0% found this document useful (0 votes)
19 views5 pages

It Net - Reviewer

Uploaded by

Wayne Salva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views5 pages

It Net - Reviewer

Uploaded by

Wayne Salva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

space like a typical household, a single department

CHAPTER 1 NETWORK FUNDAMENTALS floor or small firm.

NETWORK - Computer networking refers


Examples of Local Area Network or LAN
to interconnected computing devices that can
exchange data and share resources with each other. 1. Home networking
2. Offices
Three common forms of network communication 3. School networking
are the following: 4. Campus university
1. Word-of-mouth communication - The 5. Two computer networking
concept of electronic word-of-mouth (eWOM) 6. Embedded systems
was introduced in the mid-1990s, when the
Internet was beginning to change the ways Metropolitan Area Network or MAN
consumers interacted with each other. - can cover a greater range than a LAN with
- has been recognized to lead to high a distance spanning from about 30 miles
retransmission intentions because it is (equivalent to 48 kilometers). This type of
easy for consumers to generate network has the capability to link several
conversations online. LANs within municipalities, or cities.
2. Telephone based technologies - is the field - High speed network communication can
of technology involving the development, only be possible if the cable used by the
application, and deployment of LAN in communicating with a MAN is
telecommunication services for the purpose of made up of fiber optic or through a high-
electronic transmission of voice, fax, or data, speed wireless technology.
between distant parties. Wide Area Network or WAN
3. Computer Networks - A computer - is considered to be the largest network
network is a set of computers sharing that can connect numerous LANs and
resources located on or provided by network even MANs across a distance that can
nodes. Computers use exceed more than 30 miles (equivalent to
common communication 48 kilometers).
protocols over digital interconnections to Personal Area Network or PAN
communicate with each other. - falls under the LAN spectrum and can
connect devices from a range of distance
The following lists the advantages of computer of up to about 33 feet (equivalent to 10
networks meters). A PAN is smaller than a LAN
• Computer networks are based from and has two forms, Cabled PAN and
telephone network communication technology Wireless PAN (WPAN).
and also make use of specialized equipment to - Examples of devices a PAN can connect
connect networks. are: Smartphones, Personal Computer and
• Unlike telephones, computer networks can do handheld devices like a Bluetooth speaker.
more, as it can transmit data from far flung Campus Area Network or CAN
places, can support video streaming and more - falls under the MAN sub-category. It
• Exchange of information is similar from how can link multiple LAN and can cover the
a person would communicate with another same range as a MAN can reach. This
person through word of mouth, the only network is owned and managed by a
difference is that it is done digitally. single organization.
Enterprise Area Network or EAN
A network is classified according to the range of - falls under the WAN sub-category.
area they can connect This has the same features as WAN as it
can link different types of networks
Local Area Network or LAN - Pertains to belonging from different organizations
printing machines, computers, and other digital from different parts of the continent.
electronics that shares a hardware and software - A network is considered as an EAN if it is
resources that are located close to each other. Its owned and managed by a single
coverage can only connect setups like: small confined corporation or group that can support a
network bigger than MAN.
- It is consists of physical and virtual • HYPERVISOR - also known as a
networks and protocols that serve the dual virtual machine monitor or VMM,
purpose of connecting all users and is software that creates and runs
systems on a local area network (LAN) to virtual machines (VMs). A hypervisor
allows one host computer to support
applications in the data center and cloud multiple guest VMs by virtually
as well as facilitating access to network sharing its resources, such as memory
data and analytics. and processing.

basic networking concept and terms 2. Hosts - refers to a computer the client workstation
is trying to access over a network.
Connection: In networking, a connection refers to
3. Workstations - a device is considered to be a
pieces of related information that are transferred workstation if it has its own central processing unit
through a network. (CPU) and an operating system that can provide
support to common applications, and firm wares.
Packet: A packet is the smallest unit that is • CLIENT OR WORKSTATION- refers to a
intentionally transferred over a network. computer that request permission to access
files from another network of computer. Host
Packets have a header portion that contains is the computer it wants to access.
information about the packet including the source and
destination, timestamps, network hops, etc. Network Interface Card (NIC) - is a type of
network board with sockets mounted inside a
Network Interface: A network interface can refer to motherboard.
any kind of software interface to networking - - The said receptacle is where the network
hardware. cable will be plugged in, in order to
connect the computer to a network device.
- An NIC also supports wireless network
CHAPTER 2 communication. It has an antenna (that is
usually not visible) that detects wireless
USE OF FUNDAMENTAL NETWORK TERMS signals.
- Every NIC Card contains a unique MAC
Node (also known as station) Address that can never change because
pertains to a network of personal computers, the address is assigned at the factory
servers, mainframes (computers used for the where NIC is manufactured.
extremely complex calculation/s), printers, DVD / MAC Address - is a Physical Address that is
CD-ROM racks, fax machines, disk tapes, network assigned by the manufacturer on a network interface
interfaces and other machines makes up the (NIC), use to uniquely identify a device in a network.
component of the network. Every one of them is a
node if connected to the network directly. - it is a 48-bit address, consist of six sets of two
characters in hexadecimal numbers, every set
wired cabling (also referred to as wired contains 8 bit address separated by a colon:
communications media): fiber-
optic cables, twisted pair cables, coaxial cables Functions of NIC

wireless communications media: infrared waves, 1. NIC provides physical connectivity between a
microwaves, radio device and a network. A wired NIC typically
waves uses an Ethernet cable to connect to the
network, while wireless NIC uses radio waves
Three examples of essential nodes that a user access, to connect wirelessly.
are the following: 2. It is responsible for transmitting and receiving
1. Servers - is a computer program or device data between the device and other devices in
that provides a service to another computer the network.
program and its user, also known as the client 3. It converts the data into form that can be sent
• Physical Servers - is simply a over the network, and then back into a format
computer that is used to run server that device can understand.
software.. 4. NICs have error detection and correction
• Virtual servers - is a virtual capabalities to ensure that data is transmitted
representation of a physical server. accurately and reliably.
Like a physical server, a virtual server 5. NICs manages network traffic by prioritizing
includes its own operating system and certain types of data or limiting data
applications.
transmission to prevent congestion on the suitable for use with multiple devices and
network. networks.
6. Provides network security features such as - Easy to install and use
encryption or authentication to protect the - Can be easily replaced and upgraded.
network from unauthorized access or data - Suitable for mobile devices and laptops.
breaches.
Disadvantages of External NIC
TYPES of NIC • May require additional hardware or cables
1. Internal NIC • Not as fast or reliable as internal NICs.
2. External NIC • May require more power or affect battery life

Wired NIC CHAPTER 3 PROTOCOLS AND


- connects to the network using a physical ARCHITECTURE
cable, such as Ethernet cable. It is a
common and widely used type of NIC in Key Elements of a Protocol
desktop computers, servers, and other
devices that require high-speed and Syntax
reliable network connectivity. • Data formats
• Signal levels
- connects to the network using Wi-Fi Semantics
technology. It can offer mobility and • Control information
flexibility, making them suitable for • Error handling
portable devices such as laptops, Timing
smartphones, and tablets. • Speed matching
• Sequencing
WIRELESS NIC
- connects to the network using Wi-Fi A Three Layer Model
technology. It can offer mobility and
flexibility, making them suitable for Network Access Layer
portable devices such as laptops, • Exchange of data between the computer and
smartphones, and tablets. the network
• Sending computer provides address of
- it can provide network connectivity in destination
areas where physical connections are not • May invoke levels of service
available or practical, such as in public • Dependent on type of network used (LAN,
spaces or outdoor areas. packet switched etc.)
- can transmit data short to medium Transport Layer
distances, and their speed and reliability • Reliable data exchange
• Independent of network being used
- wireless NICs may have limitations in • Independent of application
terms of speed and reliability, particularly
when the device is far from the wireless Application Layer
access point or is subject to interference • Support for different user applications
from other wireless signals or objects • e.g. e-mail, file transfer
- Most current Wi-Fi devices operate with Protocol Data Units (PDU)
both 2.4 Ghz and 5 Ghz frequency bands. • At each layer, protocols are used to
communicate
USB NIC • Control information is added to user data at
- is a NIC that connects to the device to each layer
connect to a network using a standard • Transport layer may fragment user data
USB port, which is typically found on • Each fragment has a transport header added
most computers and laptops. - Destination SAP
- Sequence number
- Error detection code
• This gives a transport protocol data unit
Advantages of External NIC
Network PDU
- External NICs can be easily added or • Adds network header
removed from devices, making them
– Network address for destination • Session
computer – Control of dialogues between
– Facilities requests applications
– Dialogue discipline
OSI - The Model – Grouping
• A layer model – Recovery
• Each layer performs a subset of the required
communication functions • Presentation
• Each layer relies on the next lower layer to – Data formats and coding
perform more primitive functions – Data compression
• Each layer provides services to the next – Encryption
higher layer –
• Changes in one layer should not require • Application
changes in other layers – Means for applications to access OSI
environment
Service Primitives and Parameters
• Services between adjacent layers expressed in TCP/IP Protocol Architecture
terms of primitives and parameters
• Primitives specify function to be performed Physical Layer
• Parameters pass data and control info • Physical interface between data transmission
device (e.g. computer) and transmission
Primitive Types medium or network
• Characteristics of transmission medium
• Signal levels
• Data rates
• etc.

Network Access Layer


• Exchange of data between end system and
network
• Destination address provision
• Invoking services like priority

Internet Layer (IP)


• Systems may be attached to different
OSI Layers networks
• Physical • Routing functions across multiple networks
– Physical interface between devices • Implemented in end systems and routers
• Mechanical
• Electrical Transport Layer (TCP)
• Functional • Reliable delivery of data
• Procedural • Ordering of delivery
• Data Link
– Means of activating, maintaining and Application Layer
deactivating a reliable link • Support for user applications
– Error detection and control • e.g. http, SMTP.
– Higher layers may assume error free (Hyper Text Transfer Protocol)
transmission (Simple Mail Transfer Protocol)
• Network
– Transport of information TCP
– Higher layers do not need to know • Usual transport layer is Transmission Control
about underlying technology Protocol
– Not needed on direct links – Reliable connection
• Transport • Connection
– Exchange of data between end – Temporary logical association
systems between entities in different systems
– Error free • TCP PDU
– In sequence – Called TCP segment
– No losses – Includes source and destination port
– No duplicates (c.f. SAP)
– Quality of service • Identify respective users
(applications)
• Connection refers to pair of OSI - Open Systems Interconnection
ports UDP - User Datagram Protocol
• TCP tracks segments between entities on each
connection

UDP
• Alternative to TCP is User Datagram Protocol
• Not guaranteed delivery
• No preservation of sequence
• No protection against duplication
• Minimum overhead
• Adds port addressing to IP
• Alternative to TCP is User Datagram Protocol
• Not guaranteed delivery
• No preservation of sequence
• No protection against duplication
• Minimum overhead
• Adds port addressing to IP

Addressing level
• Level in architecture at which entity is named
• Unique address for each end system
(computer) and router
• Network level address
• IP or internet address (TCP/IP)
• Network service access point or NSAP
(OSI)
• Process within the system
• Port number (TCP/IP)
• Service access point or SAP (OSI)
Checksum - A simple error-detection scheme in
which each transmitted message is accompanied by a
numerical value based on the number of set bits in the
message.

ABBREVIATION

(eWOM) - electronic word-of-mouth


LAN - Local Area Network or LAN
Metropolitan Area Network or MAN
Wide Area Network or WAN
Personal Area Network or PAN
Campus Area Network or CAN
Enterprise Area Network or EAN
central processing unit (CPU)
CRC - (Cyclic Redundancy Code)
VMM - virtual machine monitor
VMs - virtual machines
NIC - Network Interface Card
CRC - (Cyclic Redundancy Code)
service access point or SAP
(PDU) - Protocol Data Units
(DARPA) - Defense Advanced Research Project
Agency
(ARPANET) - American Research Projects Agency
Network
HTTP - (Hyper Text Transfer Protocol)
SMTP - (Simple Mail Transfer Protocol)
IP - Internet Protocol
TCP - Transmission Control Protocol
NSAP - Network service access point

You might also like