0% found this document useful (0 votes)
19 views6 pages

Network

The document provides an overview of networking concepts, including definitions of networking, topology, communication modes, and various network devices such as hubs, bridges, and routers. It also explains key terms like client, server, firewall, and the OSI model layers, along with their functions. Additionally, it discusses the differences between LAN and WAN, the role of SIM cards, and the importance of network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views6 pages

Network

The document provides an overview of networking concepts, including definitions of networking, topology, communication modes, and various network devices such as hubs, bridges, and routers. It also explains key terms like client, server, firewall, and the OSI model layers, along with their functions. Additionally, it discusses the differences between LAN and WAN, the role of SIM cards, and the importance of network security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

NETWORKING CONCEPTS

Question and answers

What is networking?
An interconnection of two or more computers that are able to exchange information is called
networking.

What is topology?
The actual appearance or layout of networking is called networking.

Communication mode: The mode defines in which data can flow depending upon the type media used is
called communication mode. For example, simplex mode, half duplex or full duplex.

Hub: A hardware component device used to connect several computers together.

Bridge: A device that lets you to link two networks together.

Virus: A malicious program that requires a host and is designed to make a system sick.

Example for anti-virus: Some examples of antivirus software are:

• Windows Defender
• Norton Antivirus
• McAfee Antivirus
• Avast Antivirus
• Kaspersky Antivirus
Packet Switching: switching technique is used is called a stored and forwrod in computer networks

Circuit switching in computer networks is a method of communication where a dedicated path (or
circuit) is established between two devices for the entire duration of the communication

A client is a computer or device that requests services, information, or resources from another
computer.
Example: When you use a web browser to visit a website, your computer acts as a client.
A server is a computer or device that provides services, information, or resources to clients.
Example: The website you visit is hosted on a server, which sends the website's data to your browser.
In simple terms:
The client asks for something, and the server provides it.

Concentrator:
A concentrator in a network is a device that helps connect multiple devices or computers to a network.

• It collects and combines data from different devices and sends it to the main network.

• It’s like a hub or junction that helps organize and manage the flow of data between devices.
HUB: We need Hub because a hub is a networking device that connects several computers and other
devices. A hub is the core component of a LAN it is also known as a repeater or concentrator. Every
device linked to a hub is on the same subnet and receives all data transferred there.

Expand:

ARPANET: Advanced Research Projects Agency NET


OSI: Open Systems Interconnection (OSI) model
TCP/IP: Transmission Control Protocol/Internet Protocol
HTTP: Hypertext Transfer Protocol
FTP: File Transfer Protocol
MIME: Multipurpose Internet Mail Extensions
URL: Uniform Resource Locater
VGM: Video Graphics Monitor
DMG: Deputy General Manager
LAN: Local Area Network
WAN: Wide Area Network
MAN: Metropolitan Area Network
CDMA: Code Division Multiple Access
GSM: Global System for Mobile Communication
SIM: Subscriber Identity Module
GPRS: General Packet Radio Service
SMS: Short Message Service
WiFi: Wireless Fidelity
SMTP Simple Mail Transfer Protocol (SMTP)

Cat1: Voice-grade copper, only allows voice transmission, does not support data transmission, mainly
used in telephone cables before the 1980
Cat1 is a Category of which twisted pair cable have only voice grade communication no data transfer
Radio waves: Its an example of Unguided media.

Physical layer: layer is deal with transmitting raw bits over communication channel

Interspace is a software(Using client/server model) that lets many people talk and chat online using
sound, video, and text in a 3D world.

• It’s one of the most advanced ways to communicate on the internet.

Gateway: device used to connect dissimilar networks

A firewall is a security tool for a network that can be hardware or software.


• It checks all data coming in and going out.
• Based on rules, it decides whether to allow, block, or stop the data.

Cookies are small pieces of data stored on your computer by websites you visit.
• They help websites remember things about you, like your preferences or login details.
• For example, they can keep you logged in or save your shopping cart on an online store.

Hackers
• Hackers are skilled computer experts who explore computer systems and networks.
• Some hackers use their skills to find and fix security problems (ethical hackers).
Crackers
• Crackers are individuals who break into systems or networks to steal, destroy, or harm data.
• They use their skills for illegal activities like hacking passwords or spreading viruses.

Two marks

What are the needs of network?

1. File sharing
2. Print sharing
3. Email sharing
4. Remote access
5. Sharing database
Which are the switching technologies used?

1. Cricut switching
2. Packet Switching
3. Message switching
Difference between LAN and WAN

LAN WAN
Local area network Wide area network
Coverage is comparatively low High
The total data rate of least several mbps Less the one mbps
Completer ownership by single ownership Owned by multiple organizations
Very low error rates Comparatively higher error rates

What is SIM card?


Subscriber identity module
SIM is a chip card, the size of postage stamp. A SIM is a tiny computer chip that gives a cellular device its
unique phone number. It has a memory, processor and ability to interact with user.

GPRS: General Packet Radio Service


GPRS is used in wireless mobile connection using a mobile device. With this we can access the internet,
send email, share files, watch movies, download games, images etc.

Network Devices

Modem: A modem is a device that connects your home or office to the internet.

It converts the internet signal from your service provider into a format your devices (like computers and
phones) can use. Think of it as a translator that helps your devices talk to the internet.
What is a Repeater?

A repeater is a networking device that helps to amplify and regenerate signals to increase the reach of a
network. They are instrumental in LANs and WANs as they minimize errors, reduce data loss, and ensure
reliable delivery to specific locations. One of the primary benefits of repeaters is the error-free transfer
of data over longer distances. This will ensure efficient and safe communication.

Bridge: A bridge is a device in a computer network that connects two or more smaller networks and
helps them work together as one.

It checks where data needs to go and sends it only to the right part of the network, not to everyone. This
helps reduce unnecessary traffic and makes the network faster.

Router:

A router in computer networking is a device that:

• Forwards data packets between computer networks.


• Connects different networks together and sends data packets from one network to another.
• Uses the Internet Protocol (IP) to transmit IP packets
Switch: A switch is a network device that connects multiple devices, like computers, in a smarter way.
• It sends data only to the specific device it’s meant for, not to everyone.
• This makes the network faster and more efficient.
It’s not like HUB.

RJ-45: Registered Jack 45 and is the most commonly used connector in wired networks. It connects to
network cables (like Ethernet cables) that carry internet or data signals.

Ethernet Crad: An Ethernet card, also known as a network interface card (NIC) or network adapter, is a
hardware component that enables a computer or device to connect to a local area network (LAN) or the
internet.

OSI(Open system interconnection) Reference Model


1. Physical Layer (Layer 1)
• Purpose: Deals with the physical connection between devices (cables, switches, etc.).
• Examples: Cables (Ethernet, fiber optics), Network Interface Cards (NICs), Hub.
• Function: Transmits raw bits (0s and 1s) over a physical medium.
2. Data Link Layer (Layer 2)
• Purpose: Ensures reliable communication over the physical link and handles errors.
• Examples: Switches, Network Interface Cards (NICs).
• Function: Frames the data for transmission and checks for errors.
3. Network Layer (Layer 3)
• Purpose: Routes the data across different networks (finding the best path).
• Examples: Routers, IP addresses.
• Function: Determines the path for data to travel across networks using IP addresses.
4. Transport Layer (Layer 4)
• Purpose: Ensures the reliable delivery of data between end systems.
• Examples: TCP (Transmission Control Protocol), UDP (User Datagram Protocol).
• Function: Segments data for transmission, ensures error-free delivery, and controls data flow.
5. Session Layer (Layer 5)
• Purpose: Manages sessions or connections between applications on different devices.
• Examples: APIs, RPCs (Remote Procedure Calls).
• Function: Controls dialogues (sessions) between two devices, ensuring data is sent and received
correctly.
6. Presentation Layer (Layer 6)
• Purpose: Translates the data between the application layer and the transport layer.
• Examples: Encryption, compression, translation between different formats.
• Function: Ensures the data is in a readable format for the application layer.
7. Application Layer (Layer 7)
• Purpose: This is the layer closest to the end-user and is where applications interact with the
network.
• Examples: Web browsers (HTTP), email clients (SMTP), FTP.
• Function: Provides network services to the applications (e.g., file transfer, web browsing).

Summary
➢ Layer 1: Physical medium (wires, cables)
➢ Layer 2: Reliable data transmission (error checking)
➢ Layer 3: Routing data across networks
➢ Layer 4: Ensuring reliable communication (flow control)
➢ Layer 5: Managing communication sessions
➢ Layer 6: Translating and formatting data
➢ Layer 7: End-user application interaction (email, web browsing)

All People Should Try New Dominos Piza

You might also like