0% found this document useful (0 votes)
11 views10 pages

? Networking 1

The document provides a comprehensive overview of networking, including definitions, purposes, types of networks, topologies, transmission media, devices, models, protocols, and security basics. It emphasizes the importance of networking in facilitating communication and resource sharing in various real-world applications. Additionally, it discusses future trends such as 5G technology and the Internet of Things.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views10 pages

? Networking 1

The document provides a comprehensive overview of networking, including definitions, purposes, types of networks, topologies, transmission media, devices, models, protocols, and security basics. It emphasizes the importance of networking in facilitating communication and resource sharing in various real-world applications. Additionally, it discusses future trends such as 5G technology and the Internet of Things.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

📘 NETWORKING 1 – Complete and Expanded Explanation

with Real-Life Examples

🔹 I. Definition of Networking
Networking is the process of linking two or more computing devices together for the purpose of
sharing information and resources. It includes the design, implementation, and management of
computer systems that communicate over wired or wireless channels.

📌 Simple Example: When two computers are connected to share a file, a network is formed.

🔹 II. Key Purposes of Networking


1. Communication – Email, messaging, video conferencing
2. Resource Sharing – Printers, files, applications, internet
3. Data Management – Centralized storage and backup
4. Remote Access – Working from different locations
5. Scalability – Easily adding more devices to the system

🔹 III. Types of Computer Networks


Type Description Example

Limited to a small area like a home,


LAN (Local Area Network) School computer lab
school, or building

WAN (Wide Area


Covers large geographic areas The Internet
Network)

MAN (Metropolitan Area


Covers a city or large campus University campus network
Network)

PAN (Personal Area Very small network for personal Bluetooth connection between phone
Network) devices and wireless headset

WLAN (Wireless LAN) LAN but wireless Wi-Fi in a coffee shop

CAN (Campus Area Interconnects LANs within a campus Hospital or school network
Type Description Example

Network) infrastructure

🔹 IV. Network Topologies (Structure of Network Layout)


1. Bus Topology

 Single cable connects all devices.


 Advantage: Easy to set up.
 Disadvantage: One failure affects entire network.

Example: Early computer labs

2. Star Topology

 Devices connected to a central switch/hub.


 Advantage: Easy to troubleshoot.
 Disadvantage: Hub failure affects all.

Example: Modern offices and homes

3. Ring Topology

 Devices connected in a circle.


 Advantage: Data travels in one direction.
 Disadvantage: A single failure can disrupt entire network.

Example: Some university campus layouts

4. Mesh Topology

 Every device is connected to every other device.


 Advantage: Very reliable.
 Disadvantage: Expensive and complex.

Example: Military or critical communication networks

🔹 V. Types of Transmission Media


A. Wired Media
1. Twisted Pair Cable – Common in LAN
2. Coaxial Cable – Used in cable TV networks
3. Fiber Optic Cable – Fast and long-distance

B. Wireless Media

1. Radio Waves – Wi-Fi, FM radio


2. Microwaves – Satellite communication
3. Infrared – TV remotes, short-range data

🔹 VI. Network Devices and Their Functions


Device Function Example

Router Connects different networks Used in home internet setups

Switch Connects devices in a LAN Office network hub

Hub Basic switch without smart routing Simple data sharing

Modem Converts signals for internet Globe/PLDT modem

Access Point (AP) Extends Wi-Fi range Installed in halls or cafes

Firewall Blocks unwanted access Security software or hardware

🔹 VII. Network Models


1. OSI Model (Open Systems Interconnection) – 7 Layers:

Layer Description

7 – Application User interfaces (web browsers)

6 – Presentation Data formatting, encryption

5 – Session Communication between systems

4 – Transport Reliable data transfer (TCP)

3 – Network IP addressing, routing

2 – Data Link MAC addressing, error detection

1 – Physical Cables, switches, wireless


Layer Description

📌 Example: When you browse the internet, all 7 layers work together!

🔷 TCP/IP Model – 4 Layers with Meaning and Examples


The TCP/IP Model (Transmission Control Protocol/Internet Protocol) is a simplified
networking framework used to understand and design internet-based communication. It consists
of 4 layers, each with specific functions.

1. Application Layer

✅ Meaning:

This layer provides interface and services for user applications to communicate over the
network. It is where protocols like HTTP, FTP, SMTP, etc., operate.

📌 Functions:

 Sending and receiving data from software (like browsers or email clients)
 Ensures proper formatting and delivery to users

🌐 Examples:

 Web Browsing: Uses HTTP/HTTPS to access websites


→ e.g., Visiting www.google.com using a browser
 Email Communication: Uses SMTP (send), POP3/IMAP (receive)
→ e.g., Sending an email through Gmail
 File Transfer: Uses FTP or SFTP
→ e.g., Uploading a file to a website

2. Transport Layer

✅ Meaning:

This layer is responsible for end-to-end communication, data delivery, and error handling
between two devices. It uses protocols like TCP and UDP.

📌 Functions:
 Divides large data into smaller packets
 Ensures packets are sent in the correct order
 Manages errors and retransmissions

🌐 Examples:

 TCP (Transmission Control Protocol): Reliable communication (e.g., loading a


webpage, downloading a file)
→ e.g., Watching YouTube with consistent video loading
 UDP (User Datagram Protocol): Faster, no error-checking (e.g., live streaming, online
gaming)
→ e.g., Playing a multiplayer game or Zoom call

3. Internet Layer

✅ Meaning:

This layer is responsible for routing and delivering packets across networks using IP
addresses. It chooses the best path for data to travel.

📌 Functions:

 Assigns source and destination IP addresses


 Breaks packets into IP datagrams
 Routes data between networks

🌐 Examples:

 IP (Internet Protocol): Assigns addresses like 192.168.1.1


→ e.g., Your device is assigned an IP when connecting to Wi-Fi
 ICMP (Internet Control Message Protocol): Used by ping/traceroute tools
→ e.g., Checking if a website is reachable with ping google.com

4. Network Access Layer (also called Link or Physical Layer)

✅ Meaning:

This layer handles the physical connection to the network and data transfer over cables or
wireless signals. It defines how bits are sent and received through network devices.

📌 Functions:
 Converts data into electrical, light, or radio signals
 Manages hardware addressing (MAC addresses)
 Handles error detection at the physical level

🌐 Examples:

 Ethernet: Wired LAN connection using RJ45 cable


→ e.g., Connecting your PC to a router via cable
 Wi-Fi: Wireless network connection
→ e.g., Using your phone to connect to the internet
 MAC Addressing: Unique address of a device’s network card
→ e.g., 00:1A:2B:3C:4D:5E used for communication within LAN

✅ Summary Table:

Layer Meaning Example


User interface & communication Web browsing, email, file
Application
services sharing
Reliable delivery of data between TCP for web, UDP for
Transport
devices games
Assigning & locating
Internet Routing data using IP addresses
devices
Network Wi-Fi, Ethernet, MAC
Physical transmission of data
Access address

🔹 VIII. Network Protocols


Protocol Purpose Example

TCP/IP Standard for communication Internet

HTTP/HTTPS Web browsing Opening YouTube

FTP/SFTP File transfer Uploading a file to a server

SMTP/POP3/IMAP Email sending/receiving Gmail or Outlook


Protocol Purpose Example

DNS Domain to IP address google.com → IP

DHCP Assigns IP addresses automatically New device joining Wi-Fi

🔹 IX. IP Addressing & Subnetting


 IPv4: 192.168.1.1 (32-bit)
 IPv6: 2001:0db8:85a3::8a2e:0370:7334 (128-bit)
 Subnetting: Divides networks into smaller parts for better management.

📌 Example: A school's LAN may use IPs from 192.168.0.0 to 192.168.0.255.

🔹 X. Network Security Basics – Meaning and Examples


Network security involves protecting data, devices, and systems from unauthorized access,
attacks, and data loss while using a network (especially the internet). Below are the core tools
and techniques used to keep networks secure:

🔐 1. Antivirus and Firewall

✅ Meaning:

 Antivirus is software that detects, prevents, and removes malicious software (malware)
such as viruses, worms, and trojans.
 Firewall is a system (hardware or software) that monitors and controls incoming and
outgoing network traffic based on security rules.

🌐 Example:

 Antivirus: Windows Defender or Avast blocks a trojan file downloaded from a


suspicious website.
 Firewall: A school firewall blocks access to certain websites like social media during
school hours.
🔐 2. Encryption (SSL/TLS)

✅ Meaning:

Encryption is the process of converting data into a code to prevent unauthorized access. SSL
(Secure Sockets Layer) and TLS (Transport Layer Security) are encryption protocols used to
secure data during transmission over networks.

🌐 Example:

 Websites that use HTTPS instead of HTTP (like https://facebook.com) use SSL/TLS
encryption to protect data such as login credentials from being stolen.

🔐 3. Strong Passwords and Authentication

✅ Meaning:

 A strong password uses a mix of uppercase, lowercase, numbers, and symbols to make
it harder to guess.
 Authentication verifies a user's identity. It can involve multiple steps (called multi-
factor authentication, or MFA), such as a password and a code sent to your phone.

🌐 Example:

 Password: J@ne2025! is stronger than jane123.


 MFA: When logging in to Gmail, you're asked for your password and then a code sent to
your phone.

🔐 4. Access Control Lists (ACLs)

✅ Meaning:

ACLs are rules set by network administrators that define who can access what resources on a
network, and what operations (read, write, delete) they are allowed to perform.

🌐 Example:

 In a school's network:
o Students can only access shared folders.
o Teachers have access to grading systems and administrative tools.
o Guests are restricted from accessing internal files.
🔐 5. Virtual Private Network (VPN)

✅ Meaning:

A VPN is a secure connection over the internet that hides your IP address and encrypts your
data, making your online activities private—even on public Wi-Fi.

🌐 Example:

 A student connects to a VPN at a coffee shop so they can safely access their school’s
private network.
 Remote employees use VPNs to securely connect to their company’s internal systems.

✅ Summary Table:

Security Tool Meaning Example


Blocks malware and controls Avast blocking a virus; firewall
Antivirus & Firewall
traffic blocks YouTube
Converts data into HTTPS protects passwords during
Encryption (SSL/TLS)
unreadable code login
Strong Passwords & Prevents unauthorized
Using MyP@ss123! + phone code
Authentication access
Limits user access based on
Access Control Lists (ACLs) Students can't access teacher's files
rules
VPN (Virtual Private Secures your connection and
Safe internet use in public areas
Network) hides IP

🔹 XI. Common Network Issues and Troubleshooting


Problem Possible Cause Solution

No Internet Router/modem offline Restart router

IP Conflict Two devices same IP Release and renew IP

Slow Network Too many users Upgrade bandwidth

Wi-Fi Drops Weak signal Move closer or use extender


🔹 XII. Real-World Applications of Networking
 Banks use secure networks for ATMs and transactions.
 Schools use networks for e-learning platforms.
 Hospitals share medical records over secure networks.
 Airports rely on networking for flight operations.
 Government offices maintain centralized databases using networks.

🔹 XIII. Future Trends in Networking


1. 5G Technology – Faster wireless communication
2. IoT (Internet of Things) – Smart homes and smart cities
3. Cloud Networking – Online services like Google Drive
4. SDN (Software-Defined Networking) – Programmable networks
5. Cybersecurity Focus – Increased need for secure systems

✅ Summary
Networking 1 introduces students to the core concepts of how devices communicate and
share resources. From small home networks to the massive global internet, networking is the
foundation of modern technology. Understanding devices, topologies, protocols, IP addressing,
and security is essential in today’s digital world.

You might also like