computer network
computer network
(important questions)
2. High Reliability – If there are alternate sources of supply, all files could be replicated
on two or more machines. If one of them is not available, due to hardware failure,
the other copies could be used.
4. Flexible access – Files can be accessed from any computer in the network. The
project can be begun on one computer and finished on another.
5. Security– Computer networks must be secure to protect against unauthorized
access, data breaches, and other security threats. This includes implementing
measures suchas firewalls, antivirus software, and encryption to ensure the
confidentiality, integrity, and availability of data.
6. Performance– Computer networks must provide high performance and low latency
to ensure that applications and services are responsive and available when needed.
This requires optimizing network infrastructure, bandwidth utilization, and traffic
management.
7. Scalability- Computer networks must be designed to scale up or down as needed to
accommodate changes in the number of users, devices, and data traffic. This requires
careful planning and management to ensure the network can meet current and
future needs.
8. Other goals include Distribution of processing functions, Centralized management,
and allocation of network resources, Compatibility of dissimilar equipment and
software, Good network performance, Scalability, Saving money, Access to remote
information, Person to person communication, etc.
Advantages:
Resource sharing: Networks enable the sharing of resources such as printers,
scanners, storage devices, and software applications, which can reduce costs and
increase efficiency.
Disadvantages:
Security vulnerabilities: Networks can be vulnerable to security threats such as
hacking, viruses, and malware, which can compromise sensitive data and disrupt
network operations.
Complexity: Networks can be complex to set up, configure, and maintain, requiring
specialized knowledge and expertise.
QUE- Define Topology. Explain any three topology with its advantages and
disadvatages?
ANS- Network topology refers to the arrangement of different elements like nodes, links,
and devices in a computer network. It defines how these components are connected and
interact with each other. Understanding various types of network topologies helps in
designing efficient and robust networks. Common types include bus, star, ring, mesh, and
tree topologies.
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. In
Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Mesh Topology
Advantages of Mesh Topology
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the
devices through dedicated channels or links.
Provides security and privacy.
Disadvantages of Mesh Topology
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet
service providers are connected to each other via dedicated channels. This topology is also
used in military communication systems and aircraft navigation systems.
For more, refer to the Advantages and Disadvantages of Mesh Topology.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is
the central node and all other nodes are connected to the central node. The hub can be
passive in nature i.e., not an intelligent hub such as broadcasting devices, at the same time
the hub can be intelligent known as an active hub. Active hubs have repeaters in them.
Coaxial cables or RJ-45 cables are used to connect the computers. In Star Topology, many
popular Ethernet LAN protocols are used as CD(Collision Detection), CSMA (Carrier Sense
Multiple Access), etc.
Star Topology
A star topology having four systems connected to a single point of connection i.e. hub.
Advantages of Star Topology
If N devices are connected to each other in a star topology, then the number of
cables required to connect them is N. So, it is easy to set up.
Each device requires only 1 port i.e. to connect to the hub, therefore the total
number of ports required is N.
It is Robust. If one link fails only that link will affect and not other than that.
Easy to fault identification and fault isolation.
Star topology is cost-effective as it uses inexpensive coaxial cable.
Disadvantages of Star Topology
If the concentrator (hub) on which the whole topology relies fails, the whole system
will crash down.
The cost of installation is high.
Performance is based on the single concentrator i.e. hub.
A common example of star topology is a local area network (LAN) in an office where all
computers are connected to a central hub. This topology is also used in wireless networks
where all devices are connected to a wireless access point.
For more, refer to the Advantages and Disadvantages of Star Topology.
Bus Topology
Bus Topology is a network type in which every computer and network device is connected to
a single cable. It is bi-directional. It is a multi-point connection and a non-robust topology
because if the backbone fails the topology crashes. In Bus Topology, various MAC (Media
Access Control) protocols are followed by LAN ethernet connections like TDMA, Pure Aloha,
CDMA, Slotted Aloha, etc.
Bus Topology
A bus topology with shared backbone cable. The nodes are connected to the channel via
drop lines.
Advantages of Bus Topology
If N devices are connected to each other in a bus topology, then the number of
cables required to connect them is 1, known as backbone cable, and N drop lines are
required.
Coaxial or twisted pair cables are mainly used in bus-based networks that support up
to 10 Mbps.
The cost of the cable is less compared to other topologies, but it is used to build
small networks.
Bus topology is familiar technology as installation and troubleshooting techniques
are well known.
CSMA is the most common method for this type of topology.
Disadvantages of Bus Topology
A bus topology is quite simpler, but still, it requires a lot of cabling.
If the common cable fails, then the whole system will crash down.
If the network traffic is heavy, it increases collisions in the network. To avoid this,
various protocols are used in the MAC layer known as Pure Aloha, Slotted Aloha,
CSMA/CD, etc.
Adding new devices to the network would slow down networks.
Security is very low.
A common example of bus topology is the Ethernet LAN, where all devices are connected to
a single coaxial cable or twisted pair cable. This topology is also used in cable television
networks. For more, refer to the Advantages and Disadvantages of Bus Topology.
Ring Topology
In a Ring Topology, it forms a ring connecting devices with exactly two neighboring devices. A
number of repeaters are used for Ring topology with a large number of nodes, because if
someone wants to send some data to the last node in the ring topology with 100 nodes,
then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent
data loss repeaters are used in the network.
The data flows in one direction, i.e. it is unidirectional, but it can be made bidirectional by
having 2 connections between each Network Node, it is called Dual Ring Topology. In-Ring
Topology, the Token Ring Passing protocol is used by the workstations to transmit the data.
Ring Topology
A ring topology comprises 4 stations connected with each forming a ring.
The most common access method of ring topology is token passing.
Token passing: It is a network access method in which a token is passed from one
node to another node.
Token: It is a frame that circulates around the network.
Operations of Ring Topology
1. One station is known as a monitor station which takes all the responsibility for
performing the operations.
2. To transmit the data, the station has to hold the token. After the transmission is
done, the token is to be released for other stations to use.
3. When no station is transmitting the data, then the token will circulate in the ring.
4. There are two types of token release techniques: Early token release releases the
token just after transmitting the data and Delayed token release releases the token
after the acknowledgment is received from the receiver.
Advantages of Ring Topology
The data transmission is high-speed.
The possibility of collision is minimum in this type of topology.
Cheap to install and expand.
It is less costly than a star topology.
Disadvantages of Ring Topology
The failure of a single node in the network can cause the entire network to fail.
Troubleshooting is difficult in this topology.
The addition of stations in between or the removal of stations can disturb the whole
topology.
Less secure.
The fault tolerance of a MAN is less and also there is more congestion in the network. It is
costly and may or may not be owned by a single organization. The data transfer rate and the
propagation delay of MAN are moderate. Devices used for transmission of data through
MAN are Modem and Wire/Cable. Examples of a MAN are part of the telephone company
network that can provide a high-speed DSL line to the customer or the cable TV network in a
city.
Advantages:
Provides high-speed connectivity over a larger geographical area than LAN.
Can be used as an ISP for multiple customers.
Offers higher data transfer rates than WAN in some cases.
Disadvantages:
Can be expensive to set up and maintain.
May experience congestion and network performance issues with increased usage.
May have limited fault tolerance and security compared to LANs.
Wide Area Network (WAN) –
WAN or Wide Area Network is a computer network that extends over a large geographical
area, although it might be confined within the bounds of a state or country. WAN has a
range of above 50 km. A WAN could be a connection of LAN connecting to other LANs via
telephone lines and radio waves and may be limited to an enterprise (a corporation or an
organization) or accessible to the public. The technology is high-speed and relatively
expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN is difficult to
design and maintain. Similar to a MAN, the fault tolerance of a WAN is less and there is more
congestion in the network. A Communication medium used for WAN is PSTN(Public Switched
Telephone Network) or Satellite Link. Due to long-distance transmission, the noise and error
tend to be more in WAN.
WAN’s data rate is slow about a 10th LAN’s speed since it involves increased distance and
increased number of servers and terminals etc. The speed of WAN ranges from a few kilobits
per second (Kbps) to megabits per second (Mbps). Propagation delay is one of the biggest
problems faced here. Devices used for the transmission of data through WAN are Optic
wires, Microwaves, and Satellites. An example of a Switched WAN is the asynchronous
transfer mode (ATM) network and Point-to-Point WAN is a dial-up line that connects a home
computer to the Internet.
Advantages:
Covers large geographical areas and can connect remote locations.
Provides connectivity to the internet.
Offers remote access to resources and applications.
Can be used to support multiple users and applications simultaneously.
Disadvantages:
Can be expensive to set up and maintain.
Offers slower data transfer rates than LAN or MAN.
May experience higher latency and longer propagation delays due to longer distances
and multiple network hops.
May have lower fault tolerance and security compared to LANs.
As shown in the above example, we have two networks, Network A and Network B. Host A
from Network A wants to transmit data to all the nodes in Network B.
Source IP address: 11.2.3.1
Destination IP address: 20.255.255.255
B. Limited Broadcast
Limited Broadcast is defined as a type of transmission of data where the source host sends
the data packets to all the other available nodes connected in the same network. The limited
broadcast can be achieved by setting 1 for all the 32 bits of receiving IP address. Let’s see
with an example.
As shown in the above figure, We have a single network of devices. All the devices are
connected to the same network. The sending host sends the data packets to all the other
nodes in the same network.
Source IP address: 11.2.3.1
Destination IP address: 255.255.255.255
Multicast
Multicast is defined as a type of transmission of data where one or more sending hosts
sends the data packets to one or more receiving hosts in another network. This type of
transmission is known as one-to-many communication. Class D of IP address is reserved for
multicast groups. Multicast is more efficient than unicast when multiple nodes want to
receive the same data. Let’s see the example of multicast transmission.
As shown in the above figure, we have two networks A and B. Sending host A belongs to one
network and multiple receiving hosts from network B. Examples where multicast
transmission is used are:
Video conference
Internal Streaming
Sending an email or WhatsApp message to a group of people
Difference Between Direct Broadcast and Limited Broadcast
Direct Broadcast and Limited Broadcast are the two sub-types of broadcast. Both work
according to one communication approach but differs with respect to some properties. Let’s
see the difference between them.
network.
Source IP address:
Source IP address: 11.2.3.1
11.2.3.1
Example Destination IP address:
Destination IP address:
255.255.255.255
20.255.255.255
Protocols
In the above diagrams, Protocols are shown as a set of rules. Communication between the
Sender and Receiver is not possible without Protocol.
Key Elements of Protocol
Syntax: Syntax refers to the structure or the format of the data that gets exchanged
between the devices. Syntax of the message includes the type of data, composition
of the message, and sequencing of the message. The starting 8 bits of data are
considered as the address of the sender. The next 8 bits are considered to be the
address of the receiver. The remaining bits are considered as the message itself.
Semantics: Semantics defines data transmitted between devices. It provides rules
and norms for understanding message or data element values and actions.
Timing: Timing refers to the synchronization and coordination between devices while
transferring the data. Timing ensures at what time data should be sent and how fast
data can be sent. For example, If a sender sends 100 Mbps but the receiver can only
handle 1 Mbps, the receiver will overflow and lose data. Timing ensures preventing
of data loss, collisions, and other timing-related issues.
Sequence Control: Sequence control ensures the proper ordering of data packets.
The main responsibility of sequence control is to acknowledge the data while it get
received, and the retransmission of lost data. Through this mechanism, the data is
delivered in correct order.
Flow Control: Flow control regulates device data delivery. It limits the sender’s data
or asks the receiver if it’s ready for more. Flow control prevents data congestion and
loss.
Error Control: Error control mechanisms detect and fix data transmission faults. They
include error detection codes, data resend, and error recovery. Error control detects
and corrects noise, interference, and other problems to maintain data integrity.
Security : Network security protects data confidentiality, integrity, and authenticity.
which includes encryption, authentication, access control, and other security
procedures. Network communication’s privacy and trustworthiness are protected by
security standards.
Types of Protocol
Network Layer Protocols : Network layer protocols operate in the network layer
which is also known as the Layer 3 of the network architecture. Network layer
protocols are responsible for packet routing, forwarding, and addressing of data
packets throughout the network. IP and ICMP are the network layer protocols.
Transport Layer Protocols: Transport layer protocols work in the transport layer
which provides end-to-end service ensuring data transfer across apps on different
devices. TCP and UDP are the most popular transport layer protocols.
Application Layer Protocol: Application layer protocol working in the application
layer of the network architecture provides communication between applications
running on different devices. The application layer protocols enable cross-device
communication. They format, exchange, and interpret application data. HTTP, FTP,
and SMTP are examples.
Wireless Protocols: Wireless protocols basically used in wireless communication
which enables data transfer through wireless networks. Bluetooth, Wi-Fi, and LTE
protocols are examples.
Routing Protocols: Routing protocol establishes the best/optimal network pathways
throughout the network for fastest data transmission. Routers share information to
develop and maintain routing tables. RIP, OSPF, and BGP are examples.
Security Protocols : security protocol protects data confidentiality, integrity, and
authenticity while transmission of data over the network. They include SSL and TLS,
encryption methods, and authentication protocols for providing data security.
Internet Protocols : IP identifies devices uniquely. Internet protocol provides data
communication through routing and forwarding data packets from one device to
another by unique addressing scheme.
Important Protocols Used in Computer Network
Here are some key protocols that are widely used in computer networks:
TCP (Transmission Control Protocol): Ensures data is sent and received accurately by
breaking it into packets, sending them, and reassembling them at the destination.
IP (Internet Protocol): Addresses and routes the packets to make sure they reach the
right destination.
HTTP/HTTPS (HyperText Transfer Protocol/Secure): HTTP used for transferring web
pages on the internet. When you browse a website, your browser uses HTTP to
request and display web pages. And HTTPs is a secure version of HTTP that encrypts
data to protect it from being intercepted.
FTP (File Transfer Protocol): Used for transferring files between computers on a
network. It allows users to upload and download files.SMTP (Simple Mail Transfer
Protocol): Used for sending emails. It transfers emails from a client to a server or
between servers.
DNS (Domain Name System): It is used to translates human-readable domain names
(like www.example.com) into IP addresses that computers use to identify each other
on the network.
DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to
devices on a network, ensuring each device has a unique address.
SSH (Secure Shell): Provides a secure way to access and manage devices over a
network. It encrypts the data, making it safe from eavesdropping.
SNMP (Simple Network Management Protocol): Used for managing and monitoring
network devices like routers, switches, and servers. It collects and organizes
information about these devices
How are Protocols Used in Cyber Attacks?
Attackers can misuse the rules of how data is sent over the internet to cause problems for
systems. One common way they do this is through distributed denial-of-service (DDoS)
attacks.
For example, in a SYN flood attack, attackers exploit the TCP protocol. Normally, a device
sends a SYN packet to a server to start a connection, and the server responds, expecting a
final response to complete the connection. Attackers send many SYN packets but never
complete the connections. This overloads the server, preventing it from working properly for
real users.
Cloudflare offers solutions to stop these kinds of attacks. One of their services, Cloudflare
Magic Transit, protects against attacks targeting different levels of the network system. In
the case of a SYN flood attack, Cloudflare manages the TCP connections for the server, so the
server doesn’t get overwhelmed and can continue to serve real users.
What is Standards?
Standards are the set of rules for data communication that are needed for the exchange of
information among devices. It is important to follow Standards which are created by various
Standard Organizations like IEEE, ISO, ANSI, etc.
Types of Standards
De Facto Standard: The meaning of the work ” De Facto ” is ” By Fact ” or “By
Convention”.These are the standards that have not been approved by any
Organization but have been adopted as Standards because of their widespread use.
Also, sometimes these standards are often established by Manufacturers.
For example : Apple and Google are two companies that established their own
rules for their products which are different. Also, they use some same standard rules
for manufacturing their products.
De Jure Standard: The meaning of the word “De Jure” is “By Law” or “By
Regulations”.Thus, these are the standards that have been approved by officially
recognized bodies like ANSI, ISO, IEEE, etc. These are the standards that are
important to follow if it is required or needed.
For example : All the data communication standard protocols like SMTP, TCP,
IP, UDP etc. are important to follow the same when we need them.
Protocol and Standard Compliance in Network Security
Interoperability: Protocols and standards allow devices and systems to
communicate. These protocols ensure network components can function together,
avoiding risks and security gaps produced by incompatible or unsupported systems.
Security Baseline : Protocols and standards contain security principles and best
practices that help secure network infrastructure. These protocols allow
organizations to protect sensitive data via encryption, authentication, and access
controls.
Vulnerability Management : Network security protocols and standards help
organizations find and fix vulnerabilities. Many standards requires regular security
assessments, vulnerability scanning, and penetration testing to discover network
infrastructure flaws. Organizations can prevent cyberattacks and address
vulnerabilities by following these compliance criteria.