Lecture 0 Introduction
Lecture 0 Introduction
Department of Information Technology Hardware and Network Servicing level III Network
Problems Module code:
The main function of a switch in a network is to efficiently forward data packets between
devices within the same local area network (LAN). Unlike a hub (which broadcasts data to all
devices), a switch intelligently directs traffic only to the intended recipient, improving
performance and security.
Operates at (OSI
Device Function Traffic Handling
Layer)
Broadcasts data to
Hub Layer 1 (Physical) Dumb, inefficient
all ports
Forwards data based
Switch Layer 2 (Data Link) Smart, efficient
on MAC addresses
Routes data between
Router Layer 3 (Network) Uses IP addresses
different networks
1. Function
Modem (Modulator-Demodulator)
o Converts analog signals (from cable/DSL/fiber) into digital data (Ethernet) and
vice versa.
o Example: A cable modem translates signals from your ISP into a format your
router can use.
Router
o Manages traffic between your local network (LAN) and the internet (WAN).
o Assigns local IPs, enables Wi-Fi, and provides security (firewall, NAT).
2. Connection Setup
Modem → Connects directly to the ISP (via coaxial, DSL, or fiber).
Router → Connects to the modem and distributes internet to multiple devices (PCs,
phones, smart devices).
Gateway (Modem + Router Combo) (e.g., Xfinity Gateway) → Combines both in one
device (but may have limitations).
You need a router if you want to share internet with multiple devices (Wi-Fi/Ethernet).
Real-World Example
Many ISPs provide modem-router combo devices, but using separate units often gives better
performance and flexibility.
3. What is the role of a firewall in network security?
The Role of a Firewall in Network Security
A firewall acts as a security barrier between trusted and untrusted networks (e.g.,
between a corporate LAN and the internet), controlling incoming and outgoing traffic
based on predefined rules. Its primary purpose is to block malicious traffic while
allowing legitimate communication.
1. Traffic Filtering
Examines data packets and blocks or allows them based on:
o IP addresses (blacklist/whitelist)
Example: A home router’s firewall allows multiple devices to share one public IP.
5. VPN Support
Some firewalls include VPN (Virtual Private Network) capabilities for secure remote
access.
Types of Firewalls
Examples:
o LAN ↔ Internet (WAN) (e.g., your home router acts as a gateway).
2. Protocol Translation
Converts data from one protocol to another so different systems can interact.
Example:
o A VoIP gateway converts analog phone signals to digital (SIP) for internet calls.
o A cloud gateway lets IoT devices (using Zigbee/MQTT) communicate with cloud
servers (HTTP/HTTPS).
Example:
o A corporate gateway filters malicious traffic before it enters the internal
network.
Example:
o Your home router (gateway) assigns private IPs (e.g., 192.168.1.x) but uses one
public IP for all internet traffic.
Example:
o An API gateway routes requests between microservices in a cloud environment.
Example:
o A mainframe gateway lets a legacy banking system interact with modern web
apps.
Hub: All devices share one collision domain (data collisions slow the network).
Switch: Each port has its own collision domain, eliminating collisions.
o Example: In a busy café Wi-Fi, switches prevent slowdowns caused by multiple
devices talking at once.
4. Improved Security
5. Better Scalability
Modern switches power down unused ports, saving energy (unlike always-on hubs).
6. What is NAT (Network Address Translation), and which device typically handles it?
What is NAT (Network Address Translation)?
NAT (Network Address Translation) is a networking technique that maps private IP
addresses (used within a local network) to a public IP address (used on the internet).
This allows multiple devices in a private network (e.g., home or office) to share a single
public IP when accessing the internet.
o Example: Your home router assigns private IPs (like 192.168.1.10) but uses
just one public IP from your ISP.
2. Enhances Security
o Hides internal devices behind the router’s public IP, making them harder to target
directly.
Types of NAT
Limitations of NAT
❌ Breaks End-to-End Connectivity (can complicate peer-to-peer apps like VoIP or gaming).
❌ Performance Overhead (large-scale NAT can slow traffic).
Example Scenario
Without NAT: If every device in your home needed a unique public IP, ISPs would run
out of IPv4 addresses quickly.
With NAT: Your router assigns 192.168.1.x internally but uses just one public IP for all
outbound internet traffic.
Single Source of Truth: Stores all critical files (documents, media, databases) in one
place, eliminating scattered data.
Cross-Platform Access: Employees (Windows, Mac, Linux) and devices (PCs,
smartphones) can access files seamlessly.
Example: Marketing teams collaborate on shared project folders without emailing large
files.
3. Cost-Effective Scalability
Cheaper Than Cloud for Large Data: No recurring subscription fees; expand storage
by adding drives.
Pay-as-You-Grow: Start with a small NAS and upgrade as needed (unlike expensive
enterprise SANs).
Failover Support: Some NAS systems offer dual power supplies/network ports for
uptime.
Remote Replication: Syncs data to an offsite NAS or cloud for disaster recovery.
5. Performance Optimization
Faster Than Cloud: Local network access avoids internet latency (ideal for large
video/design files).
SSD Caching: Accelerates frequently accessed data (e.g., databases).
treamlined Workflows
Integrates with Apps: Supports virtualization (VM storage), email servers, and media
servers (Plex).
Automation: Syncs with tools like Dropbox or scripts for repetitive tasks.
Versioning: Keeps file histories for regulatory compliance (e.g., HIPAA, GDPR).
Activity Logs: Tracks who accessed/modified files for audits.
Drive Bays: More bays = more storage/RAID options (e.g., 2-bay for homes, 8-bay for
enterprises).
CPU/RAM: Needed for heavy workloads (e.g., video transcoding).
Software: Look for intuitive OS (Synology DSM, QNAP QTS) and app support.
Dynamic Configuration: SDN controllers (e.g., OpenDaylight, Cisco ACI) manage all
devices from a single dashboard, eliminating manual CLI/device-by-device setups.
Example: Instantly apply security policies across hundreds of switches via software.
Reduces Human Errors: Automates VLAN provisioning, QoS policies, and firewall
rules.
Self-Healing Networks: Detects failures (e.g., broken links) and reroutes traffic
automatically.
Real-Time Load Balancing: SDN optimizes paths based on congestion, latency, or cost
(e.g., prioritizing VoIP traffic).
Example: A data center SDN directs video streaming traffic to the least congested server.
9. What are the different types of network topologies, and how do devices interact
within them?
Network topology defines how devices (nodes) are interconnected and communicate.
Each type has unique advantages, limitations, and interaction patterns.
1. Bus Topology
Broadcast-based: A signal sent by one device travels to all others but is accepted only
by the intended recipient.
Pros:
✔ Simple, low-cost setup.
✔ Easy to add new devices.
Cons:
2. Star Topology
Pros:
✔ Easy to troubleshoot (fault isolation).
✔ Scalable—adding devices doesn’t disrupt others.
Cons:
❌ Dependent on the central device (if the switch fails, the network goes down).
Layout: Devices form a closed loop; data travels in one direction (unidirectional) or both
(bidirectional).
Device Interaction:
Pros:
✔ Predictable performance (no collisions).
✔ Equal access for all devices.
Cons:
4. Mesh Topology
Pros:
Cons:
❌ Expensive (cabling and maintenance).
Pros:
✔ Scalable for large organizations.
✔ Isolates network segments.
Cons:
❌ Dependent on root device (failure disrupts entire branches).
6. Hybrid Topology
Example: A star-bus hybrid might connect departmental star networks via a backbone
bus.
Pros:
✔ Flexible and fault-tolerant.
✔ Optimized for specific needs.
Cons:
❌ Complex design and maintenance.
Comparison Table
Key Takeaways
🚀 Pro Tip: For most businesses, a star topology with switches provides the best balance of
cost, performance, and reliability.
Network topology can be viewed from two perspectives: physical (how devices
are physically connected) and logical (how data logically flows). Here’s a breakdown of
their differences:
1. Physical Topology
Examples
Key Characteristics
2. Logical Topology
Definition: The virtual pathway data takes between devices, regardless of physical
connections.
Focuses on:
Examples
Ethernet (Logical Bus): Data broadcasts to all devices but only the intended recipient
processes it.
Token Ring (Logical Ring): Devices pass a "token" to transmit data, even if physically
wired in a star.
VLANs (Virtual LANs): Devices in different physical locations behave as if they’re on
the same LAN.
Key Characteristics
Comparison Table
Real-World Analogy
Example:
A company may have a physical star topology (all PCs wired to a switch) but
use logical VLANs to separate departments (Finance, HR) for security.
Key Takeaway
🚀 Pro Tip: When designing a network, align the logical topology (e.g., VLANs, SDN) with
the physical layout (cable management, switch placement) for optimal performance!
Both IP addresses and MAC addresses are used to identify devices on a network, but
they serve different purposes and operate at different layers of the OSI model.
Format:
o IPv4: 192.168.1.1 (32-bit, decimal)
Assigned By:
o Dynamically (via DHCP) or statically (manually configured).
Changeable?
o Yes (changes based on network, e.g., home vs. office Wi-Fi).
Used For:
o Routing traffic across networks (internet communication).
Example:
When you visit google.com, your device uses Google’s IP address (142.250.190.46) to
reach it.
2. MAC Address (Media Access Control Address)
Purpose: Identifies a device physically on a local network.
Format:
o 48-bit hexadecimal (e.g., 00:1A:2B:3C:4D:5E).
Assigned By:
o Hard-coded into the device’s NIC (Network Interface Card) by the manufacturer.
hangeable?
o Technically yes (MAC spoofing), but usually permanent.
Used For:
o Direct communication within the same local network (e.g., between your laptop
and router).
o Helps switches forward data to the correct device.
Example:
Your router uses your laptop’s MAC address to send Wi-Fi data directly to it.
Comparison Table
Feature IP Address MAC Address
Logical network Physical device
Purpose
identification identification
OSI Layer Layer 3 (Network) Layer 2 (Data Link)
Manufacturer (burned into
Assigned By DHCP or manual config
NIC)
No (permanent, unless
Changeable? Yes (dynamic or static)
spoofed)
48-bit hex
Format IPv4 (192.168.1.1) or IPv6
(00:1A:2B:3C:4D:5E)
Global (internet) or Local
Scope Local network only
(LAN)
Ethernet/Wi-Fi
Example Use Connecting to a website
communication
Key Takeaway
IP Address = "Your mailing address" (can change, used for global routing).
MAC Address = "Your Social Security Number" (unique to your device, used
locally).
🚀 Pro Tip:
Use ipconfig /all (Windows) or ifconfig (Linux/macOS) to see both IP and MAC
addresses.
MAC filtering in Wi-Fi networks restricts access based on hardware IDs.