0% found this document useful (0 votes)
32 views10 pages

VAPT

The document provides an overview of computer networks, focusing on network types (LANs and WANs) and topologies (star, bus, ring, mesh, tree, and hybrid). It explains the characteristics, components, and applications of each network type and topology, highlighting their differences in geographical scope, speed, ownership, and use cases. Additionally, the document introduces the OSI model, detailing each layer's function, vulnerabilities, and security measures.

Uploaded by

jaymit sarena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views10 pages

VAPT

The document provides an overview of computer networks, focusing on network types (LANs and WANs) and topologies (star, bus, ring, mesh, tree, and hybrid). It explains the characteristics, components, and applications of each network type and topology, highlighting their differences in geographical scope, speed, ownership, and use cases. Additionally, the document introduces the OSI model, detailing each layer's function, vulnerabilities, and security measures.

Uploaded by

jaymit sarena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Title: Network Types and Topologies

Introduction to Network Types:


 A computer network is a connection between two or more network devices, like
computers, routers, and switches, to share network resources. The establishment of a
computer network depends on the requirements of the communication channel, i.e.,
the network can be wired or wireless.

Introduction to Topologies:
 Network Topology is the schematic description of a network Arrangement,
connecting various nodes (sender and receiver) through Lines of connection.

 A Network Topology is the arrangement with which computer systems


Or network devices are connected to each other.

Visualizing different network structures can help clarify how various types of networks
operate and their relationships to one another. Here’s a breakdown of Local Area Networks
(LANs) and Wide Area Networks (WANs), using a home network and the internet.

Local Area Network (LAN)


Definition: A LAN is a network that connects computers and devices within a limited
geographical area, such as a home, office, or building.

Home Network Example:


 Components:
1. Router: Connects to the internet and manages traffic within the home
network.
2. Devices: Computers, smartphones, tablets, smart TVs, printers, and IoT
devices (like smart thermostats).
3. Wired Connections: Ethernet cables connecting devices directly to the
router.
4. Wireless Connections: Wi-Fi connections allowing devices to connect
without cables.
Visualization:

[Internet] -- [Router] -- [Devices]


|
[Smart TV]
|
[Printer]

1
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Figure 1: LAN

Wide Area Network (WAN)


Definition: A WAN covers a broad area, often connecting multiple LANs. It can span cities,
countries, or even continents.

Internet Example:
 Components:

1. ISPs (Internet Service Providers): Companies that provide internet access


to homes and businesses.

2. Data Centers: Facilities that house servers and networking equipment to


manage data and services.

3. Backbone Networks: High-capacity networks that interconnect various


regions and ISPs.

 Visualization:

[ISP1] -------------- [Backbone Network] ------------------ [Data Center A]

| |

[Home Network A] [Home Network B]

| |

[Devices] [Devices]

2
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Figure1.1: WAN

Comparison:
1. Geographical Scope:

 LAN: Limited to a small area (e.g., a home or office).

 WAN: Covers large distances, connecting multiple LANs.

2. Speed and Performance:

 LAN: Generally faster due to shorter distances and less congestion.

 WAN: Slower due to longer distances and more potential points of


congestion.

3. Ownership:

 LAN: Typically owned and managed by a single organization or individual.

 WAN: Often owned by multiple organizations, including ISPs and


governments.

4. Use Cases:

 LAN: File sharing, printing, and local gaming.

 WAN: Internet access, connecting remote offices, and global


communications.

Conclusion:
Understanding the differences between LANs and WANs, as well as their respective
components and structures, is crucial for grasping how networks function in various
contexts. A home network is a practical example of a LAN, while the internet serves as a
vast WAN connecting millions of such networks worldwide. In these ways there are many
such network differences between WANs and MANs, LANs and PANs, MANs and PANs
etc.

3
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Network Topologies:
It is the way devices are connected in a network. It defines how these components are
connected and how data transfer between the networks.

1. Star Topology
In a star topology, all devices (nodes) are connected to a central hub or switch. Each node
has a dedicated connection to the hub.

 Real-World Applications:

 Office Networks: Commonly used in office environments where multiple


computers and devices need to connect to a central server or internet
connection. The central hub allows for easy management and troubleshooting.

 Home Networks: Many home networks use a star topology with a router as the
central hub, connecting various devices like computers, printers, and smart home
devices.

Figure 2.1: Star Topology

2. Bus Topology
In a bus topology, all devices share a single communication line (the bus). Data travels in
both directions along the bus.

 Real-World Applications:

 Small Networks: Suitable for small networks where the number of devices is
limited, such as in small offices or classrooms.

 Temporary Networks: Often used in temporary setups, like at events or trade


shows, where a quick and easy network is needed without extensive cabling.
4
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Figure2.2: Bus Topology

3. Ring Topology
In a ring topology, each device is connected to two other devices, forming a circular
pathway for data. Data travels in one direction (or both in a dual-ring setup).

 Real-World Applications:

 Token Ring Networks: Historically used in local area networks (LANs) with
Token Ring technology, which was popular in the 1980s and 1990s.

 Fiber Distributed Data Interface (FDDI): Used in high-speed networks,


particularly in backbone networks for large organizations.

Figure2.3: Ring Topology

5
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

4. Mesh Topology
In a mesh topology, each device is connected to multiple other devices, allowing for
multiple pathways for data to travel.

 Real-World Applications:

 Wireless Networks: Used in wireless mesh networks where devices


communicate with each other directly, enhancing coverage and reliability.

 Data Centers: Employed in data centers for redundancy and fault tolerance,
ensuring that if one connection fails, data can still be routed through other paths.

 Military Applications: Used in military communications for secure and resilient


networks.

Figure2.4: Mesh Topology

5. Tree Topology
A hybrid topology that combines characteristics of star and bus topologies. It has a
hierarchical structure with a root node and various levels of connected nodes.

 Real-World Applications:

 Corporate Networks: Often used in large organizations where departments are


connected to a central network, allowing for scalability and easy management.

 Educational Institutions: Common in schools and universities to connect


various departments and facilities.

6
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Figure2.5: Tree Topology

6. Hybrid Topology
A combination of two or more different topologies, allowing for flexibility and scalability.

 Real-World Applications:

 Large Enterprises: Used in large organizations that requires a mix of topologies


to meet different departmental needs and ensure efficient communication.

 Data Centers: Employed in data centers to optimize performance and reliability


by combining various topologies based on specific requirements.

 Cloud Computing: Often used in cloud environments where different services


and applications may require different network configurations.

Figure2.6: WAN

Conclusion
Each topology has its strengths and weaknesses, making them suitable for specific
applications. The choice of topology often depends on factors such as the size of the
network, the required performance, budget constraints, and the specific needs of the
organization or application.
7
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Title: O S I M o d e l

Layer 7
Application Layer
(e.g., HTTP, FTP)

Layer 6
Presentation Layer
(e.g., SSL, TLS)

Layer 5
Session Layer
(e.g., APIs)

Layer 4
Transport Layer
(e.g., TCP, UDP)

8
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

Layer 3
Network Layer
(e.g., IP)

Layer 2
Data Link Layer
(e.g., Ethernet)

Layer 1
Physical Layer
(e.g., Cables, Hubs, Switches)

1. Physical Layer (Layer 1):

 Transmits raw data over physical mediums.

 Vulnerabilities include physical damage and eavesdropping.

 Security measures involve physical security controls and monitoring.

2. Data Link Layer (Layer 2):

 Manages node-to-node data transfer.

 Vulnerabilities include MAC address spoofing and VLAN hopping.

 Security measures include port security and VLAN segmentation.

9
Introduction to Computer Networks, OSI Model, and Network Security Fundamentals.

3. Network Layer (Layer 3):

 Routes data packets.

 Vulnerabilities include IP spoofing and routing attacks.

 Security measures involve firewalls and anti-spoofing techniques.

4. Transport Layer (Layer 4):

 Ensures reliable data transfer.

 Vulnerabilities include session hijacking and TCP SYN flooding.

 Security measures include encryption and secure transport protocols like TLS.

5. Session Layer (Layer 5):

 Manages sessions between applications.

 Vulnerabilities include session fixation and hijacking.

 Security measures involve session tokens and secure session management.

6. Presentation Layer (Layer 6):

 Translates data formats.

 Vulnerabilities include data interception and format attacks.

 Security measures include encryption and data validation.

7. Application Layer (Layer 7):

 Interfaces with user applications.

 Vulnerabilities include SQL injection and cross-site scripting (XSS).

 Security measures involve input validation, firewalls, and application security testing.

10

You might also like