfer between devices.

o Microwave: Uses high-frequency radio waves for long-distance data transmission, often
used for backhaul connections between network towers.

o Radio Waves: A broad term encompassing various wireless technologies that utilize
radio waves for communication.

4.3. Wireless Communication with LANs


Wireless LANs (WLANs) provide wireless connectivity within a local area network. Here are some key
components:

• 4.3.1. Introduction: WLANs enable devices to connect to a network and access resources
without the need for cables.

• 4.3.2. Wireless Switches/Hubs: Act as central connection points in a WLAN, similar to their
wired counterparts. Wireless switches offer more intelligent management of data flow
compared to hubs.
P a g e | 10

• 4.3.3. Wireless NIC (Network Interface Card): A device installed in a computer to enable
wireless communication. It allows the computer to connect to a wireless network.
P a g e | 11

Unit 5: Network Models


Demystifying Network Data Transfer: A Look at Network Models
Now that you understand the building blocks of networks, let's delve into how data actually travels
across these connections. Network models provide a framework for understanding how data is
packaged, addressed, routed, and delivered between devices on a network. Here, we'll explore two
prominent models: OSI and TCP/IP.

5.1. OSI Model (Open Systems Interconnection)


The OSI model, developed by the International Organization for Standardization (ISO), is a conceptual
model that defines seven layers of communication. Each layer performs specific functions, and data is
processed one layer at a time as it travels from the sending device to the receiving device.

Here's a breakdown of the OSI model layers, starting from the bottom:

• 5.1.1. Physical Layer: The foundation, responsible for the physical transmission of data bits over
the network media (cables or wireless signals). This layer deals with things like connectors,
cables, and signal encoding/decoding.

• 5.1.2. Data Link Layer: Packages data into frames, adds error detection mechanisms, and
manages physical addressing of devices on the network (like MAC addresses).

• 5.1.3. Network Layer: Handles logical addressing (IP addresses) and routing of data packets
across networks. This layer determines the most efficient path for data to reach its destination.

• 5.1.4. Transport Layer: Provides reliable data transfer services. It can break large data streams
into smaller packets for transmission and ensure they arrive in the correct order at the recipient.
Protocols like TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) operate at
this layer.

• 5.1.5. Session Layer: Establishes, manages, and terminates sessions between communicating
applications. This layer ensures proper coordination and data exchange between applications on
different devices.

• 5.1.6. Presentation Layer: Deals with data formatting and presentation. It ensures data is
presented in a way that the receiving application can understand, regardless of the underlying
hardware or software differences.

• 5.1.7. Application Layer: Provides network services to applications. This is where user
applications like web browsers, email clients, and file transfer programs interact with the
network to exchange data.

The OSI model serves as a reference model for understanding network communication, but it's not a
strict protocol itself. The actual implementation of network protocols often combines functionalities
from different OSI layers.
P a g e | 12

5.2. TCP/IP Model (Transmission Control Protocol/Internet Protocol)


The TCP/IP model is a four-layer model that serves as the foundation for internet communication. It's the
dominant model used in today's networks. Here's a look at the TCP/IP layers:

• 5.2.1. Application Layer: Similar to the OSI model, this layer provides network services to
applications.

• 5.2.2. Transport Layer: Also similar to the OSI model, this layer manages reliable data transfer
using protocols like TCP and UDP.

• 5.2.3. Network Layer: Equivalent to the OSI network layer, this layer handles logical
addressing (IP addresses) and routing of data packets.

• 5.2.4. Physical or Link-Layer: Combines the functionalities of the OSI data link layer and
physical layer. It deals with physical media transmission and addressing of devices on the
network.

The TCP/IP model is a simpler and more practical model compared to the OSI model. It focuses on the
core functionalities required for internet communication and has become the de facto standard for
network protocols.
P a g e | 13

Unit 6: Understanding IP Addresses


Navigating the Digital World: Understanding IP Addresses
In the vast world of computer networks, every device needs a unique identifier to communicate with
others. This unique identifier is called an IP address, acting like a digital mailing address that allows
information to find its intended recipient.
6.1. What is an IP Address?
An IP address is a numerical label assigned to a device connected to a network that utilizes the
Internet Protocol (IP) for communication. Think of it as a house address in the physical world,
but for devices in the digital realm. With an IP address, devices can send and receive data
packets across the network.
Why Use IP Addresses?
• Identification: Uniquely identifies each device on a network, enabling communication
between them.
• Routing: Allows routers to direct data packets to the correct destination device.
• Addressing: Functions like sending an email or browsing a website rely on IP addresses
for proper delivery of information.
6.2. IPv4 (Internet Protocol Version 4)
IPv4 is the most widely used version of the Internet Protocol. It represents an IP address as a
string of four numbers separated by periods (e.g., 192.168.1.1). Each number ranges from 0 to
255.
IP Address Classes (Historical):
In the early days of the internet, IPv4 addresses were divided into classes (A, B, C, D, and E) to
manage a limited pool of addresses. However, due to the exponential growth of the internet,
these classful network addressing schemes are no longer strictly followed today. Here's a brief
overview for your reference:
• Class A: Used for large networks (e.g., universities, corporations). The first number
ranges from 0 to 126.
• Class B: Used for medium-sized networks (e.g., companies, organizations). The first
number ranges from 128 to 191.
P a g e | 14

• Class C: Used for small networks (e.g., home networks). The first number ranges from
192 to 223.
• Class D: Used for multicast networking (sending data to a group of devices).
• Class E: Reserved for future use (not assigned).
6.3. Introduction to IPv6 (Internet Protocol Version 6)
With the tremendous growth of the internet and the increasing number of connected devices,
IPv4 addresses are becoming depleted. IPv6 is the next-generation IP addressing protocol
designed to address this limitation.
Why was IPv6 Introduced?
• Exhaustion of IPv4 Addresses: The limited pool of IPv4 addresses was nearing
exhaustion due to the ever-growing number of internet users and devices.
• Increased Demand: The rise of the Internet of Things (IoT) with billions of connected
devices requires a vast address space.
• Enhanced Security: IPv6 offers improved security features compared to IPv4.
IPv6 Address Length:
IPv6 addresses are 128 bits long, providing a significantly larger address space compared to
IPv4's 32 bits. This vast address space ensures enough unique addresses for all foreseeable
internet devices.
P a g e | 15

Unit 7: Understanding Protocols


The Language of Networks: Understanding Protocols
In the world of computer networks, protocols are like the established rules and languages that
devices use to communicate and exchange data. Just like people need common ground to
understand each other, protocols ensure devices on a network can interact efficiently and
reliably.
7.1. Definition: Protocols
A network protocol is a set of rules that define how data is formatted, transmitted, and
received over a network. It establishes communication standards, ensuring devices from
different vendors and with varying functionalities can still understand each other. Protocols
govern aspects like:
• Data format: How data is packaged into transmittable units.
• Error correction: Mechanisms to detect and correct errors that may occur during data
transmission.
• Flow control: Regulating the flow of data to prevent overwhelming the recipient device.
• Security: Encryption and authentication measures to safeguard data privacy and
integrity.
7.2. Types of Protocols
There are numerous protocols used in network communication, each catering to specific
functions. Here's a broad categorization:
• Network access protocols: Govern how devices access and participate in a network
(e.g., Ethernet, Wi-Fi).
• Routing protocols: Enable routers to determine the most efficient path for data to
travel across networks.
• Transport protocols: Manage reliable data transfer between applications on different
devices (e.g., TCP, UDP).
• Application layer protocols: Define how specific applications interact with the network
(e.g., HTTP for web browsing, FTP for file transfer).
P a g e | 16

7.3. Routed Protocols


Definition: Routed protocols are a specific type of network protocol specifically designed for
routers. These protocols allow routers to exchange information about network topology and
connectivity, enabling them to make informed decisions about the best path for data packets to
reach their destination.
7.4. Routing Protocols
Definition: Routing protocols are the specific set of rules and procedures that routers use to
communicate with each other and share information about network paths. This information
helps routers determine the most efficient route for forwarding data packets to their final
destination.
Here are some examples of commonly used routing protocols:
• RIP (Routing Information Protocol): A simple and widely used protocol for small to
medium-sized networks.
• OSPF (Open Shortest Path First): A more complex protocol that offers better scalability
and efficiency for large networks.
• BGP (Border Gateway Protocol): Used for communication between autonomous systems
(AS) on the internet, responsible for routing traffic between different internet
backbones.
7.5. Common Protocols
Here's a breakdown of some frequently encountered protocols:
• 7.5.1. TCP/IP (Transmission Control Protocol/Internet Protocol): The foundation of
internet communication. TCP provides reliable data transfer, while IP handles
addressing and routing of data packets.
• 7.5.2. UDP (User Datagram Protocol): Offers connectionless data transfer, suitable for
applications where speed is more important than guaranteed delivery (e.g., online
gaming, video streaming).
• 7.5.3. FTP (File Transfer Protocol): Enables the transfer of files between computers on a
network.
• 7.5.4. HTTPS (Hypertext Transfer Protocol Secure): A secure version of HTTP used for
encrypted communication between web servers and browsers, protecting data privacy
during web browsing.

You might also like