CN Unit 1
CN Unit 1
UNIT - 1
Introduction
Key Components
Nodes: Any device connected to the network (e.g., computers, printers, routers).
Transmission Media: The physical or wireless pathways that connect nodes and
facilitate data transfer (e.g., cables, fiber optics, radio waves).
Protocols: Standardized rules that govern data communication and ensure proper
data exchange (e.g., TCP/IP, HTTP).
Key Terms and Concepts
Personal Communication
Email: Send and receive messages quickly.
Social Media: Connect with friends and family.
Instant Messaging: Real-time text communication (e.g., WhatsApp, Messenger).
Video Calls: Face-to-face communication via the internet (e.g., Zoom, Skype).
Business Operations
Remote Work: Access company resources and collaborate from anywhere.
Data Sharing: Share files and documents easily within the organization.
Cloud Services: Store and access data and applications online (e.g., Google Drive, AWS).
E-Commerce: Online buying and selling of goods and services.
Enterprise Resource Planning (ERP): Integrated management of business processes (e.g.,
SAP, Oracle).
Types of Cables
i) Coaxial Cable
Structure: Central conductor, insulating layer, metallic shield, and outer cover.
Uses: Cable TV, internet connections.
Advantages: High bandwidth, good noise resistance.
Disadvantages: Bulky, limited flexibility.
Router: A router is essential for connecting different networks, such as linking a home or
business network to the internet. It forwards data packets based on IP addresses, ensuring
that data reaches its correct destination. Routers often come with built-in security features
and support for various network protocols.
Switch: Operating at the data link layer (Layer 2) of the OSI model, switches connect
devices within a local area network (LAN). They use MAC addresses to forward data to
the appropriate device, reducing data collisions and improving network efficiency.
Switches are vital for managing data traffic in a network.
Networking Devices
Contin...
Hub: A hub is a basic networking device that connects multiple devices in a LAN by
broadcasting data to all connected devices. Operating at the physical layer (Layer 1) of the
OSI model, hubs are simple and inexpensive but less efficient than switches, as they do not
filter data.
Access Point (AP): An access point provides wireless connectivity to devices within a
network, extending the range of wireless coverage. APs can be standalone or integrated
into routers, making them crucial for establishing wireless networks and ensuring
mobility.
Networking Devices
Contin...
Modem: A modem modulates and demodulates signals for data transmission over
telephone or cable lines, allowing network access to the internet. It converts digital data
from computers to analog signals for transmission and vice versa, bridging the gap
between home networks and internet service providers.
Firewall: Firewalls are critical for network security, monitoring and controlling incoming
and outgoing traffic based on predefined security rules. They can be hardware-based,
software-based, or both, and protect networks from unauthorized access and cyber
threats.
OSI Model
The Open Systems Interconnection (OSI) model describes seven layers that computer
systems use to communicate over a network. It was the first standard model for
network communications, adopted by all major computer and telecommunication
companies in the early 1980s.
The modern Internet is not based on OSI, but on the simpler TCP/IP model.
However, the OSI 7-layer model is still widely used, as it helps visualize and
communicate how networks operate, and helps isolate and troubleshoot networking
problems.
Advantages of OSI Model
The TCP/IP model is a fundamental framework for computer networking. It stands for
Transmission Control Protocol/Internet Protocol, which are the core protocols of the
Internet.
This model defines how data is transmitted over networks, ensuring reliable
communication between devices. It consists of four layers: the Link Layer, the Internet
Layer, the Transport Layer, and the Application Layer.
Each layer has specific functions that help manage different aspects of network
communication, making it essential for understanding and working with modern
networks.
What Does TCP/IP Do?
The main work of TCP/IP is to transfer the data of a computer from one device to
another. The main condition of this process is to make data reliable and accurate so
that the receiver will receive the same information which is sent by the sender.
To ensure that, each message reaches its final destination accurately, the TCP/IP model
divides its data into packets and combines them at the other end, which helps in
maintaining the accuracy of the data while transferring from one end to another end.
The TCP/IP model is used in the context of the real-world internet, where a wide range
of physical media and network technologies are in use.
Difference Between TCP and IP
Difference Between TCP and IP
Internet Protocol
Types of IP Addresses
1. Public Address
2. Private Address
Public Address
The public media, sometimes called the external media outside the local area network, is
also known as the public address. The word ‘public address’ can also define a defile of talk
outside the network. This IP address is for the purpose of connecting to the internet.
Private Address
Address to the private is also referred to as a DAN (LAN), as LAN numbers are inserted
within the addresses. It is used for communication between the network. Listen to the given
audio and then select the most appropriate option. They are not public IP addresses that
have IP protocols for internet routing. The private address space is then use InterNIC
utility to ensure that the create network does not have address conflict.
Network Edge
The network edge the connection or interface between a device or local network and
the internet. The edge is close to the devices it is communicating with and is the entry
point to the network. The network edge is a crucial security boundary that network
administrators must provide solutions for.
A network core contains more hops to its adjacent network than an network cdge. In
other words, the core network has more layer 2 and 3 devices and is the center of the
enterprise network. It’s also known as the backbone network. Furthermore, we design
core networks to transfer network traffic at high speeds. A core network uses both
wide-area networks (WAN) and local area networks (LAN).
The delays, here, means the time for which the processing of a particular packet takes
place. We have the following types of delays in computer networks:
1. Transmission Delay:
The time taken to transmit a packet from the host to the transmission medium is called
Transmission delay.
2. Propagation delay:
After the packet is transmitted to the transmission medium, it has to go through the
medium to reach the destination. Hence the time taken by the last bit of the packet to
reach the destination is called propagation delay.
Delays
Contin...
3. Queueing delay:
Let the packet is received by the destination, the packet will not be processed by the
destination immediately. It has to wait in a queue in something called a buffer. So the
amount of time it waits in queue before being processed is called queueing delay.
4. Processing delay:
Now the packet will be taken for the processing which is called processing delay.
Time is taken to process the data packet by the processor that is the time required by
intermediate routers to decide where to forward the packet, update TTL, perform header
checksum calculations.
Loss
Loss refers to the number of packets that are sent but never reach their destination. Packet
loss can be caused by several factors, including:
Network Congestion: When the network is overloaded with traffic, packets may be
dropped.
Faulty Hardware: Malfunctioning network devices can cause packet loss.
Transmission Errors: Errors in data transmission due to interference, noise, or other
factors can lead to packet loss.
Throughput
Throughput is the rate at which data is successfully transferred from one point to another
in the network. It is usually measured in bits per second (bps) or its multiples (e.g., Mbps,
Gbps). Throughput is influenced by several factors, including:
Bandwidth: The maximum rate at which data can be transmitted over a network path.
Network Congestion: High levels of traffic can reduce throughput due to increased
queuing delays and packet loss.
Protocol Overheads: Protocols like TCP have overheads (e.g., acknowledgments,
retransmissions) that can reduce the effective throughput.
Switch
A switch is a hardware device in a network that connects other devices, like computers
and servers. It helps multiple devices share a network without their data interfering
with each other.
A switch works like a traffic cop at a busy intersection. When a data packet arrives, the
switch decides where it needs to go and sends it through the right port.
A switch decides the port through which a data packet shall pass with the help of its
destination MAC(Media Access Control) Address.
Protocol Layers
One way to classify network attacks is by their intent. Some attacks are designed to
disrupt the normal operation of a network or its resources, while others are designed
to steal sensitive information or take control of network resources.
Another way to classify network attacks is by the method used. Some attacks involve
exploiting known vulnerabilities in network software or hardware, while others use
social engineering techniques to trick users into revealing sensitive information.
Examples of Network Attacks
Phishing attacks
Sniffing attacks
Malware attacks