Networks
Networks
Types of Networks:
● Personal Area Network (PAN): This is the smallest and simplest type of
network, typically used for personal devices within a single room.
● Local Area Network (LAN): This network covers a small geographical area
like a home, office, or school. It's fast and used for connecting computers close
to each other.
● Campus Area Network (CAN): Larger than LANs, CANs cover a range of
buildings like a university campus or corporate facility.
● Metropolitan Area Network (MAN): This spans a larger geographic area,
such as a city or metropolitan area, providing high-speed connectivity between
different LANs.
● Wide Area Network (WAN): The largest type of network, covering national
or international distances, used to connect different smaller networks like
LANs or MANs.
Network Topologies:
● Bus Topology: All devices are connected to a single central cable, the bus.
Data travels in one direction, and if the bus fails, the whole network fails.
● Ring Topology: Each device is connected to two others, forming a ring. Data
travels in one direction, or both if dual rings are used, which can provide
redundancy.
● Star Topology: Each device connects to a central hub. If a single cable fails,
only the connected device is affected, not the entire network.
2. OSI Model
The OSI Model (Open Systems Interconnection Model) helps in understanding how
networks operate. It divides network communication into seven layers. Each layer
serves a specific function:
1. Physical Layer: This is the basic network layer that deals with the physical
connection between devices, like cables and switches.
2. Data Link Layer: It organizes data into frames and detects errors in the
physical layer.
3. Network Layer: It decides how data is sent to the receiver’s address.
4. Transport Layer: Ensures complete data transfer by checking for errors and
providing flow control.
5. Session Layer: Manages connections and maintains sessions between
applications.
6. Presentation Layer: Translates data between the network and the application
format.
7. Application Layer: Handles end-user operations and provides services like
email and file transfers.
Channel Commutation
Channel commutation is a method where a direct and continuous path is set up and
held open between two points for the entire duration of a communication session. It's
like having a road reserved only for one driver from start to finish, ensuring that they
can travel without interruptions. This method guarantees that the communication will
be smooth and steady, which is perfect for phone calls or live videos where you can't
afford delays. However, this can be inefficient because the road (or channel) can't be
used by others until the conversation is over, even if no one is talking at the moment.
Packet Commutation
Packet commutation is more like sending a series of small notes through different
routes in a city to reach the same destination. Instead of sending one long message
over a dedicated line, the message is broken into smaller parts called packets. Each
packet can travel through different paths in the network, depending on which roads are
less busy. Once all packets arrive at the destination, they are reassembled into the
original message. This method is very flexible and efficient because it uses all
available routes and adjusts in real-time to avoid congestion. It’s great for sending
emails or browsing the web, where a slight delay in assembling the messages at the
end is acceptable.
4.Physical Layer Environment
The Physical Layer is the lowest layer of the OSI model, dealing directly with the
network's physical aspects of data transmission. It includes various types of cables and
wireless technologies.
Copper Cables
Categories:
Fiber optics use light to transmit data, offering higher speeds and longer transmission
distances:
Wireless Technologies
Wireless technologies transmit data using electromagnetic waves, eliminating the need
for physical cables. Types include:
Ethernet is the most widely used method for connecting devices in local area networks
(LANs). It defines how network devices can format and transmit data so other devices
on the same local network segment can recognize, receive, and process it.
Ethernet uses the CSMA/CD protocol to manage how data is transmitted across the
network to prevent conflicts and ensure reliable data transfer:
● Carrier Sense: Before sending data, a device checks the network to ensure no
other device is transmitting at that moment. If the line is clear, the device will
proceed to transmit data.
● Multiple Access: This refers to the fact that multiple devices are connected to
and can transmit on the same network medium. This setup requires rules like
CSMA/CD to manage the access efficiently.
● Collision Detection: During transmission, if the device detects that another
device has transmitted simultaneously, leading to a data collision, both devices
stop transmitting. They wait for a random period before attempting to resend
their data, minimizing the chance of colliding again.
Ethernet Performance
The performance of an Ethernet network can degrade with the increase in the number
of devices or heavy traffic, primarily due to collisions. When too many devices
attempt to communicate at once, collisions become more frequent, and the network
must spend more time resolving these collisions rather than transmitting actual data.
● Half-duplex mode: Devices can either send or receive data at any given time,
not both simultaneously, which can lead to collisions.
● Full-duplex mode: Devices can send and receive data simultaneously,
effectively doubling the potential bandwidth and eliminating collisions.
6.Network Devices Working Principles and Differences:
Network Devices Overview
Network devices are essential components used to connect and manage the flow of
data across a computer network. Each device plays a specific role in facilitating
communication and ensuring data reaches its intended destination correctly and
efficiently.
Network Cards
Repeaters
Hubs
Switches
● Transmission Type:
○ Hubs: Broadcast data to all network ports.
○ Switches: Direct data to specific devices based on MAC address.
● Performance:
○ Hubs: Can lead to data collisions because all devices share the same
bandwidth.
○ Switches: Reduce collisions and effectively manage network traffic
through segmentation and dedicated communication channels.
● Usage:
○ Hubs: Simple and cost-effective for small setups.
○ Switches: Scalable and suitable for larger networks with higher
performance needs.
7.VLAN Technology Overview
Overview of VLAN Technology
Benefits of VLANs
● Purpose: Provides services related to the session layer of the OSI model,
allowing applications on different computers to communicate over a local
network.
● Functionality: It is not a networking protocol but a programming interface. It
uses a software interface and a naming service for locating networked
computers.
IPX/SPX
● Purpose: The network layer protocol in the IPX/SPX stack which routes
messages from one node to another.
● Functionality: Primarily used in networks involving Novell NetWare
operating systems. It provides connectionless datagram services.
TCP/IP
IP (Internet Protocol):
Digital systems use various number systems to represent and process data.
Understanding these systems is crucial for programming, computing, and digital
electronics.
Boolean (Binary)
● Basics: Uses only two digits, 0 and 1. Each digit in this system is called a bit,
which is the smallest unit of data in computing.
● Usage: Ideal for computers because digital devices have two stable states,
generally represented as on (1) and off (0). Boolean logic is fundamental to
circuit design and programming, where it helps in decision-making processes.
Octal
Decimal
● Basics: Base-10 number system, which is the most familiar to us because it's
the system used in everyday counting. It uses the digits 0 to 9.
● Usage: Predominant in human interactions and data entry. Most programming
languages support decimal input and can convert it into binary code that
computers process.
Hexadecimal
Summary
Each number system has its specific applications and advantages:
● Binary is fundamental for all digital technology, underlying all processes and
storage.
● Octal offers a simpler, more compact alternative to binary but is less
commonly used today.
● Decimal is essential for interfaces that interact directly with humans.
● Hexadecimal provides a compact and efficient way to represent binary data in
a form that is easier for humans to understand and manipulate, especially in
programming and digital electronics.
10.TCP/IP Protocol Addressing System; (A, B, C, D, E)
Classes
TCP/IP Protocol Addressing System
IP Address Classes
The Internet Protocol (IP) version 4 (IPv4) defines several classes of IP addresses.
These classes are designated A through E, primarily based on the size of the network
and the number of hosts it supports:
● Class A:
○ Range: 1.0.0.0 to 126.255.255.255
○ Networks: Large networks with many devices.
○ Structure: First octet is the network part, followed by three octets for
the host part.
○ Identifier: The first bit of the first octet is always 0.
● Class B:
○ Range: 128.0.0.0 to 191.255.255.255
○ Networks: Medium-sized networks.
○ Structure: First two octets are the network part, and the last two are for
hosts.
○ Identifier: The first two bits are 10.
● Class C:
○ Range: 192.0.0.0 to 223.255.255.255
○ Networks: Small networks (commonly used in business environments).
○ Structure: First three octets are the network part, and the last octet is
for hosts.
○ Identifier: The first three bits are 110.
● Class D:
○ Range: 224.0.0.0 to 239.255.255.255
○ Purpose: Reserved for multicast groups.
○ Structure: Not divided into network and host parts.
○ Identifier: The first four bits are 1110.
● Class E:
○ Range: 240.0.0.0 to 255.255.255.255
○ Purpose: Reserved for future use, experimental purposes, and research.
○ Structure: Not divided into network and host parts.
○ Identifier: The first four bits are 1111.
In the TCP/IP protocol suite, IP addresses are categorized into public and private
addresses. This distinction is crucial for managing traffic on the internet and within
private networks.
Public IP Addresses
● Purpose: Public IP addresses are used on the internet and can be accessed from
any computer around the world. These addresses must be unique across the
entire internet.
● Usage: They are typically assigned to websites, external-facing servers, and
routers that connect home or business networks to the internet. Internet Service
Providers (ISPs) allocate these addresses.
● Characteristics: Public IP addresses are routable on the global internet,
meaning data can be sent to these addresses from anywhere in the world.
Private IP Addresses
● Purpose: Private IP addresses are used within a private network (like a home,
office, or enterprise internal network) and are not routable on the public
internet. This means that these addresses are not accessible from outside the
network and can be used without registration with an internet authority.
● Usage: Devices within the same local network communicate with each other
using private IPs. If they need to connect to the internet, a device called a
router uses Network Address Translation (NAT) to convert private IPs into a
public IP.
● Ranges:
○ Class A: 10.0.0.0 to 10.255.255.255
○ Class B: 172.16.0.0 to 172.31.255.255
○ Class C: 192.168.0.0 to 192.168.255.255
○ These ranges are set aside specifically for private use and are recognized
by all routing equipment as private.
Network Creation:
Subnetwork Creation:
Example:
● Main Network: 192.168.1.0 with a subnet mask of 255.255.255.0 can host 254
devices.
● Subnetting: Changing the mask to 255.255.255.192 creates smaller
subnetworks, each supporting up to 62 devices.
Network ID