Short Note 1
Short Note 1
1. OSI Model:
o Layer 1 (Physical): Deals with the physical connection between devices,
including cables, switches, and transmission of raw data.
o Layer 2 (Data Link): Handles error detection and correction from the Physical
Layer. Includes MAC addresses.
o Layer 3 (Network): Manages logical addressing and routing (e.g., IP addresses).
o Layer 4 (Transport): Ensures error recovery and data flow control (TCP/UDP).
o Layer 5 (Session): Manages sessions between applications.
o Layer 6 (Presentation): Translates data formats (e.g., encryption).
o Layer 7 (Application): Provides services for applications (e.g., HTTP, FTP).
2. IP Addressing:
o IPv4: 32-bit address, e.g., 192.168.1.1.
o IPv6: 128-bit address, e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
o Subnetting: Divides an IP network into smaller sub-networks, improving
management and security.
3. TCP vs. UDP:
o TCP (Transmission Control Protocol): Connection-oriented, reliable, and
ensures data delivery.
o UDP (User Datagram Protocol): Connectionless, faster, but without guarantees
of delivery.
4. DNS (Domain Name System):
o Translates human-readable domain names into IP addresses.
o Essential for accessing websites and services on the internet.
5. NAT (Network Address Translation):
o Allows multiple devices on a local network to share a single public IP address.
o Enhances security and conserves IP addresses.
6. VPN (Virtual Private Network):
o Creates a secure connection over a public network, encrypting data and masking
the user's IP address.
o Used for secure remote access to a network.
7. MAC Address:
o A unique identifier assigned to a network interface card (NIC).
o Used in the Data Link Layer for communication within a local network.
8. Routers, Switches, Hubs:
o Router: Directs data between different networks.
o Switch: Connects devices within a network and filters data to its intended
destination.
o Hub: Broadcasts data to all devices in a network.
9. Firewall:
o A security system that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
o Can be hardware-based or software-based.
10. VLAN (Virtual Local Area Network):
o Segments a network into different broadcast domains, enhancing security and
reducing congestion.