INFOT 3 Module 1 3
INFOT 3 Module 1 3
Imagine a network as a highway system. Cars (devices) travel on roads (network cables) to
reach different destinations (other devices). Traffic lights (routers) direct the flow of cars,
ensuring smooth communication.
Benefits of Networks:
Assignment:
Individually, search for and report on 5 most important historical trivia about networking
that were not discussed in this module. Avoid duplicating information with other students as
this will be presented during recitation. Write it in a 1 whole yellow pad paper.
Example:
Trivia: The first email was sent by Ray Tomlinson in 1971, choosing the '@' symbol to
denote a user's location in a specific machine.
The TCP/IP model, commonly used in the internet, has a four-layer structure:
1. Network Access Layer: Combines the functionalities of the OSI's Physical and Data
Link layers, handling physical transmission and addressing.
2. Internet Layer: Similar to the OSI's Network Layer, it routes data packets across
networks using IP addresses.
3. Transport Layer: Similar to the OSI's Transport Layer, it ensures reliable data delivery
and manages flow control, but uses protocols like TCP and UDP.
4. Application Layer: Similar to the OSI's Application Layer, it provides services to
applications like email, web browsing, and file sharing.
While the OSI model is intricate and conceptual, the TCP/IP model's simplicity has led to its
extensive adoption, making it the standard for modern networking. The choice between them
hinges on specific needs and practical considerations, showcasing the balance between
theoretical understanding and practical implementation.
• Key Features:
o Covers a small geographical area (e.g., office,
school, home)
o Offers high speeds and low latency (delay)
o Enables easy sharing of resources like printers
and files
o Requires separate internet access for each LAN
• Key Features:
o Covers a wide geographical area (e.g., state,
country, globe)
o Connects users and resources geographically dispersed
o Enables remote access to resources
o May have lower speeds and higher latency compared to LANs
o Requires specialized equipment and connections
• Key Features:
• Personal Area Network (PAN): A Personal Area Network (PAN) is a network that connects
personal devices like smartphones, headsets, and fitness trackers within close proximity,
typically using wireless technologies like Bluetooth. PANs enable communication and data
sharing among personal devices.
Connects personal devices like smartphones, headsets, and fitness trackers within close
proximity using technologies like Bluetooth.
• Virtual Private Network (VPN): A Virtual Private Network (VPN) is a secure network that
creates a private and encrypted communication tunnel over a public network, often the
internet. VPNs allow remote devices to connect securely, ensuring the confidentiality and
integrity of data during transmission.
Creates a secure tunnel over a public network like the internet, allowing remote devices to
connect securely.
• Storage Area Network (SAN): A Storage Area Network (SAN) is a high-speed network
dedicated to connecting storage devices for centralized data access. SANs are commonly
used in data centers to provide efficient and reliable storage solutions, facilitating the sharing
and management of large volumes of data.
High-speed network dedicated to connecting storage devices for centralized data access,
typically used in data centers.
1.4.1 Routers:
• Routers are used in homes, businesses, and internet service providers (ISPs).
• Routers analyze the network landscape, considering factors like traffic congestion and
distance, to determine the most efficient route for each packet to reach its intended
destination.
• Routers are essential whenever you need to connect to the internet, manage multiple
networks (like having a separate network for guests), or establish secure connections
between different network segments.
1.4.2 Switches:
• Switches are commonly used in LANs within homes, offices, and data centers.
• Switches forward data only to the specific device it's intended for, reducing network
congestion and enhancing performance.
• Switches are ideal when you have multiple devices within a network that need to
communicate frequently and efficiently, like computers, printers, and servers in an office
setting.
Real-World Scenario: In an office network, a switch connects computers, printers, and other
devices. When one computer sends data to another, the switch ensures that the data reaches
its intended destination directly, improving network speed.
1.4.3 Firewalls:
• Firewalls are crucial in homes, businesses, and data centers to protect against
unauthorized access.
• They inspect and filter data packets, blocking or allowing traffic based on security
policies.
• Firewalls are used continuously to safeguard networks from cyber threats.
Real-World Scenario: In a corporate environment, a firewall protects the internal network from
external threats. It examines incoming and outgoing data, preventing unauthorized access and
ensuring the security of sensitive information.
1.4.4 Hubs:
Real-World Scenario: In a small home network, a hub might have been used in the past to
connect a few computers. However, due to their limitations, switches are now preferred for
better performance and security.
• Modems: Convert digital data from a computer into a form suitable for transmission over
telephone or cable lines.
• Access Points: Facilitate wireless communication, allowing devices to connect to a
wired network using Wi-Fi.
• Bridge: Connects two or more network segments and operates at the data link layer,
reducing overall network traffic.
• Repeater: Extends the range of a network by amplifying and retransmitting signals.
Ranking of Devices:
• Smartest Device: Routers are typically considered the smartest among the three. They
make intelligent decisions about the best paths for data, ensuring efficient and secure
communication between networks.
• Intermediate Device: Switches are intermediate devices, facilitating efficient
communication within a single network but without the decision-making complexity of
routers.
• Basic Device: Hubs are considered the most basic among the mentioned devices,
broadcasting data without the ability to make intelligent forwarding decisions. They are
rarely used in modern networks.
This module delves into the world of network media and connectivity, exploring both
wired and wireless technologies that enable devices to communicate and share
information. Understanding these technologies is crucial for anyone involved in setting
up, managing, or troubleshooting networks.
Wired networks transmit data over physical cables, offering reliable and secure
connections. Let's explore some common types:
o Uses thin glass or plastic fibers to transmit light pulses, offering the fastest
speeds and longest distances.
o Immune to electromagnetic interference and ideal for high-bandwidth
applications.
o More expensive than copper cables but becoming increasingly popular.
• Cabling Standards:
Several industry standards define the specifications and performance
characteristics of network cables. Knowing these standards is essential for
ensuring compatibility and reliability. Here are some key standards:
Wireless networks transmit data using radio waves or infrared waves, providing mobility
and flexibility. Here are some key technologies:
• Wi-Fi:
o Most popular wireless networking technology, operating in the 2.4 GHz and 5
GHz bands.
o Offers varying speeds and ranges depending on the standard (802.11n,
802.11ac, etc.).
o Commonly used for home, office, and public Wi-Fi hotspots.
• Bluetooth:
o Short-range wireless technology for connecting devices like smartphones,
headphones, and printers.
o Uses lower power consumption than Wi-Fi and suitable for data transfer and
peripheral connections.
• Cellular Networks:
o Mobile network technology used by smartphones and other devices for internet
access on the go.
o Offers varying speeds and coverage depending on the generation (3G, 4G, 5G).
o Requires a subscription to a mobile service provider.
The choice between wired and wireless depends on several factors, including:
Network Security:
Securing both wired and wireless networks is crucial to protect against unauthorized
access, data breaches, and other threats.
Data doesn't travel through cables or airwaves on its own. Network devices play a
crucial role in connecting devices, managing data flow, and ensuring smooth
communication. Some key devices include:
• Network Interface Cards (NICs): Installed in devices like computers and laptops, NICs
enable them to connect to the network.
• Switches and Routers: Forward data packets between devices and networks, directing
them to the correct destination.
• Access Points (APs): Create wireless networks by broadcasting Wi-Fi signals.
Remember, this module provides a basic overview. As you delve deeper into the world
of networking, you'll discover a vast and exciting field with endless possibilities.
Now that we've explored the different types of network media, let's delve deeper into
how these devices are interconnected. Network topologies describe the physical or
logical arrangement of devices and connections within a network. Understanding these
topologies is crucial for designing, implementing, and troubleshooting efficient network
systems.
Several network topologies exist, each with its own unique characteristics:
• Bus Topology:
o All devices are connected to a single shared cable, similar to a daisy chain.
o Simple to set up and cost-effective for small networks.
o Failure of one device or cable can disrupt the entire network.
o Not suitable for large networks or high-traffic environments.
• Star Topology:
o Each device is connected to a central hub or switch, creating a star-like pattern.
o Easy to manage and troubleshoot, as each device has its own dedicated
connection.
o Failure of the central device can bring down the entire network.
o Requires more cabling than bus topology.
• Mesh Topology:
o Devices are interconnected with multiple pathways, creating a web-like structure.
o Highly reliable and fault-tolerant, as data can take alternate routes if one path
fails.
o Complex to design and manage due to the numerous connections.
o More expensive to implement than other topologies.
• Tree Topology:
o Combines elements of bus and star topologies, with central hubs or switches
connected in a hierarchical structure.
o Offers scalability and flexibility, allowing for expansion and growth.
o Increased complexity compared to simpler topologies.
• Hybrid Topology:
o Combines multiple topologies to suit
specific network needs.
o Offers flexibility and customization
to address unique requirements.
o Increased complexity in design and
management.
o Requires careful planning and
implementation.
The best topology for your network depends on several factors, including:
• Size and complexity of the network: Larger networks may benefit from more scalable
topologies like tree or mesh.
• Performance requirements: High-traffic environments may require topologies that
minimize congestion, like star or mesh.
Conclusion:
Understanding network topologies is essential for designing and managing efficient and
effective networks. By carefully considering the advantages, disadvantages, and
specific requirements of your network, you can choose the topology that best suits your
needs.
• Ethernet Adapter:
o Most commonly used for wired connections,
utilizing Ethernet cables and ports.
o Offers high speeds and reliable performance
for desktops, laptops, and network devices.
• Wireless Adapter:
o Enables wireless connections to Wi-Fi
networks, using radio waves for data
transmission.
o Provides mobility and flexibility for laptops,
tablets, and smartphones.
• Powerline Adapter:
o Uses existing electrical wiring in a building to
transmit network data.
o Useful for connecting devices in areas with
limited cable access or Wi-Fi coverage.
• Hardware Issues:
o Faulty network adapters, cables, or network devices can cause connection
problems.
o Check for physical damage, loose connections, or outdated drivers.
• Software Issues:
o Incorrect network configurations, outdated drivers, or software conflicts can
interfere with connectivity.
o Verify settings, update drivers, and troubleshoot software conflicts.
• Network Issues:
o Problems with your router, internet service provider (ISP), or network
infrastructure can disrupt connections.
o Contact your ISP or network administrator for assistance.
• Update Drivers:
o Regularly update network adapter drivers to ensure compatibility and security.
• Secure Your Network:
o Use strong passwords, enable encryption, and implement security measures to
protect your network.
• Monitor Performance:
o Regularly check network performance and troubleshoot potential issues
proactively.
• Invest in Quality Hardware:
o Use reliable network adapters, cables, and routers to minimize hardware-related
problems.
• Plan for Expansion:
o Choose network solutions that can adapt to future growth and changing needs.
Conclusion:
Overview of IP Addressing:
Every device connected to a network, whether it's a computer, smartphone, or server, requires
an IP address to communicate with other devices. IP addressing provides a standardized way to
identify each device within a network and across the internet.
• IPv6 Addressing: IPv6 (Internet Protocol version 6) addresses are 128-bit addresses
represented in hexadecimal notation (e.g.,2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IPv6 was developed to address the limitations of IPv4 and provide an exponentially
larger address space, accommodating the increasing number of devices connected to
the internet.
1. Public IP Addresses:
• Public IP addresses are globally unique and routable on the internet.
• They are assigned to devices directly connected to the internet, such as routers,
servers, and public-facing devices.
• Public IP addresses are allocated by Internet Service Providers (ISPs) and are
registered in public IP address registries.
• Example: When you access a website from your home computer, your computer
uses a public IP address assigned by your ISP to communicate with the
website's server.
2. Private IP Addresses:
• Private IP addresses are used for internal networks, such as home or office
networks.
• They are not routable on the internet and are meant for private use within a local
network.
• Private IP addresses are defined in specific ranges reserved for private networks,
as specified in RFC 1918.
• Examples of private IP address ranges include:
• 10.0.0.0 to 10.255.255.255 (Class A)
• 172.16.0.0 to 172.31.255.255 (Class B)
• 192.168.0.0 to 192.168.255.255 (Class C)
• Private IP addresses enable devices within a local network to communicate with
each other without directly accessing the internet.
Classful Addressing:
Classful addressing was the original method for assigning IP addresses and dividing the IPv4
address space into distinct classes: A, B, and C. Each class had predefined ranges of IP
addresses and subnet masks:
1. Class A Addresses:
• Class A addresses start with a binary 0 as their first bit.
• They have a default subnet mask of 255.0.0.0 (/8).
• Class A addresses allocate the first octet for network identification and the
remaining three octets for host addresses (N.H.H.H).
• Range: 1.0.0.0 to 127.255.255.255 or 1-127.
2. Class B Addresses:
• Class B addresses start with binary 10 as their first two bits.
• They have a default subnet mask of 255.255.0.0 (/16).
• Class B addresses allocate the first two octets for network identification and the
remaining two octets for host addresses (N.N.H.H).
• Range: 128.0.0.0 to 191.255.255.255 or 128-191
3. Class C Addresses:
• Class C addresses start with binary 110 as their first three bits.
• They have a default subnet mask of 255.255.255.0 (/24).
• Class C addresses allocate the first three octets for network identification and the
remaining octet for host addresses (N.N.N.H).
• Range: 192.0.0.0 to 223.255.255.255 or 192-223
Classful addressing was rigid and led to inefficient use of IP address space, especially for
organizations that required varying numbers of hosts per network. This led to the development
of classless addressing.
In CIDR notation, the subnet mask is represented by a slash followed by the number of bits set
to 1 in the subnet mask. For example:
• /8 represents a subnet mask of 255.0.0.0
• /16 represents a subnet mask of 255.255.0.0
• /24 represents a subnet mask of 255.255.255.0
CIDR allows for the allocation of variable-sized subnets, enabling more efficient use of IP
address space and addressing the limitations of classful addressing.
1. Flexibility:
• Classful addressing has fixed boundaries for network classes (A, B, C), while
classless addressing allows for variable-sized subnets.
2. Efficiency:
• Classless addressing is more efficient in allocating IP addresses, as it eliminates
the need to adhere to fixed class boundaries.
3. CIDR Notation:
• CIDR notation is used in classless addressing to represent subnet masks and
network prefixes, providing a concise way to specify network addresses and their
sizes.
Conclusion:
Understanding the differences between classful and classless addressing is essential for
designing and managing modern IP networks. Classless addressing, with its flexibility and
efficiency, has largely replaced classful addressing in contemporary network implementations.
Key Takeaways:
• Classful addressing divides the IPv4 address space into fixed classes (A, B, C).
• Classless addressing (CIDR) allows for variable-sized subnets and more efficient use of
IP address space.
• CIDR notation represents subnet masks and network prefixes using a slash followed by
the number of bits.
1. Network Portion:
• The network portion of an IP address identifies the network to which the device
belongs.
• It specifies the network address and remains constant for all devices within the
same subnet.
• Subnetting involves dividing the network portion into smaller subnetworks, each
with its own subnet address.
2. Host Portion:
• The host portion of an IP address identifies the specific device within the
network.
• It varies for each device within the same subnet.
• Subnetting allows for efficient allocation of host addresses within each subnet,
reducing IP address wastage and optimizing address utilization.
Conclusion:
Subnetting is a fundamental concept in IP networking, essential for optimizing network
performance, enhancing security, and efficiently managing network resources. Understanding
subnetting basics is crucial for network administrators and engineers in designing and
maintaining robust and scalable networks.
Key Takeaways:
• Subnetting divides a large network into smaller subnetworks, known as subnets.
• IP addresses consist of a network portion and a host portion.
• Subnetting advantages include improved network performance, enhanced security,
efficient resource management, scalability, and departmental segmentation.
• Understanding subnetting basics is essential for network optimization and effective
network management.
Plotting Steps:
1. Write the network address and turn each zero into 8 bits.
2. Write binary values above zeros from right to left, starting with 1 and doubling the
number.
3. Write the number of subnets from left to right, starting with 2 doubling the
number.
4. Write the number of hosts from right to left, starting with 2 and doubling the
number.
5. Identify the partition line based on needed subnets or hosts.
6. Sum the binary values within the partition line to get the custom subnet mask.
Step 10: Find the Subnet Broadcast Address for the nth Subnet
The last IP address in the range is the subnet broadcast address. For example, if the
nth subnet is the 1st, the broadcast address is 192.10.10.15.
Step 11: Find the Assignable/Usable Addresses for the nth Subnet
Remove the subnet number and broadcast address from the range to find the
assignable addresses. For instance, if the nth subnet is the 1st, the assignable
addresses range from 192.10.10.1 to 192.10.10.14.