Network Model
Network Model
Network systems are the name given to a system in which at least two computers
communicate
wired or wirelessly and share hardware and software resources.
Benefits of Network
1- sharing of software's
2-sharing of hardware’s
3- sharing of data
4- sharing resources
5- To Save Time
6- To save Money
Network
Types
Wire Wireless
Network Network
Geographica Organization
l Structure al Structures
Client /
PAN LAN CAN MAN WAN server
peer to peer
Organizational Structure
The organizational structure specifies the duties and authorities (roles) of the devices that
make
up the network in data transmission. Networks are divided into two based on their
organizational
structure: client/server and peer-to-peer.
Server
server is a central location that shares its resources with network or A server computer is
a powerful computer that stores, processes, and shares data or services with other
computers
Client
client is a computer, device or software that uses resources on the server or network A
client computer is a computer that connects to a server to access data, applications, or
services over a network. It sends requests to the server and receives responses.
Peer to Peer
In a peer-to-peer network, computers are connected to each other to share information or
data. All workstations have equal authority. Any computer can be made by a client or
server if desired. This network organization is suitable for use at home, at small
businesses or store.
Bus Topology
Visual 1.4 shows the connection diagram of the road topology. In this topology, all clients
are connected on a single cable line. This single cable may be called a segment,
backbone, or trunk.
When data communication occurs between two nodes, the data packet goes to all nodes.
Advantages
• Devices connect to the network easily.
• Network design is easy.
• If one device does not work, the others are not affected.
Disadvantages
• It is difficult to detect the problem.
• A problem on the main line affects all devices.
• Devices added later may affect the performance of other devices on the line
Ring Topology
In this topology, nodes are connected end-to-end around a circle.
If any cable or node fails, the connection is broken. In ring topology, messages travel in
the same direction throughout the circle (Clockwise or counterclockwise is effective).
FDDI, SONET or token ring protocols are used. Fiber optic or twisted pair cable can be used
in ring topology. However, twisted pair cable is most preferred.
Visual 1.5 shows the connection diagram of the ring topology.
Advantages
• The probability of collision is low.
• The increase in the number of devices has a very low impact on network
performance.
Disadvantages
• It has a complex structure.
• A problem at one station affects the entire system.
star Topology
In a star topology, each node is connected to a central network device called a switch or
hub. Visual 1.6 shows the connection diagram of the star topology. In this topology, the
data signals sent from the devices first come to the central network device, where the
signal is amplified and transmitted to the target or targets.
Fiber optic or twisted pair cable can be used. Ethernet and Localtalk protocols are used.
Advantages
• Adding new devices is easy.
• It is easy to find errors.
• Different cable types can be used.
• If one device does not work, the others are not affected. Disadvantages
• It has a complex structure.
• A problem at one station affects the entire system.
Mesh Topology
It is useless. Visual 1.7 shows the connection diagram of the mesh topology. Advantages
• Even if one of the connections is broken, the data reaches its destination.
• The sent data reaches its destination as soon as possible.
Disadvantages
• It is difficult to install in narrow environments.
• It creates cable pollution.
• It has a complex connection.
• It is not preferred because too many cables are used.
• A rupture in the spine affects the entire system.
Cellular Topology
Visual 7.8 shows the connection diagram of the cellular topology. Cellular topology is a
circular or hexagonal topology structure with independent nodes at its center. This
topology, which has gained importance with the use of wireless technology, is used
especially in divided geographical areas. Since data is carried in the form of
electromagnetic waves, nodes (users) can be fixed or portable.
Network model
is a framework used to understand and describe how different components of a
computer network interact with each other. It defines the structure and functions of
the network.
1- OSI Model
Is a network model which is used to define how computer communicate with
each other’s.
2- TCP /IP Model
Is a network model which is used to define how computer communicate with
each other’s.
What are the differences between osi and TCP Models
OSI TCP
ISO DOD
7 Layer 4 Layer
Less Secure Secure
application layer
The Application Layer is the top layer in both the OSI and TCP/IP models. It's where
network communication begins and ends, directly interacting with the user or
application. It's the part of the network that allows software programs to
communicate over the internet.
Presentation Layer
The Presentation Layer is the layer in the OSI model that formats and translates the
data so that the application layer can understand it. It acts as a translator between
different formats of data used by applications.
It handles things like:
Transport Layer
The transport layer is responsible for managing the delivery of data between
devices over a network. It ensures that data is transferred accurately and reliably by
breaking it into smaller pieces (called segments or packets) and making sure they
arrive at the correct destination. It also handles error detection,
Network Layer
The Network Layer is responsible for data routing, forwarding, and addressing. It
determines the best path for data to reach its destination on a network . and the
source and destination ip address
Is assigning in this layer
Data Link Layer
The data link layer is responsible for transferring data between devices on the same
network. It ensures that data is sent without errors. The source and destination mac
address is assigning in this layer.
Physical Layer
The physical layer is responsible for transmitting raw data as electrical signals or
light over cables, wires, or wireless connections. It deals with the hardware like
cables, switches, and radio waves that allow data to travel.
TCP/IP Model
Is a network model which is used to define how computer communicate with
each other’s.
Application Layer
help software programs on your computer communicate over a
network
Compression
Encryption
Translating the extension
Starting , Managing , and Ending the session
Transport Layer
is responsible delivering of data between devices over a network ,
checking error
Internet Layer
Assign Source and Destination Ip Add
Network Access layer
Assign Source and Destination Mac Add
Converting the data to electrical signals
What is protocol
Protocol is a set of rules and words is used for communications between computers
Protocols
Structured Communicati
o
Reliable delivery
Unreliable (no acknowledgments,
Reliability (acknowledgments,
no retransmission)
retransmissions)
Flow
Yes (via windowing) No
Control
Data
Yes (delivers in order) No (data may arrive out of order)
Ordering
Use Cases File transfers, web browsing, email Streaming, VoIP, online gaming
Network Layer Protocols
IPV4
IPv6
IPX
Data Link Layer Protocols
Ethernet
Wi-Fi
PPP
Frame Relay
HDLC
Physical Layer Protocols
Cables
Fiber
Wi-Fi
What is port number
A port number is like a house number on the internet. It helps computers find the
right service or program when they send information to each other. Just like how a
house number tells the mailman where to deliver a letter, a port number tells the
computer where to send data to a specific program or service.
Example:
When you visit a website, your computer uses a port number (usually 80 for
regular websites) to know where to send your request.
Port numbers are important because they help different programs use the
internet at the same time without getting mixed up.
Well-Known Ports (0 to 1023)
These are used by common services and applications. For example:
Port 80: Used for web browsing (HTTP).
Port 443: Used for secure web browsing (HTTPS).
Port 25: Used for sending emails (SMTP).
Registered Ports (1024 to 49151)
These are used by software applications that are not as common but are still widely
used. For example:
Port 3306: Used by MySQL databases.
Port 8080: Often used for web servers (alternative to port 80).
Dynamic or Private Ports (49152 to 65535)
These are used for temporary or private connections between programs and are
often chosen randomly by the system when connecting to the internet. These ports
are not assigned to any specific service.
What is DNS
DNS stands for Domain Name System. It works like a phonebook for the internet,
helping your computer find websites. When you type a website name (like
www.example.com) in your browser, the DNS translates that name into a number
called an IP address that computers can understand.
What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It's a system that
automatically gives devices (like computers, phones, or printers) an IP address
when they connect to a network (like Wi-Fi or the internet).
How Does DHCP Work?
1. When you connect a device to a network, the device asks for an IP address.
2. The DHCP server (usually found in a router) gives the device a unique IP
address to use on the network.
3. The device can now communicate with other devices or websites using that
IP address.
Why is DHCP Important?
Saves time: You don’t have to manually set up an IP address for each
device.
Avoids mistakes: It ensures each device gets a different IP address,
preventing conflicts where two devices try to use the same address.
Makes things easy: Devices can automatically join the network without
needing to be configured every time.
Network Devices
Network devices or network hardware are physical devices required for
communication and
interaction between computers A network structure is formed by connecting such
devices to each other
End Device
An end device is any device that is used by a person to access or use a network. It
is the final point in a network where data is sent or received.
Examples of end devices:
Computers
Smartphones
Tablets
Printers
Network Devices List
Repeater
Repeaters are network devices with two ports. It operates at the physical (first)
layer of the OSI
model and its main purposes are to renewing and refresh the signal.
Hub
A hub is a simple network device that connects multiple devices in a local area
network .It allows the devices to communicate with each other by sending data to
all connected devices at once.
Slower Speeds: Hubs send data to all devices, even if only one needs it, which can
slow down the network.
Limited Security: Since data is broadcast to all devices, it can be intercepted by
any device on the network.
Lack of Intelligence: Hubs don’t know which device needs the data, leading to
inefficiency.
Higher Collisions: With multiple devices sending data at the same time, collisions
are more likely, reducing network performance.
Poor Scalability: As the network grows, hubs become less efficient and harder to
manage.
What is switch
A switch is a network device that connects multiple devices in a local area network.
Intelligent device because it knows MAC address
Speed is fast and secure, it do unicast and multicast also broadcast.
Unicast = send to one
Multicast = send to many
Broadcast = send to all
Switch has many types of ports like.
Ethernet = 10 Mbps
Fast Ethernet = 100 Mbps
Gigabit = 1000 Mbps
Fiber
Router
A router is a network device that connects different networks, such as your home
network to the internet. It directs data between devices on your local network (like
computers and smartphones) and external networks (like websites or online
services).
Evaluation Questions
Networking Basics
1. What does "IP" stand for?
o A) Internet Protocol
o B) Internal Program
o C) Information Process
o D) Interface Provider
o Answer: A) Internet Protocol
2. What is the main purpose of a router?
o A) Connect devices within a LAN
o B) Route data between networks
o C) Boost Wi-Fi signals
o D) Convert analog signals to digital
o Answer: B) Route data between networks
3. What device is used to connect multiple devices in a network and operates at
the Data Link Layer?
o A) Router
o B) Switch
o C) Modem
o D) Repeater
o Answer: B) Switch
4. Which protocol is used to assign IP addresses dynamically?
o A) DNS
o B) DHCP
o C) FTP
o D) SMTP
o Answer: B) DHCP
5. What does "LAN" stand for?
o A) Local Area Network
o B) Large Access Node
o C) Logical Array Network
o D) Linked Access Net
o Answer: A) Local Area Network
6. What is the default subnet mask for a Class C network?
o A) 255.0.0.0
o B) 255.255.0.0
o C) 255.255.255.0
o D) 255.255.255.255
o Answer: C) 255.255.255.0
7. Which protocol is used for sending email?
o A) SMTP
o B) FTP
o C) HTTP
o D) SNMP
o Answer: A) SMTP
8. What is the maximum number of bits in an IPv4 address?
o A) 16
o B) 32
o C) 64
o D) 128
o Answer: B) 32
9. Which network topology has all devices connected to a single central device?
o A) Bus
o B) Star
o C) Ring
o D) Mesh
o Answer: B) Star
10.Which protocol translates domain names into IP addresses?
A) DHCP
B) DNS
C) HTTP
D) ARP
Answer: B) DNS
OSI Model
11.How many layers are in the OSI model?
A) 5
B) 6
C) 7
D) 8
Answer: C) 7
12.What is the topmost layer of the OSI model?
A) Transport
B) Network
C) Data Link
D) Application
Answer: D) Application
13.Which OSI layer is responsible for routing packets?
A) Transport
B) Network
C) Data Link
D) Application
Answer: B) Network
14.Which layer is responsible for error detection and correction?
A) Data Link
B) Network
C) Transport
D) Session
Answer: A) Data Link
15.The Physical layer of the OSI model deals with:
A) Data transmission media
B) Logical addressing
C) Error detection
D) Encryption
Answer: A) Data transmission media
16.Which OSI layer ensures reliable message delivery?
A) Network
B) Transport
C) Session
D) Physical
Answer: B) Transport
17.Which OSI layer is responsible for encryption and decryption?
A) Network
B) Presentation
C) Transport
D) Application
Answer: B) Presentation
18.TCP operates at which OSI layer?
A) Data Link
B) Network
C) Transport
D) Application
Answer: C) Transport
19.The MAC address is found at which OSI layer?
A) Transport
B) Network
C) Data Link
D) Application
Answer: C) Data Link
20.Which OSI layer is responsible for establishing, managing, and terminating
communication sessions?
A) Transport
B) Session
C) Presentation
D) Application
Answer: B) Session