SNA 7 Basic Module
SNA 7 Basic Module
• Five Whys: Asking "Why?" several times to get to the root cause.
• Fishbone Diagram: A visual tool to help identify possible causes of the
problem.
Internet:
• Internet:
• It’s a worldwide network that connects millions of different types of
networks, such as personal, business, and government ones.
• Uses:
• Communication: Sending emails, messaging, and video calls.
• Information Sharing: Websites, cloud storage, and online libraries.
• Commerce: Shopping online, banking, and making digital payments.
• Key Technologies:
• TCP/IP: A set of rules that controls how data is sent over the internet.
• Web Browsers: Programs used to access websites, like Chrome or Firefox.
De Facto vs. De Jure Standards
De Facto vs. De Jure Standards:
• De Facto Standards: These are standards that become widely used
and accepted by industries or people, even though they’re not
officially approved by a government or organization. They happen
naturally because they work well.
• Example: USB as a standard for connecting devices.
• De Jure Standards: These are standards that are officially recognized
and legally established by a government or formal organization.
• Example: The official standards for electrical outlets set by national
organizatio
TWAIN ( Technology Without An
Interesting Name)
TWAIN:
• It’s a standard that allows computers to get images from devices like scanners
and cameras. It helps different devices and software work together smoothly
when transferring pictures.OEM (Original Equipment Manufacturer):
• These are companies that make parts or products that are used in another
company's products. For example, a company that makes computer components
like hard drives or screens, which are then sold by another company in their
computers. Vendors:
• These are companies that sell technology products or services, like hardware
(computers, printers), software (programs, apps), or networking equipment
(routers, switches). They provide the tools and solutions that other businesses
or individuals need.
Character Encoding:
• Character Encoding:
• It’s a way of turning text into numbers so computers can store and work with it.
• Common Types:
• ASCII:
• A system that uses 128 codes to represent English letters, numbers, and symbols.
• It only supports basic English text and symbols.
• UTF-8:
• A more advanced system that can represent over a million characters, including
almost all languages and symbols.
• It also works with ASCII for the first 128 characters, making it compatible with
older systems
Abstraction:
• Abstraction:
• It’s the process of simplifying complex things by focusing on the important parts and hiding
the details.
• Uses in IT:
• Software Development: It helps make code simpler by grouping data or actions together, like
in object-oriented programming, so developers don’t have to deal with every detail.
• Hardware Abstraction Layer (HAL): This lets software talk to hardware without needing to
understand exactly how the hardware works.
• Benefits:
• It makes systems easier to design, understand, and manage because developers don’t have to
worry about every small detail.
• It improves modularity, meaning developers can focus on bigger tasks without being distracted
by technical details.
Procurement
Procurement:
• It’s the process of getting the IT equipment or services a company
needs, like computers, software, or other technology.
Importance:
• Procurement ensures that the company gets the right technology that
fits its needs and budget, helping the business run smoothly and
efficiently.
Upgrade:
• Upgrade:
• It’s the process of improving or updating hardware, software, or systems to
make them work better or include new features.
• Examples:
• Implications:
• Considerations:
• Hardware Compatibility: Making sure new hardware works with your current
system.
• Software Compatibility: Ensuring software can run on different operating systems
or work with other programs.
• Compatibility is important to ensure everything in a system functions smoothly
together.
Interoperability
• Interoperability:
• It’s the ability of different systems, devices, or software to work
together smoothly.
• For example, a smartphone app being able to share data with a
computer program or a printer working with various types of
computers. Interoperability ensures that different technologies can
communicate and function together without issues.
Computing Models
Introduction
• Today’s computing offers different ways to access and manage IT
resources. Some of the most common options are Desktop
Computing, Bring Your Own Device (BYOD), and Cloud Computing.
Each of these has its own features, advantages, and drawbacks.
Knowing the differences between them helps in choosing the best
option for personal or business needs.
Desktop Computing
• Desktop Computing
• Definition:
• Desktop computing refers to traditional, stationary computers, which usually include a
desktop, monitor, keyboard, and mouse, often used in fixed places like offices or
workstations.
• Key Characteristics:
• Local Storage: Data and programs are saved directly on the computer's hard drive.
• Limited Mobility: You can only use the system and access data from the place where the
desktop is located.
• High Processing Power: Desktops generally have strong processing abilities and can handle
heavy tasks better than mobile devices.
• Physical Control: Users or admins can physically manage the hardware, which makes
maintenance and fixes easier.
Desktop Computing....
Pros:(Advanteges)
• Performance: Desktops are powerful and great for demanding tasks like graphic design, data
analysis, or software development.
• Security: It’s easier to control who can access the desktop and its data because it stays in one place.
• Cost-Effective for Long-Term Use: Desktops last longer and can be cheaper over time for work that
requires a fixed location.
Cons:(Disadvantages)
• Lack of Portability: Desktops are not portable, so you can’t easily use them while traveling or
working remotely.
• Higher Energy Use: They tend to use more electricity than mobile or cloud-based options.
• Use Cases:
• Desktops are best for jobs that need strong performance and stability, like work for engineers,
designers, data scientists, or employees at fixed desks.
Bring Your Own Device (BYOD)
• Bring Your Own Device (BYOD)
• Definition:
• BYOD is a policy that allows or requires employees to use their personal devices, like laptops, tablets, and smartphones,
for work tasks.
• Key Characteristics:
• Employee-Owned Devices: Devices are owned by employees, but they may have company software or security settings.
• Enhanced Mobility: Employees can access work data and apps from anywhere, which supports flexibility and remote work.
• Device Diversity: Employees use different types of devices, operating systems, and hardware, which can make managing
them more complex.
• Pros:(Advantages)
• Increased Flexibility: Employees can work from anywhere, which can boost productivity and help with remote work.
• Cost Savings: The organization saves money since employees use their own devices instead of the company buying new
ones.
• Employee Satisfaction: Employees can use devices they are familiar with, making them happier and more productive.
Bring Your Own Device (BYOD)
• Cons:(Disadvantages)
• Security Risks: It's harder to enforce security on personal devices, which
could lead to data breaches or unauthorized access.
• Compatibility Issues: Managing many different devices and operating systems
can cause problems with apps and security.
• Data Privacy Concerns: Having both personal and work data on the same
device can create privacy or legal issues.
• Use Cases:
• BYOD is common in organizations that support remote work, flexible
schedules, or where employees need constant access to work data and
applications.
Cloud Computing
• Cloud Computing
• Definition:
• Cloud computing is a way to deliver computing services (like servers, storage,
software, etc.) over the internet, so users can access them remotely instead of using
local hardware.
• Key Characteristics:
• Remote Access: Users can access data and apps from anywhere with an internet
connection.
• Scalability: Cloud services can be easily adjusted to fit user needs, either by adding or
reducing resources.
• Resource Pooling: Multiple users share the same cloud resources, which are managed
by a cloud provider (e.g., AWS, Google Cloud, Microsoft Azure).
Cloud Computing
• Pros:
• Accessibility: Users can work from different devices and locations.
• Reduced IT Costs: No need to buy and maintain expensive hardware since the cloud provider manages it.
• Automatic Updates and Backups: The cloud provider takes care of updates, security patches, and backups,
so systems stay current.
• Cons:
• Dependence on Internet Connection: A reliable internet connection is needed to access cloud services,
which can affect performance.
• Potential Security and Privacy Concerns: Data on external servers could be at risk if not properly secured.
• Limited Control: Users depend on the cloud provider to manage the infrastructure, which may not allow
for as much customization as on-premises solutions.
• Use Cases:
• Cloud computing is great for organizations that need flexibility, scalability, and remote access. It works
well for businesses of all sizes, especially those with remote or distributed teams.
Emerging Technologies
Internet of Things (IoT):
• IoT is a network of physical devices that have sensors, software, and internet connectivity, allowing
them to collect and share data.Examples:
Smart Homes: Devices like smart thermostats, lights, and security cameras.
• Wearable Devices: Smartwatches or fitness trackers.
• Industrial IoT: Machines in factories that collect data to improve efficiency. Applications:
• Home Automation: Controlling your home devices remotely (e.g., adjusting temperature or lights).
• Healthcare Monitoring: Devices that track your health, like heart rate monitors or smart scales.
• Industrial Automation: Using sensors in factories to monitor equipment and improve
operations.Key Challenges:
• Security: Protecting IoT devices from hackers.
• Data Privacy: Ensuring sensitive personal data is kept safe.
• Interoperability: Making sure different devices from various brands can work together smoothly.
Emerging Technologies
Edge Computing:
• This is a system where data is processed closer to where it is generated (near the source)
instead of sending it to a distant data center. This reduces delays (latency) and saves bandwidth,
making devices work faster and more efficiently. Difference from Cloud Computing:
• Edge computing processes data directly on devices or near where the data is generated, while
cloud computing sends data to centralized data centers for processing.
• Benefits:
• Reduced Latency: Edge computing processes data faster because it's done locally, close to the
device.
• Efficient Bandwidth Usage: Since less data needs to be sent to the cloud, it saves bandwidth and
reduces internet traffic.
• Enhanced Privacy: Sensitive data can be processed locally, improving security and privacy by not
having to send it over the internet.
Trade-offs in IT based Systems
• IT systems often have to balance factors like performance, cost, scalability, and reliability. Here are some
common trade-offs:
• Performance vs. Cost
• High-performance parts (like fast processors or SSDs) are usually more expensive.
• Organizations may need to focus on critical systems while reducing costs for less important ones.
• Speed vs. Capacity
• Faster memory (like RAM) is more expensive and has less storage space.
• Larger, slower storage (like HDDs) is cheaper and good for keeping a lot of data.
• Scalability vs. Complexity
• Increasing IT resources (like adding more servers) can make the system more complex.
• Companies need to balance growth and scalability with how easy it is to manage the system.
• Security vs. Usability
• Strong security measures (like two-factor authentication) can make the system harder to use.
• Finding the right balance between keeping things secure and easy for users is important.
Hardware and System Components:
SNA-Basics-Module- 2
System Interaction Diagram:
A system interaction diagram shows how users interact with a computer or device, illustrating
how information flows between the user, hardware, software, and the operating system.
Components:
• User: The person using the device, interacting through input tools like a keyboard or mouse.
• Operating System (OS): Software that manages the computer's hardware and other software,
making sure everything works together.
• Application Software: The programs or apps that the user uses (like word processors, web
browsers, etc.).
• Hardware: The physical parts of the computer or device, such as the CPU, memory, and
storage (like hard drives).
• This diagram helps visualize how different parts of the system work together to perform tasks.
Firmware & ROM-BIOS
Firmware:
Firmware is software that is permanently stored in a device’s memory (like ROM) and
controls the device's hardware at a basic level.
Examples:
• BIOS: A type of firmware that helps start up a computer by checking hardware and
loading the operating system.
• Embedded Device Firmware: Found in devices like routers and printers, controlling
their specific functions.
ROM-BIOS (Basic Input/Output System):
• BIOS is a special type of firmware stored on a chip on the computer’s motherboard. It
runs when the computer starts, making sure the hardware is working and then loads
the operating system.
Boot Process:
Boot Process:
The boot process is the series of steps a computer follows when it is turned on,
leading up to the operating system (OS) starting.
• Steps:
• Power-On Self-Test (POST): The computer checks its hardware to make sure
everything is working properly.
• BIOS/UEFI Execution: The BIOS or UEFI (special software on the motherboard)
runs, checking and setting up the essential components like memory and storage.
• Loading the OS: The BIOS or UEFI loads the operating system into the computer's
memory (RAM), allowing the computer to start up and be ready to use.
Boot Process
POST (Power-On Self-Test):
POST is a test that the computer runs when it is turned on to check if
the hardware is working properly.
• Functions:
• It checks key components like the CPU, memory, storage, and any
connected devices (like keyboard or mouse).
• If any hardware isn't working, POST will show an error code to help
identify the problem.
Operating System (OS) and Its
Categories
Operating System (OS) and Its Categories:
An operating system (OS) is software that helps manage a computer's hardware and allows
other programs to run on it.
• Categories:
• Single-User OS: This type of OS is designed for just one user at a time. It's usually found on
personal computers (e.g., MS-DOS).
• Multi-User OS: This OS allows many users to use the system at the same time, commonly
found in business or server environments (e.g., Linux, UNIX).
• Users (Single-User vs. Multi-User OS):
• Single-User OS: Made for one person to use at a time, typically on personal devices like
laptops or desktops.
• Multi-User OS: Lets several people use the system at the same time, often used in larger
organizations where many people need access to the same resources.
Interface (CLI & GUI):
Interface (CLI & GUI):
An interface is the way users interact with a computer system. There are
two main types of interfaces:
• CLI (Command-Line Interface): This interface uses text commands typed
by the user. It’s more technical and requires the user to know specific
commands (e.g., MS-DOS, UNIX Shell). It’s faster for experienced users
but can be harder for beginners.
• GUI (Graphical User Interface): This interface uses graphics, such as
icons, windows, and buttons, making it more user-friendly and easy to
navigate. You interact by clicking or tapping on visuals (e.g., Windows,
macOS). It’s more intuitive for most users.
Hardware: Key Components
Hardware: Key Components
a) Form Factor: This refers to the physical size, shape, and layout of parts inside
a computer, like the motherboard and the computer case (e.g., ATX, microATX).
b) System Unit: The main box of the computer that holds important parts like
the motherboard, CPU, memory, and storage devices.
c) Motherboard: The main board inside the computer that connects all the
important components, like the CPU and memory, and allows them to
communicate.
d) Ports & Connectors: These are the slots or plugs on the motherboard or
system unit where you connect external devices, like USB drives, monitors
(HDMI), or network cables (Ethernet).
IC (Integrated Circuit)
• IC (Integrated Circuit) & VLSIC (Very Large Scale Integrated Circuit)
Difference
• IC (Integrated Circuit): An IC is a small electronic circuit made up of a few
transistors. It’s used in basic electronic devices to perform simple tasks.
• VLSIC (Very Large Scale Integrated Circuit): A VLSIC is a more advanced
version of an IC, containing thousands or even millions of transistors.
This allows it to perform more complex functions, like processing data in
computers and smartphones.
• In short, VLSICs are much more powerful and capable than regular ICs,
handling tasks that require a lot of processing power.
Data Buses:
Data Buses:
Data buses are pathways that carry data between different parts of a computer.
• Types:
• Address Bus: This bus carries memory addresses between the CPU and the
memory, telling the system where to find or store data.
• Control Bus: It carries control signals that manage how data flows, ensuring
everything happens in the right order.
• Data Bus: This bus is responsible for transferring the actual data between the
CPU, memory, and other devices (like a hard drive or keyboard).
In simple terms, these buses allow different parts of the computer to communicate
with each other, each handling different types of information
CPU/System Clock:
• CPU/System Clock:
• The system clock controls the timing and coordination of all the parts inside a computer by sending out
regular electrical pulses.
• Clock Speed:
• Clock speed is measured in hertz (Hz), and it shows how many tasks the CPU can do in one second.
Modern CPUs are often measured in gigahertz (GHz), which means billions of tasks per second.
• Multicore CPU:
• A multicore CPU has multiple processing units (cores) on one chip, allowing the computer to handle more
tasks at once and work faster.
• Benefits:
• Increased Processing Power: More cores mean the CPU can handle more tasks simultaneously.
• Better Multitasking: It helps the computer run multiple applications smoothly at the same time.
• More Efficient Power Use: Multicore CPUs use less power while running modern programs compared to
older, single-core CPUs.
Multiprocessing:
Multiprocessing:
Multiprocessing is a system that uses two or more processors (CPUs) to work
on different tasks at the same time.
• Types:
• Legacy BIOS: An older version of BIOS with basic features and limited
capabilities.
• UEFI (Unified Extensible Firmware Interface): A newer and more advanced
version of BIOS with better features, improved security, and a graphical user
interface (GUI).
Cache and Its Levels:
• Cache and Its Levels:
• Cache is a small, fast memory that stores data the CPU frequently uses,
helping the computer run faster.
• Cache Levels:
• L1 Cache: The smallest and fastest cache, built directly into the CPU.
• L2 Cache: Larger and slower than L1, can be inside the CPU or separate from it.
• L3 Cache: The largest cache, shared between the CPU cores, further improving
speed when accessing data.
Primary & Secondary Storage
• Primary & Secondary Storage:
• Primary Storage (RAM): Temporary memory that the CPU uses to quickly
access and process data while the computer is on.
• Secondary Storage: Long-term storage where data is saved even when the
computer is turned off, like hard drives and SSDs. I/O (Input/Output) Devices:
• Input Devices: Devices that let the user enter data into the computer, like a
keyboard or mouse.
• Output Devices: Devices that display or print information from the computer,
like a monitor or printer.
• Secondary Storage Devices:
• Optical Storage: Uses lasers to read and write data (e.g., CD, DVD, Blu-ray).
• Magnetic Storage: Stores data on spinning magnetic disks (e.g., Hard Disk Drive - HDD).
• Electronic/Semiconductor Storage: Uses flash memory to store data (e.g., Solid State
Drive - SSD, USB drives).
• DRAM & SRAM Differences:
• DRAM (Dynamic RAM): Slower and needs to be refreshed regularly, used as the main
memory in computers.
• SRAM (Static RAM): Faster and doesn't need refreshing, used in cache memory to speed
up data access.
Volatile vs. Non-Volatile Memory
• Volatile vs. Non-Volatile Memory:
• Volatile Memory: Requires power to keep data.
• Example: RAM (Random Access Memory).
• Characteristics:
• Temporary storage for active tasks.
• Data is lost when power is turned off.
• Use: Fast access while running programs.
• Non-Volatile Memory: Retains data even without power.
• Examples: ROM, SSDs, Hard Drives.
• Characteristics:
• Permanent storage for files, OS, and apps.
• Slower than volatile memory.
• Use: Storing data for the long term.
Disk vs. Memory:
• Disk vs. Memory:
• Disk: A storage device for keeping data long-term.
• Examples: SSDs, HDDs.
• Characteristics:
• Slower data access.
• Larger storage capacity.
• Used for storing files, operating systems, and apps.
• Memory: A storage used for quick access to data during tasks.
• Examples: RAM, cache.
• Characteristics:
• Faster access speed.
• Smaller storage capacity.
• Used for running active tasks and programs.
Random Access vs. Sequential
Access:
Random Access vs. Sequential Access:
• Random Access: You can access data directly from any location, anytime.
• Examples: RAM, SSD.
• Sequential Access: Data is accessed in a set order, one after the other.
• Examples: Tape drives.
Virtual Memory: A system that allows your computer to use both RAM and disk storage as
if they were one big memory, so programs can run even when there isn't enough physical
RAM.
• How it works:
• The system splits programs into small parts (called pages) and moves them between
RAM and disk storage as needed.
• This helps with multitasking by making it feel like there is more memory available.
Defragmentation
Defragmentation: The process of rearranging data on a hard drive so that files are stored in one continuous
block, which helps speed up read and write operations.
• Benefits:
• Improves performance and reduces wear on the hard drive.
• Mostly important for HDDs; SSDs don’t need defragmentation.
• Compression: The process of making files or data smaller to save space and speed up transfers. Types:
• Lossless Compression: Reduces file size without losing any data (e.g., ZIP, PNG).
• Lossy Compression: Reduces file size by discarding some data, which can lower quality (e.g., JPEG, MP3).
• Memory Organization (from fastest and smallest to slowest and largest):
• Registers (fastest and smallest)
• Cache
• RAM
• Hard Drive/SSD (slowest and largest)
Disk vs. Memory
Disk vs. Memory: Differences in speed, volatility, and use case
Registers:
Speed: Fastest
Size: Smallest
Volatility: Volatile (loses data when power is off)
Use: Holds data that the CPU needs immediately for processing.
L1, L2, L3 Cache:
Speed: Fast
Size: Limited
Volatility: Volatile
Use: Stores frequently used data to speed up access.
• RAM (DRAM):
• Speed: Slower than cache, but fast
• Size: Larger than cache
• Volatility: Volatile
• Use: Main memory for running programs and active data.
• Secondary Storage (Hard Drives, SSDs):
• Speed: Slowest
• Size: Largest
• Volatility: Non-volatile (data is kept even when power is off)
• Use: Long-term storage for files, applications, and the operating system.
Networking Fundamentals: SNA-
Basics-Module- 4
• Introduction to Networking Types
• Networks are classified by their size, coverage area, and purpose. The
main types of networks are:
• LAN (Local Area Network):
• WAN (Wide Area Network):
• MAN (Metropolitan Area Network):
• These networks allow devices to communicate and share resources.
LAN.
• Local Area Network (LAN)
• Definition:
• A LAN connects computers and devices within a small area, such as a home, office, or campus.
• Characteristics:
• Geographical Scope: Covers a small area, like one building or a few buildings.
• Ownership: Managed by one organization or person.
• Data Transfer Speed: Very fast, up to 10 Gbps.
• Technology Used: Wired (Ethernet) or wireless (Wi-Fi).
• Advantages:
• High-speed data transfer for fast communication.
• Cost-effective for small areas.
• Easy to set up and manage.
LAN...
• Disadvantages:
• Limited range to small areas only.
• Security risks if not properly protected.
• Use Cases:
• Used in offices to share resources like printers and files.
• Used at home to connect devices like computers, TVs, and
smartphones.
WAN.
• Wide Area Network (WAN)
• Definition:
• A WAN is a network that covers a large area, connecting multiple smaller
networks (LANs) across cities, countries, or even continents.
• Characteristics:
• Geographical Scope: Covers large areas, such as nationwide or global regions.
• Ownership: Managed by telecom companies or internet service providers (ISPs).
• Data Transfer Speed: Slower than LANs, typically between 1 Mbps and 100 Gbps,
depending on the infrastructure.
• Technology Used: Leased lines, MPLS, satellite links, and fiber-optic cables.
WAN....
• Advantages:
• Global connectivity for widespread communication.
• Supports large-scale business operations.
• Centralized management of resources and data.
• Disadvantages:
• Expensive setup and maintenance costs.
• Slower speeds compared to LANs.
• Complex to set up and manage.
• Use Cases:
• Connecting branch offices of multinational companies.
• The internet itself is a vast WAN connecting millions of devices worldwide.
MAN.
• Metropolitan Area Network (MAN)
• Definition:
• A MAN is a network that covers a larger area than a Local Area Network (LAN) but
smaller than a Wide Area Network (WAN), typically within a city or metropolitan
region.
• Characteristics:
• Geographical Scope: Spans a city or metropolitan area.
• Ownership: Managed by a single organization or multiple entities, such as local
governments or internet service providers (ISPs).
• Data Transfer Speed: Faster than WANs but slower than LANs.
• Technology Used: Fiber-optic cables, wireless links, and Ethernet.
MAN....
• Advantages:
• Cost-effective for medium-sized areas.
• Efficient for connecting multiple LANs within a city.
• Supports public services like transportation, utilities, and municipal operations.
• Disadvantages:
• Limited to a specific region (usually a city).
• Higher cost compared to LANs but cheaper than WANs.
• Use Cases:
• Connecting government offices within a city.
• Supporting smart city infrastructure like traffic control systems.
• Providing cable TV and broadband services in a metropolitan area.
Key Differences:
• Key Differences:
• Geographical Size:
• LAN: Covers small areas like a home or office.
• MAN: Spans a city or metropolitan area.
• WAN: Connects networks across countries or even globally.
• Cost:
• LAN: Cheapest to set up.
• WAN: Most expensive due to the large-scale infrastructure needed.
• Speed:
• LAN: Fastest because it's within a small area.
• WAN: Slower because it covers long distances and has more complex routing.
• Purpose:
• LAN: Best for sharing resources like printers and files within a local area.
• MAN: Used for city-wide services like public transport and utilities.
• WAN: Essential for connecting remote regions and global networks.
Introduction to Network Types
Introduction to Network Types
• Modern organizations use different types of networks to enable
secure communication, collaboration, and data sharing. It's important
for network administrators to understand Intranet, Extranet, and VPN
to design and maintain secure network systems.
. Intranet
• . Intranet
• Definition: An Intranet is a private network that uses internet technology to help
employees within an organization communicate and share resources.
• Characteristics:
• Only accessible to employees or authorized users.
• Usually accessed through internal devices or a VPN for remote users.
• Secure from outside access with measures like passwords and access control.
• Functions:
• Internal communication (e.g., company news, announcements).
• Collaboration tools (e.g., file sharing, project management).
• Access to internal resources (e.g., HR systems, training).
Intranet......
• Advantages:
• Types:
• DSL Modem: Uses regular phone lines to send and receive data.
• Cable Modem: Uses coaxial cables (like cable TV wires) for faster internet
than DSL.
• Fiber Modem (ONT): Used with fiber-optic internet connections,
providing even faster speeds.
Network Interface Card (NIC):
• Network Interface Card (NIC): A NIC is a piece of hardware that allows a computer to
connect to a network.
• Types:
• Ethernet NIC: Connects to the network using a wired connection (Ethernet cable).
• Wireless NIC: Connects to the network wirelessly using Wi-Fi.
IANA (Internet Assigned Numbers Authority): IANA is an organization that helps manage
and coordinate IP addresses and domain names around the world.
• Functions:
• IP Address Allocation: Gives out blocks of IP addresses to regional organizations.
• Domain Name Management: Oversees the system of top-level domains (like .com, .org).
• Protocol Number Management: Manages numbers used by internet protocols and port
numbers.
IP Address
• An IP Address is a unique number given to devices on a network, so they can send and receive data. It's like an
address that helps devices communicate with each other, whether on the internet or a local network.
• Public IP Address
• It's an IP address that can be accessed over the internet.
• Given by Internet Service Providers (ISPs).
• Used for devices or servers to communicate with the internet.
• Example: 203.0.113.1
• Private IP Address
• It's an IP address used within a local network and can't be accessed from the internet.
• Assigned by network routers or administrators.
• Used for devices to talk to each other within the same network.
• Common private address ranges:
• 10.0.0.0 to 10.255.255.255
• 172.16.0.0 to 172.31.255.255
• 192.168.0.0 to 192.168.255.255
IPv4 vs IPv6
• IPv4 (Internet Protocol Version 4)
• Address Length: 32 bits (4 bytes).
• Format: Written in four sets of numbers, separated by dots (e.g., 192.168.1.1).
• Address Space: Can provide about 4.3 billion unique addresses.
• Limitations: The available addresses are running out due to the internet’s rapid growth.
• IPv6 (Internet Protocol Version 6)
• Address Length: 128 bits (16 bytes).
• Format: Written in eight groups of hexadecimal numbers, separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
• Address Space: Almost unlimited, able to support billions of devices.
• Features:
• Built-in security with IPsec.
• Better routing and easier network setup.
Static IP Address
• Static IP Address
• Definition: An IP address that is permanently assigned to a device and
doesn’t change.
• Advantages:
• Ideal for devices like servers or websites that need a consistent address.
• Easier to manage in small networks.
• Disadvantages:
• Needs to be set up manually.
• Can be more expensive for home users.
Dynamic IP Address
• Dynamic IP Address
• Definition: An IP address that is automatically assigned by a server
and can change over time.
• Advantages:
• Easy to set up and manage, especially in large networks.
• More affordable for most users.
• Disadvantages:
• Not ideal for hosting servers or services that need a stable, constant
address.
Practical Use Cases and Trade-offs
• Public vs. Private IP
• Public IP: Used for connecting directly to the internet, hosting websites, or
accessing remote devices.
• Private IP: Used within local networks for communication between devices,
offering more security by keeping devices isolated from the internet.
• IPv4 vs. IPv6
• IPv4: The older version, commonly used in existing networks, suitable for
smaller or older systems.
• IPv6: The newer version, needed for larger networks, the Internet of Things
(IoT), and systems with higher security needs.
• Static IP: Best for businesses that need a fixed address for things like servers or remote
access.
• Dynamic IP: Ideal for home users or networks that don't need a fixed address and can
change the IP automatically.
• Network Address Translation (NAT): A technique that lets many devices in a local
network share one public IP address to access the internet.
• Types:
• Static NAT: A private IP is always linked to one public IP.
• Dynamic NAT: A private IP is matched to an available public IP from a pool.
• Benefits:
• Security: Keeps internal IPs hidden from the public internet.
• Saves IP Addresses: Allows many devices to use a single public IP.
Introduction to Networking Models
• Networking models help explain how data moves across networks. The two
main models are:
• OSI Reference Model: A framework that divides network communication
into seven layers.
• TCP/IP Stack Model: A simpler, four-layer model used for most internet
communications.
• These models make sure different devices and systems can communicate
with each other properly.
• The OSI Model breaks down network communication into seven layers,
each handling a specific task. It helps explain how devices communicate
over a network in a clear and organized way.
7 Layers
Physical: This layer is responsible for sending raw data (like electrical
signals or radio waves) through physical mediums, such as cables or Wi-
Fi.
Data Link: This layer makes sure data is transmitted without errors
between devices (like computers or routers) on the same network,
using unique addresses (MAC addresses).
Network: This layer handles the logical addressing of data and
determines how it gets from one device to another across different
networks (using IP addresses).
7 Layers
• Transport: This layer ensures that data is transferred reliably between devices,
making sure it arrives in the correct order and without errors (using protocols
like TCP or UDP).
• Session: This layer manages and maintains ongoing connections or sessions
between devices, ensuring that data is properly exchanged during a
conversation.
• Presentation: This layer is responsible for converting data into a format that
the application can understand, and it also handles encryption and
compression if needed.
• Application: This layer interacts directly with software applications and
provides services such as browsing the web (HTTP), sending emails (SMTP), or
transferring files (FTP).
Key Features
• Encapsulation: As data travels down the layers, each layer adds extra
information (like a header or trailer) to help it reach its destination properly.
• Decapsulation: When data moves up the layers, each layer removes the
extra information it added during encapsulation so that the data can be
understood at the top layer.
• Interoperability: This ensures that different systems and devices from
different manufacturers can work together and communicate smoothly by
following the same standards.
The TCP/IP Model is a simpler version of the OSI model, used in real-world
networks. It has four layers and focuses on the protocols used for
communication over the internet.
Layers of the TCP/IP Model
• Application Layer: Handles services for apps like web browsing
(HTTP), file transfer (FTP), and email (SMTP).
• Transport Layer: Ensures data is transferred reliably and without
errors (using protocols like TCP and UDP).
• Internet Layer: Deals with addressing and routing data across the
network (using IP and ICMP).
• Network Access Layer: Manages the physical connection and data
link, handling things like MAC addresses and hardware.
Key Features
• The TCP/IP model was created for real-world use with the internet. It
includes important protocols like HTTP, FTP, IP, and TCP/UDP, which
help manage how data is sent and received.
Comparison: OSI vs. TCP/IP
Model
• Layers: OSI has 7 layers, while TCP/IP has 4 layers.
• Development: OSI was created as a theoretical model by ISO, while
TCP/IP was developed for practical use by DARPA.
• Usage: OSI is mainly for education and understanding, while TCP/IP is
the model used in actual networking.
• Flexibility: OSI is more rigid, with strict layers, while TCP/IP is more
flexible and focused on real-world applications.
• Examples of Protocols: OSI uses protocols like FTP, SMTP, and HTTP,
while TCP/IP uses protocols like IP, TCP, and UDP.
Detailed Functions by Layer
OSI Model Layer Functions
• Physical Layer: This layer deals with the physical transmission of data,
like cables and wireless connections (e.g., Ethernet, Wi-Fi).
• Session Layer: It manages communication sessions, starting and ending them, and
helps recover from interruptions.
• Presentation Layer: This layer formats and translates data, like encrypting or
compressing it, so the application can use it.
• Application Layer: The top layer, where user applications interact with the network
(e.g., browsers, email), and includes protocols like HTTP, FTP, and SMTP.
TCP/IP Model Layer Functions
• Application Layer: This layer combines OSI's Application, Presentation, and Session
layers. It handles services like web browsing (HTTP) and file transfer (FTP).
• Internet Layer: Responsible for addressing and routing data packets across networks
using protocols like IPv4, IPv6, and ICMP.
• Network Access Layer: Combines OSI's Data Link and Physical layers. It manages the
hardware and communication methods, such as cables and network devices.
Practical Use Cases
• OSI Model Use Cases:
• Volatile Memory: Temporary storage (e.g., RAM) that loses data when the power is off.
• Non-Volatile Memory: Permanent storage (e.g., hard drives, SSDs) that keeps data even without
power.
• User Space vs. System Space:
• User Space: Where regular programs and applications run, with limited access to system resources.
• System Space: Reserved for the operating system, managing hardware and critical functions.
• Disk vs. Memory: