0% found this document useful (0 votes)
30 views26 pages

Network Model

Network systems enable communication and resource sharing between computers, either wired or wirelessly. Various types of networks exist, including PAN, LAN, MAN, CAN, and WAN, each serving different geographical and organizational needs. The document also discusses network topologies, models like OSI and TCP/IP, protocols, and essential network devices, highlighting their functions and characteristics.

Uploaded by

ibrahimytahir547
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views26 pages

Network Model

Network systems enable communication and resource sharing between computers, either wired or wirelessly. Various types of networks exist, including PAN, LAN, MAN, CAN, and WAN, each serving different geographical and organizational needs. The document also discusses network topologies, models like OSI and TCP/IP, protocols, and essential network devices, highlighting their functions and characteristics.

Uploaded by

ibrahimytahir547
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Network Systems

Network systems are the name given to a system in which at least two computers
communicate
wired or wirelessly and share hardware and software resources.

Benefits of Network
1- sharing of software's
2-sharing of hardware’s
3- sharing of data
4- sharing resources
5- To Save Time
6- To save Money

Network
Types

Wire Wireless
Network Network

Geographica Organization
l Structure al Structures

Client /
PAN LAN CAN MAN WAN server
peer to peer

Personal Area Network


A personal area network [PAN] is the network that a person uses within his living space.
Network is configured for a single person in a small office, building or apartment.
This area is usually a circle. The network covers an area of approximately 10 meters
radius.

Local Area Network


Local area network [LAN] developed in the 1960s is a network with very small
geographical
dimensions covering local areas such as offices, schools and buildings. Usually the mesh
size is up
to 2 km.
This type of network can establish connections between computers, printers, servers and
other
network devices. It is generally created for file sharing and common use of devices such
as printers.

Metropolitan area Network


in this type of network computers are generally connected to in a city or campus. These
networks can be thought of as a larger local area network consisting of several local
networks coming together. The connections between urban area networks and local area
networks are called backbones. High-capacity fiber optic cable connections are preferred
in backbone connections. This type of networks typically covers network distances
between 5 and 50 km.
Campus area Network
is a network infrastructure that connects multiple local area networks (LANs) within a
limited geographical area, such as a university, corporate campus, or military base. It is
larger than a LAN but smaller than a Metropolitan Area Network (MAN).

Wide Area Network


Wide area network [WAN] refers to network connections with very large distances and
sizes,
covering the entire country or the whole world in terms of geographical size.
Wide area networks can connect to any network, from metropolitan area networks to local
area
networks. In these networks, satellite communication or high-capacity fiber optic
connections are
preferred.

Virtual Private Network


Virtual private network [VPN] is a security technology that allows creating a secure
communication connection between two different networks. With these networks, users
are
provided with secure and remote access to their corporate resources over public networks
such as
the Internet

Organizational Structure
The organizational structure specifies the duties and authorities (roles) of the devices that
make
up the network in data transmission. Networks are divided into two based on their
organizational
structure: client/server and peer-to-peer.

Server
server is a central location that shares its resources with network or A server computer is
a powerful computer that stores, processes, and shares data or services with other
computers

Client
client is a computer, device or software that uses resources on the server or network A
client computer is a computer that connects to a server to access data, applications, or
services over a network. It sends requests to the server and receives responses.
Peer to Peer
In a peer-to-peer network, computers are connected to each other to share information or
data. All workstations have equal authority. Any computer can be made by a client or
server if desired. This network organization is suitable for use at home, at small
businesses or store.
Bus Topology
Visual 1.4 shows the connection diagram of the road topology. In this topology, all clients
are connected on a single cable line. This single cable may be called a segment,
backbone, or trunk.
When data communication occurs between two nodes, the data packet goes to all nodes.

Advantages
• Devices connect to the network easily.
• Network design is easy.
• If one device does not work, the others are not affected.

Disadvantages
• It is difficult to detect the problem.
• A problem on the main line affects all devices.
• Devices added later may affect the performance of other devices on the line

Ring Topology
In this topology, nodes are connected end-to-end around a circle.

If any cable or node fails, the connection is broken. In ring topology, messages travel in
the same direction throughout the circle (Clockwise or counterclockwise is effective).
FDDI, SONET or token ring protocols are used. Fiber optic or twisted pair cable can be used
in ring topology. However, twisted pair cable is most preferred.
Visual 1.5 shows the connection diagram of the ring topology.

Advantages
• The probability of collision is low.
• The increase in the number of devices has a very low impact on network
performance.

Disadvantages
• It has a complex structure.
• A problem at one station affects the entire system.
star Topology
In a star topology, each node is connected to a central network device called a switch or
hub. Visual 1.6 shows the connection diagram of the star topology. In this topology, the
data signals sent from the devices first come to the central network device, where the
signal is amplified and transmitted to the target or targets.
Fiber optic or twisted pair cable can be used. Ethernet and Localtalk protocols are used.

Advantages
• Adding new devices is easy.
• It is easy to find errors.
• Different cable types can be used.
• If one device does not work, the others are not affected. Disadvantages
• It has a complex structure.
• A problem at one station affects the entire system.

Mesh Topology
It is useless. Visual 1.7 shows the connection diagram of the mesh topology. Advantages
• Even if one of the connections is broken, the data reaches its destination.
• The sent data reaches its destination as soon as possible.

Disadvantages
• It is difficult to install in narrow environments.
• It creates cable pollution.
• It has a complex connection.
• It is not preferred because too many cables are used.
• A rupture in the spine affects the entire system.

Cellular Topology
Visual 7.8 shows the connection diagram of the cellular topology. Cellular topology is a
circular or hexagonal topology structure with independent nodes at its center. This
topology, which has gained importance with the use of wireless technology, is used
especially in divided geographical areas. Since data is carried in the form of
electromagnetic waves, nodes (users) can be fixed or portable.
Network model
is a framework used to understand and describe how different components of a
computer network interact with each other. It defines the structure and functions of
the network.
1- OSI Model
Is a network model which is used to define how computer communicate with
each other’s.
2- TCP /IP Model
Is a network model which is used to define how computer communicate with
each other’s.
What are the differences between osi and TCP Models

OSI TCP
ISO DOD
7 Layer 4 Layer
Less Secure Secure

OSI Model Layers


1- Physical Layer
2- Data Link layer
3- Network Layer
4- Transport Layer
5- Session layer
6- Presentation layer
7- application layer

application layer
The Application Layer is the top layer in both the OSI and TCP/IP models. It's where
network communication begins and ends, directly interacting with the user or
application. It's the part of the network that allows software programs to
communicate over the internet.
Presentation Layer
The Presentation Layer is the layer in the OSI model that formats and translates the
data so that the application layer can understand it. It acts as a translator between
different formats of data used by applications.
It handles things like:

1-Data encryption (to keep information secure).


2-Data compression (to make the data smaller and faster to send).
3-Data format translation ( Extension)
Session Layer
The Session Layer is the layer in the OSI model that manages communication
sessions between two devices or applications.
it’s like a conversation manager for computers. It ensures that the data exchange
between two devices happens in an organized way, It handles
1- Starting conversation.
2-Maintaining the connection during communication
3 -ending a

Transport Layer
The transport layer is responsible for managing the delivery of data between
devices over a network. It ensures that data is transferred accurately and reliably by
breaking it into smaller pieces (called segments or packets) and making sure they
arrive at the correct destination. It also handles error detection,

Network Layer
The Network Layer is responsible for data routing, forwarding, and addressing. It
determines the best path for data to reach its destination on a network . and the
source and destination ip address
Is assigning in this layer
Data Link Layer
The data link layer is responsible for transferring data between devices on the same
network. It ensures that data is sent without errors. The source and destination mac
address is assigning in this layer.
Physical Layer
The physical layer is responsible for transmitting raw data as electrical signals or
light over cables, wires, or wireless connections. It deals with the hardware like
cables, switches, and radio waves that allow data to travel.
TCP/IP Model
Is a network model which is used to define how computer communicate with
each other’s.
Application Layer
 help software programs on your computer communicate over a
network
 Compression
 Encryption
 Translating the extension
 Starting , Managing , and Ending the session
Transport Layer
 is responsible delivering of data between devices over a network ,
checking error

Internet Layer
 Assign Source and Destination Ip Add
Network Access layer
 Assign Source and Destination Mac Add
 Converting the data to electrical signals
What is protocol
Protocol is a set of rules and words is used for communications between computers

Protocols

Structured Communicati
o

properietry- Connection - Connection


Standard - P
P Less Oreinted

Application Layer Protocols


 HTTPS
 DNS
 DHCP
 SMTP
 TFTP

Presentation Layer Protocols


 X.690
 TLS
 MIME

session Layer Protocols


 RPC (Remote Procedure Call):
 NetBIOS (Network Basic Input/Output System)
 SMB (Server Message Block)
 PPTP

Transport Layer Protocols


 TCP (transmutation Control Protocol)
 UDP (User Datagram Protocols)
Comparison of TCP and UDP:

Feature TCP UDP

Connection Connection-oriented Connectionless

Reliable delivery
Unreliable (no acknowledgments,
Reliability (acknowledgments,
no retransmission)
retransmissions)

Error Yes (checksum only, no


Yes (checksum, retransmission)
Checking retransmission)

Flow
Yes (via windowing) No
Control

Data
Yes (delivers in order) No (data may arrive out of order)
Ordering

Speed Slower (due to overhead) Faster (less overhead)

Use Cases File transfers, web browsing, email Streaming, VoIP, online gaming
Network Layer Protocols
 IPV4
 IPv6
 IPX
Data Link Layer Protocols
 Ethernet
 Wi-Fi
 PPP
 Frame Relay
 HDLC
Physical Layer Protocols
 Cables
 Fiber
 Wi-Fi
What is port number
A port number is like a house number on the internet. It helps computers find the
right service or program when they send information to each other. Just like how a
house number tells the mailman where to deliver a letter, a port number tells the
computer where to send data to a specific program or service.
Example:
 When you visit a website, your computer uses a port number (usually 80 for
regular websites) to know where to send your request.
 Port numbers are important because they help different programs use the
internet at the same time without getting mixed up.
Well-Known Ports (0 to 1023)
These are used by common services and applications. For example:
 Port 80: Used for web browsing (HTTP).
 Port 443: Used for secure web browsing (HTTPS).
 Port 25: Used for sending emails (SMTP).
Registered Ports (1024 to 49151)
These are used by software applications that are not as common but are still widely
used. For example:
 Port 3306: Used by MySQL databases.
 Port 8080: Often used for web servers (alternative to port 80).
Dynamic or Private Ports (49152 to 65535)
These are used for temporary or private connections between programs and are
often chosen randomly by the system when connecting to the internet. These ports
are not assigned to any specific service.
What is DNS
DNS stands for Domain Name System. It works like a phonebook for the internet,
helping your computer find websites. When you type a website name (like
www.example.com) in your browser, the DNS translates that name into a number
called an IP address that computers can understand.

What is DHCP?
DHCP stands for Dynamic Host Configuration Protocol. It's a system that
automatically gives devices (like computers, phones, or printers) an IP address
when they connect to a network (like Wi-Fi or the internet).
How Does DHCP Work?
1. When you connect a device to a network, the device asks for an IP address.
2. The DHCP server (usually found in a router) gives the device a unique IP
address to use on the network.
3. The device can now communicate with other devices or websites using that
IP address.
Why is DHCP Important?
 Saves time: You don’t have to manually set up an IP address for each
device.
 Avoids mistakes: It ensures each device gets a different IP address,
preventing conflicts where two devices try to use the same address.
 Makes things easy: Devices can automatically join the network without
needing to be configured every time.
Network Devices
Network devices or network hardware are physical devices required for
communication and
interaction between computers A network structure is formed by connecting such
devices to each other

End Device
An end device is any device that is used by a person to access or use a network. It
is the final point in a network where data is sent or received.
Examples of end devices:
 Computers
 Smartphones
 Tablets
 Printers
Network Devices List

Hub Physical Layer (Layer 1)


Repeater Physical Layer (Layer 1)
Switch Data Link Layer (Layer 2)
Bridge Data Link Layer (Layer 2)
Router Network Layer (Layer 3)
Gateway Application Layer (Layer 7)
Firewall Network Layer (Layer 3) or higher
Access Point (AP) Data Link Layer (Layer 2)
Modem Physical Layer (Layer 1) or Data Link Layer
(Layer 2)
Network Interface Card (NIC) Data Link Layer (Layer 2)

Network Interface Card


Hardware that allows computers and other devices to connect to a network is called
network interface card .

1. Wired NIC (Ethernet NIC)


 Purpose: Used for wired connections (Ethernet) to a local area network
(LAN).
 Connection Type: Typically uses an RJ45 cable.
 Speed: Common speeds are 10/100/1000 Mbps (Fast Ethernet or Gigabit
Ethernet)
2. Wireless NIC (Wi-Fi NIC)
 Purpose: Used to connect a device to a Wi-Fi network wirelessly.
 Connection Type: Uses radio signals to communicate with a wireless router
or access point.
 Speed: Varies based on Wi-Fi standards like 802.11a/b/g/n/ac/ax (Wi-Fi 6).

What is MAC Address


A MAC address (Media Access Control address) is a unique identifier assigned to the
network interface card of a device. It's used to identify devices on a local network,
like Ethernet or Wi-Fi.
The MAC address is a 12-character hexadecimal number, usually written in this
format: XX:XX:XX:XX:XX:XX, where each "X" represents a number or letter (0-9, A-
F).and its 48 bits
When devices communicate on a local network , the MAC address ensures that data
is sent to the correct device

Repeater
Repeaters are network devices with two ports. It operates at the physical (first)
layer of the OSI
model and its main purposes are to renewing and refresh the signal.
Hub
A hub is a simple network device that connects multiple devices in a local area
network .It allows the devices to communicate with each other by sending data to
all connected devices at once.

Slower Speeds: Hubs send data to all devices, even if only one needs it, which can
slow down the network.
Limited Security: Since data is broadcast to all devices, it can be intercepted by
any device on the network.
Lack of Intelligence: Hubs don’t know which device needs the data, leading to
inefficiency.
Higher Collisions: With multiple devices sending data at the same time, collisions
are more likely, reducing network performance.
Poor Scalability: As the network grows, hubs become less efficient and harder to
manage.

What is switch
A switch is a network device that connects multiple devices in a local area network.
 Intelligent device because it knows MAC address
 Speed is fast and secure, it do unicast and multicast also broadcast.
 Unicast = send to one
 Multicast = send to many
 Broadcast = send to all
 Switch has many types of ports like.
 Ethernet = 10 Mbps
 Fast Ethernet = 100 Mbps
 Gigabit = 1000 Mbps
 Fiber
Router
A router is a network device that connects different networks, such as your home
network to the internet. It directs data between devices on your local network (like
computers and smartphones) and external networks (like websites or online
services).
Evaluation Questions

Networking Basics
1. What does "IP" stand for?
o A) Internet Protocol
o B) Internal Program
o C) Information Process
o D) Interface Provider
o Answer: A) Internet Protocol
2. What is the main purpose of a router?
o A) Connect devices within a LAN
o B) Route data between networks
o C) Boost Wi-Fi signals
o D) Convert analog signals to digital
o Answer: B) Route data between networks
3. What device is used to connect multiple devices in a network and operates at
the Data Link Layer?
o A) Router
o B) Switch
o C) Modem
o D) Repeater
o Answer: B) Switch
4. Which protocol is used to assign IP addresses dynamically?
o A) DNS
o B) DHCP
o C) FTP
o D) SMTP
o Answer: B) DHCP
5. What does "LAN" stand for?
o A) Local Area Network
o B) Large Access Node
o C) Logical Array Network
o D) Linked Access Net
o Answer: A) Local Area Network
6. What is the default subnet mask for a Class C network?
o A) 255.0.0.0
o B) 255.255.0.0
o C) 255.255.255.0
o D) 255.255.255.255
o Answer: C) 255.255.255.0
7. Which protocol is used for sending email?
o A) SMTP
o B) FTP
o C) HTTP
o D) SNMP
o Answer: A) SMTP
8. What is the maximum number of bits in an IPv4 address?
o A) 16
o B) 32
o C) 64
o D) 128
o Answer: B) 32
9. Which network topology has all devices connected to a single central device?
o A) Bus
o B) Star
o C) Ring
o D) Mesh
o Answer: B) Star
10.Which protocol translates domain names into IP addresses?
 A) DHCP
 B) DNS
 C) HTTP
 D) ARP
 Answer: B) DNS

OSI Model
11.How many layers are in the OSI model?
 A) 5
 B) 6
 C) 7
 D) 8
 Answer: C) 7
12.What is the topmost layer of the OSI model?
 A) Transport
 B) Network
 C) Data Link
 D) Application
 Answer: D) Application
13.Which OSI layer is responsible for routing packets?
 A) Transport
 B) Network
 C) Data Link
 D) Application
 Answer: B) Network
14.Which layer is responsible for error detection and correction?
 A) Data Link
 B) Network
 C) Transport
 D) Session
 Answer: A) Data Link
15.The Physical layer of the OSI model deals with:
 A) Data transmission media
 B) Logical addressing
 C) Error detection
 D) Encryption
 Answer: A) Data transmission media
16.Which OSI layer ensures reliable message delivery?
 A) Network
 B) Transport
 C) Session
 D) Physical
 Answer: B) Transport
17.Which OSI layer is responsible for encryption and decryption?
 A) Network
 B) Presentation
 C) Transport
 D) Application
 Answer: B) Presentation
18.TCP operates at which OSI layer?
 A) Data Link
 B) Network
 C) Transport
 D) Application
 Answer: C) Transport
19.The MAC address is found at which OSI layer?
 A) Transport
 B) Network
 C) Data Link
 D) Application
 Answer: C) Data Link
20.Which OSI layer is responsible for establishing, managing, and terminating
communication sessions?
 A) Transport
 B) Session
 C) Presentation
 D) Application
 Answer: B) Session

More Networking & OSI Model Questions


21.UDP is a ____________ protocol.
 A) Connection-oriented
 B) Connectionless
 C) Secure
 D) Reliable
 Answer: B) Connectionless
22.What is the main function of ARP?
 A) Convert IP addresses to MAC addresses
 B) Resolve domain names
 C) Establish network connections
 D) Encrypt data
 Answer: A) Convert IP addresses to MAC addresses
23.Which OSI layer is responsible for compression?
 A) Presentation
 B) Network
 C) Session
 D) Transport
 Answer: A) Presentation
24.Which type of cable is used in Ethernet networks?
 A) Coaxial
 B) Fiber-optic
 C) Twisted pair
 D) All of the above
 Answer: D) All of the above
25.What is an IP address?
 A) A physical address
 B) A logical address
 C) A MAC address
 D) A security key
 Answer: B) A logical address
26.What is a characteristic of TCP?
 A) Fast but unreliable
 B) Slow but reliable
 C) Connectionless
 D) Used for real-time applications
 Answer: B) Slow but reliable
27.Which device operates at the Data Link layer?
 A) Router
 B) Switch
 C) Hub
 D) Firewall
 Answer: B) Switch
28.Which protocol is used for remote login?
 A) FTP
 B) Telnet
 C) SMTP
 D) DHCP
 Answer: B) Telnet
29.What does the Transport layer use to ensure reliable delivery?
 A) IP addresses
 B) Error correction
 C) Port numbers
 D) Encapsulation
 Answer: B) Error correction
30.What is the default gateway?
 A) The main DNS server
 B) The router connecting to another network
 C) A firewall
 D) A switch
 Answer: B) The router connecting to another network
31.Which protocol is used to transfer web pages over the Internet?
o A) FTP
o B) HTTP
o C) SMTP
o D) DHCP
o Answer: B) HTTP
32.Which protocol is responsible for securely transferring web pages?
o A) FTP
o B) HTTP
o C) HTTPS
o D) Telnet
o Answer: C) HTTPS
33.Which protocol is used to send emails?
o A) IMAP
o B) SMTP
o C) POP3
o D) DNS
o Answer: B) SMTP
34.Which protocol is used to resolve domain names into IP addresses?
o A) FTP
o B) DHCP
o C) DNS
o D) SNMP
o Answer: C) DNS
35.Which protocol allows file transfer over a network?
o A) FTP
o B) IMAP
o C) POP3
o D) DHCP
o Answer: A) FTP
36.Which protocol is used for remote login and command execution?
o A) HTTP
o B) SSH
o C) FTP
o D) SMTP
o Answer: B) SSH
37.Which protocol dynamically assigns IP addresses to devices?
o A) DHCP
o B) DNS
o C) HTTP
o D) ARP
o Answer: A) DHCP
38.Which protocol is connectionless and used for fast data
transmission?
o A) TCP
o B) UDP
o C) FTP
o D) ICMP
o Answer: B) UDP
39.Which protocol is used to monitor and manage network devices?
o A) SNMP
o B) SMTP
o C) ICMP
o D) ARP
o Answer: A) SNMP
40.Which protocol is used to check network connectivity between
devices?
 A) HTTP
 B) SMTP
 C) ICMP
 D) FTP
 Answer: C) ICMP
41.Which port number is used by HTTP?
o A) 21
o B) 53
o C) 80
o D) 443
o Answer: C) 80
42.Which port number is used by HTTPS for secure web browsing?
o A) 110
o B) 443
o C) 21
o D) 25
o Answer: B) 443
43.Which port is used by FTP for file transfer?
o A) 20 and 21
o B) 22
o C) 23
o D) 53
o Answer: A) 20 and 21
44.Which port is assigned to SSH (Secure Shell)?
o A) 21
o B) 22
o C) 23
o D) 25
o Answer: B) 22
45.Which port number is used by DNS (Domain Name System)?
o A) 80
o B) 53
o C) 443
o D) 25
o Answer: B) 53
46.Which protocol uses port 25 for sending emails?
o A) IMAP
o B) SMTP
o C) POP3
o D) SNMP
o Answer: B) SMTP
47.Which port is used by Telnet for remote access?
o A) 22
o B) 23
o C) 25
o D) 53
o Answer: B) 23
48.Which port is used by IMAP for retrieving emails?
o A) 110
o B) 143
o C) 25
o D) 443
o Answer: B) 143
49.Which port number does POP3 use for email retrieval?
o A) 110
o B) 143
o C) 25
o D) 80
o Answer: A) 110
50.Which port is used by RDP (Remote Desktop Protocol)?
 A) 23
 B) 3389
 C) 8080
 D) 1521
 Answer: B) 3389

You might also like