Network Fundamentals
Network Fundamentals
Suite
*Introduction:*
The OSI (Open Systems Interconnection) model and the TCP/IP protocol suite
are two fundamental frameworks used in networking to understand how data
travels across a network. Both models describe the layers through which
data passes from one system to another, but they differ in structure and
implementation.
---
- *Devices:* Routers.
---
[2/19, 6:57 PM] Chatgpt: The *TCP/IP protocol suite* (also known as the
Internet Protocol Suite) is a set of communication protocols used for inter-
network communication. It was developed by the Department of Defense to
standardize communications over the internet. The TCP/IP model is more
practical and widely adopted than the OSI model.
- *Protocols:*
- *Protocols:*
- *Protocols:*
[2/19, 6:57 PM] Chatgpt: - *SMTP (Simple Mail Transfer Protocol)* for email.
- *Key Aspects:* User interfaces, file transfers, email, web browsing, secure
communication.
---
|---------------------------|-----------------------------------------|-------------------------------------
-------|
---
*Conclusion*
Both the *OSI Model* and the *TCP/IP Model* serve as essential frameworks
for understanding the communication process in networks. The OSI model is
a theoretical model that helps understand networking concepts at a high
level, while the TCP/IP model is a more practical and simplified approach
used in real-world networking and internet communications.
- The *OSI Model* has seven layers, and it is widely used for educational and
theoretical purposes.
- The *TCP/IP Model* has four layers and is the foundation of the internet,
defining how data is transmitted over networks.
[2/19, 7:04 PM] Chatgpt: Detailed Notes on Network Protocols (HTTP, FTP,
SSH, DNS)
*Introduction:*
Network protocols are the set of rules and conventions that allow devices to
communicate with each other over a network. These protocols are essential
for ensuring that data is transferred reliably, securely, and efficiently across
the internet and other networks. The four commonly used network protocols
are *HTTP*, *FTP*, *SSH*, and *DNS*. Each of these protocols has a specific
function and application in network communication.
---
*Overview:*
- *HTTP* is the protocol used for transferring hypertext (web pages) and
other resources over the World Wide Web (WWW).
- When a user requests a webpage (e.g., by typing a URL into a browser), the
browser sends an HTTP request to the web server.
- The server responds with the requested resource (such as a web page),
using HTTP.
*Key Features:*
- *Methods:* Common HTTP methods include GET (to retrieve data), POST (to
send data), PUT (to update data), DELETE (to remove data).
*Ports:*
- *HTTPS* (secure HTTP) uses *port 443* for encrypted communication via
SSL/TLS.
- Web browsing
- API communication
---
*Overview:*
[2/19, 7:04 PM] Chatgpt: - *Active and Passive Modes:* FTP can work in
active or passive mode to address firewall or NAT (Network Address
Translation) issues.
*Ports:*
- The data channel uses a dynamic port (e.g., port 20 for active mode, and
random high ports in passive mode).
---
*Overview:*
[2/19, 7:04 PM] Chatgpt: - After a secure connection is established, users can
execute commands, transfer files (using SCP or SFTP), and manage remote
systems.
*Key Features:*
- *Secure File Transfer:* SSH supports secure file transfer protocols such as
SCP (Secure Copy) and SFTP (Secure File Transfer Protocol).
*Ports:*
*Overview:*
- DNS operates at the *Application Layer* and is one of the core components
of the internet's functionality.
- When a user types a domain name in their browser, the browser sends a
DNS query to a DNS server to resolve the domain name into an IP address.
- The DNS server responds with the corresponding IP address, allowing the
browser to establish a connection to the desired website or service.
*Key Features:*
- *Caching:* DNS results are cached to reduce lookup times and network
traffic.
- *Zones and Records:* DNS uses zones to manage domain names and
records (e.g., A, MX, CNAME) to specify mappings between names and
addresses.
*Ports:*
- DNS typically uses *port 53* for both UDP and TCP communication.
*Common Use Cases:*
---
---
*Conclusion*
[2/19, 7:05 PM] Chatgpt: Each of the four network protocols (HTTP, FTP, SSH,
and DNS) serves a unique and essential function in network communication.
HTTP is widely used for web browsing and transferring resources over the
internet. FTP is used for file transfers between systems, while SSH provides
secure remote access and file management. DNS, on the other hand, is
fundamental for converting human-readable domain names into machine-
readable IP addresses, enabling users to access websites and services.
Understanding how these protocols work, their features, and their typical use
cases is essential for IT professionals, network engineers, and anyone
working with internet-based communication systems.
*Introduction:*
---
*1. IP Addressing*
*Overview:*
*IPv4 Addressing:*
- IPv4 addresses are 32-bit numbers, divided into four octets (8 bits each),
typically written in *dotted decimal* format (e.g., 192.168.1.1).
- The *32 bits* allow for approximately *4.3 billion unique addresses*.
- An IPv4 address is divided into two parts: *Network* part (identifies the
network) and *Host* part (identifies the device on the network).
- *IPv4 Classes:*
*IPv6 Addressing:*
- IPv6 addresses are designed to replace IPv4 and provide an almost infinite
number of unique addresses (approximately 340 undecillion addresses).
---
*2. Subnetting*
*Overview:*
*Subnet Mask:*
[2/19, 7:06 PM] Chatgpt: - The subnet mask consists of a series of *1s* (for
the network part) followed by *0s* (for the host part).
- *255.0.0.0* (Class A)
- *255.255.0.0* (Class B)
- *255.255.255.0* (Class C)
*Subnetting Process:*
- When subnetting, you "borrow" bits from the host portion of the address to
create additional network portions.
3. *Calculate the new subnet mask*: Add the borrowed bits to the original
subnet mask.
4. *Determine the subnet range*: Divide the IP address space into subnets
based on the new subnet mask.
5. *Assign subnet addresses*: Use the new subnets to assign network and
host addresses.
*Subnetting Example:*
[2/19, 7:06 PM] Chatgpt: - If you need *4 subnets*, you would borrow 2 bits
from the host portion, creating a subnet mask of *255.255.255.192* (/26).
---
*Overview:*
CIDR is a method for allocating IP addresses and routing network traffic that
was introduced to improve the scalability of IP address allocation and
routing.
- *CIDR Notation:* CIDR replaces the traditional class-based addressing
system (Class A, B, C) and uses a format like *192.168.1.0/24* where the
number after the slash represents the number of bits used for the network
portion of the address.
- CIDR allows for more flexible allocation of IP addresses than the rigid class
system, enabling network administrators to assign subnets of varying sizes.
---
- *Network Address:* The first address in a subnet that identifies the subnet
itself (e.g., 192.168.1.0 in a subnet 192.168.1.0/24).
---
*5. Calculating Subnet Masks and IP Address Ranges*
[2/19, 7:06 PM] Chatgpt: - *Broadcast Address:* Find the last address in each
subnet that represents the broadcast address.
---
*Conclusion*
IP addressing and subnetting are essential for creating robust, scalable, and
secure networks. They enable better utilization of limited IP address space
and ensure that devices can communicate effectively within the network.
*Introduction:*
Network segmentation and Virtual Local Area Networks (VLANs) are essential
concepts in networking that improve performance, security, and
management in modern networks. Network segmentation divides a larger
network into smaller, more manageable sub-networks, while VLANs allow
network administrators to group devices logically rather than physically. Both
practices are used to optimize network resources and enhance security.
---
*Overview:*
1. *Improved Performance:*
2. *Enhanced Security:*
- In large networks, broadcast traffic (e.g., ARP requests) can cause delays.
By segmenting the network, broadcast traffic is limited to the relevant
segment, reducing unnecessary network load.
1. *Physical Segmentation:*
2. *Logical Segmentation:*
---
*Benefits of VLANs:*
1. *Improved Security:*
[2/19, 7:07 PM] Chatgpt: - VLANs help reduce broadcast traffic by limiting
broadcasts to devices within the same VLAN. This reduces congestion and
increases efficiency.
4. *Cost Efficiency:*
- VLANs allow organizations to group devices together without the need for
additional physical hardware or wiring. This reduces hardware costs.
*Types of VLANs:*
- This is the most common type of VLAN used to assign network access
ports to devices like computers, printers, etc.
2. *Voice VLAN:*
- Voice VLANs are used to prioritize voice traffic, ensuring high-quality VoIP
(Voice over IP) communication by reducing latency and jitter.
3. *Management VLAN:*
4. *Native VLAN:*
- In a trunked link between switches, the VLAN tag helps the switch
determine which VLAN to send the data to.
- Routers or Layer 3 switches are used to route traffic between VLANs since
devices in different VLANs cannot communicate directly without routing.
*VLAN Tagging:*
VLAN tagging adds an additional header (known as the *802.1Q tag*) to the
Ethernet frame. The tag includes the VLAN ID, which helps the switch identify
the VLAN of the frame. This tag is important in multi-switch configurations,
where traffic from multiple VLANs is sent over a single link.
---
*Scenario:*
You have a company with three departments: Sales, HR, and IT. You want to
create separate VLANs for each department to ensure security and
manageability.
*Configuration:*
- Each switch port is assigned to one of the VLANs (Sales, HR, or IT), based
on the department of the device connected to that port.
---
*4. VLAN vs. Network Segmentation*
While *network segmentation* and *VLANs* are similar concepts, they differ
in how they operate and are implemented.
---
[2/19, 7:07 PM] Chatgpt: - *Trunk Link:* A network link that carries multiple
VLANs over a single physical connection. It is configured to pass traffic from
all VLANs.
*Conclusion*