Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
6 views

Mobile Computing

It such as include mobile computing notes

Uploaded by

rakwalakshay8
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Mobile Computing

It such as include mobile computing notes

Uploaded by

rakwalakshay8
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Network components are the physical and logical devices or elements that work together to enable

communication and data transfer across a network. These components are essential for establishing,
managing, and securing the network. They can be categorized into hardware, software, and protocols.

1. Hardware Components

These are physical devices used in a network setup.

a) End Devices (Hosts):

Examples: Computers, laptops, smartphones, servers, printers, etc.

Function: Act as the sources or destinations for data transfer.

b) Networking Devices:

Router: Connects different networks and directs data packets to their destinations using IP addresses.

Switch: Connects devices within the same network (LAN) and forwards data based on MAC addresses.

Hub: Basic device that connects multiple devices in a network; broadcasts data to all ports.

Access Point (AP): Extends a wireless network by connecting wireless devices to a wired network.

Modem: Converts digital signals to analog and vice versa for internet access.

Gateway: Acts as a translator between two different network protocols.

Firewall (Hardware): Protects a network by filtering traffic based on predefined rules.

c) Transmission Media:

Wired Media: Ethernet cables (twisted pair, coaxial, fiber optic).

Wireless Media: Radio waves, microwaves, infrared, and satellite communications.

2. Software Components

Software tools and systems facilitate communication and management of networks.

Network Operating System (NOS): Manages network resources and services (e.g., Windows Server,
Linux).

Protocols: Define rules for data communication (e.g., TCP/IP, HTTP, FTP).

Firewall (Software): Controls and monitors incoming/outgoing network traffic.

Network Management Software: Tools for monitoring, managing, and troubleshooting networks (e.g.,
Cisco DNA Center).

3. Protocols and Standards

These define communication rules and ensure interoperability between devices.


TCP/IP (Transmission Control Protocol/Internet Protocol): Foundation of the internet.

HTTP/HTTPS: For web browsing.

DNS (Domain Name System): Resolves domain names to IP addresses.

SMTP/POP3/IMAP: For email communication.

DHCP (Dynamic Host Configuration Protocol): Automatically assigns IP addresses to devices.

4. Supporting Devices

Devices that ensure stability and functionality.

Repeater: Amplifies signals over long distances.

Bridge: Connects two LANs.

Load Balancer: Distributes network traffic evenly across servers.

Proxy Server: Acts as an intermediary for client requests.

5. Security Components

Essential for protecting networks.

Firewall (Hardware/Software): Filters traffic and prevents unauthorized access.

Intrusion Detection Systems (IDS): Monitors for malicious activity.

Intrusion Prevention Systems (IPS): Detects and blocks threats in real time.

VPN (Virtual Private Network): Creates secure connections over public networks.

These components work together to create robust and efficient network systems, enabling reliable
communication and resource sharing.

*Network architecture* refers to the design framework of a computer network, outlining its
components, layout, functions, and communication protocols. It defines how devices interact and
exchange information. There are several types of network architectures based on the scale, purpose,
and technologies used.

*Types of Network Architectures*

1. *Peer-to-Peer (P2P) Architecture*

- *Description:* All devices (peers) share equal roles and responsibilities. Each device can act as a
client or a server.

- *Examples:* Small home networks, file-sharing applications (e.g., BitTorrent).

- *Advantages:* Simple, cost-effective, no central server needed.


- *Disadvantages:* Limited scalability and security.

2. *Client-Server Architecture*

- *Description:* Centralized servers provide resources and services to multiple client devices.

- *Examples:* Corporate networks, web applications.

- *Advantages:* Centralized control, scalable, and secure.

- *Disadvantages:* Higher cost and dependency on the server.

3. *Cloud-Based Architecture*

- *Description:* Services and resources are hosted in the cloud and accessed over the internet.

- *Examples:* AWS, Microsoft Azure, Google Cloud.

- *Advantages:* Highly scalable, accessible from anywhere, reduced infrastructure costs.

- *Disadvantages:* Dependency on internet connectivity, potential privacy concerns.

4. *Centralized vs. Distributed Architecture*

- *Centralized:* All data and control are in a single central location (e.g., mainframe systems).

- *Distributed:* Resources and control are spread across multiple nodes to enhance resilience and
performance (e.g., blockchain networks).

5. *Software-Defined Network (SDN) Architecture*

- *Description:* Separates the control plane from the data plane, allowing centralized management
through software.

- *Examples:* Cisco ACI, OpenFlow-based systems.

- *Advantages:* Improved flexibility, automation, and dynamic resource allocation.

- *Disadvantages:* Initial setup complexity.

*Network Architecture Layers*

Modern networks are often designed based on a layered model, such as the *OSI Model* or *TCP/IP
Model*:
1. *OSI Model Layers*

- *Physical Layer:* Hardware, cables, and physical transmission media.

- *Data Link Layer:* MAC addresses, switches, and frames.

- *Network Layer:* IP addressing and routing.

- *Transport Layer:* Ensures reliable data transfer (e.g., TCP, UDP).

- *Session Layer:* Manages sessions between devices.

- *Presentation Layer:* Data encryption, compression, and translation.

- *Application Layer:* End-user applications and protocols (e.g., HTTP, FTP).

2. *TCP/IP Model Layers*

- *Network Interface:* Combines physical and data link layers.

- *Internet Layer:* Handles IP addressing and routing.

- *Transport Layer:* Ensures reliable data transfer.

- *Application Layer:* Provides protocols for applications to communicate.

*Key Design Considerations for Network Architecture*

1. *Scalability* - Ensure the network can handle future growth in users, devices, and traffic.

2. *Performance* - Optimize for low latency, high bandwidth, and efficient data transfer.

3. *Reliability* - Use redundancy and failover mechanisms to minimize downtime.

4. *Security* - Implement firewalls, encryption, and access controls to protect data and devices.

5. *Topology* - Choose a network layout based on requirements (e.g., bus, star, ring, mesh, hybrid).

6. *Cost - Balance between performance and budget constraints.


7. *Management* - Use tools for network monitoring, management, and troubleshooting (e.g., SNMP,
NetFlow).

*Common Network Architectures*

1. *LAN (Local Area Network):*

- Small-scale network within a building or campus.

- Example: Office or home network.

2. *WAN (Wide Area Network):*

- Large-scale network spanning cities, countries, or continents.

- Example: The internet.

3. *Data Center Network:*

- Designed for data centers, focusing on high-speed connectivity and redundancy.

4. *IoT Network:*

- Connects IoT devices with specific protocols (e.g., Zigbee, MQTT).

5. *Hybrid Network:*

- Combines on-premise infrastructure with cloud-based resources.

*WLAN standards* define the protocols and specifications for wireless local area networks, ensuring
compatibility, performance, and security among devices. The most widely used WLAN standards are
developed and maintained by the *IEEE (Institute of Electrical and Electronics Engineers)* under the
*802.11 family*.

1. IEEE 802.11 Standards*

a) IEEE 802.11 (1997)*

- *Description:* The original standard.

- *Frequency Band:* 2.4 GHz.

- *Data Rate:* Up to 2 Mbps.


- *Status:* Obsolete; replaced by faster, more secure standards.

b) IEEE 802.11a (1999)*

- *Frequency Band:* 5 GHz.

- *Data Rate:* Up to 54 Mbps.

- *Features:*

- Less interference due to 5 GHz band.

- Shorter range compared to 2.4 GHz.

- *Use Case:* High-speed indoor applications.

- *Status:* Rarely used today.

c) IEEE 802.11b (1999)*

- *Frequency Band:* 2.4 GHz.

- *Data Rate:* Up to 11 Mbps.

- *Features:*

- Longer range than 802.11a.

- Susceptible to interference from other devices using the 2.4 GHz band.

- *Use Case:* Home and small office networks in the early 2000s.

- *Status:* Obsolete.

d) IEEE 802.11g (2003)*

- *Frequency Band:* 2.4 GHz.

- *Data Rate:* Up to 54 Mbps.

- *Features:*

- Combines 802.11a's speed with 802.11b's range.

- Backward compatible with 802.11b.

- *Use Case:* Home and business networks in the mid-2000s.

- *Status:* Largely replaced by newer standards.


e) IEEE 802.11n (Wi-Fi 4, 2009)*

- *Frequency Bands:* 2.4 GHz and 5 GHz (dual-band).

- *Data Rate:* Up to 600 Mbps.

- *Features:*

- Introduced MIMO (Multiple Input Multiple Output) technology.

- Wider channel bandwidth (20/40 MHz).

- Improved range and speed.

- *Use Case:* Standard for modern home and business networks.

- *Status:* Still widely used.

f) IEEE 802.11ac (Wi-Fi 5, 2013)*

- *Frequency Band:* 5 GHz.

- *Data Rate:* Up to 6.9 Gbps.

- *Features:*

- MU-MIMO (Multi-User MIMO) for better performance in crowded networks.

- Wider channel bandwidth (up to 160 MHz).

- Beamforming for focused signal delivery.

- *Use Case:* High-speed applications like streaming, gaming, and large-scale business environments.

- *Status:* Common in most networks today.

*g) IEEE 802.11ax (Wi-Fi 6, 2019)*

- *Frequency Bands:* 2.4 GHz and 5 GHz (dual-band).

- *Data Rate:* Up to 9.6 Gbps.

- *Features:*

- OFDMA (Orthogonal Frequency Division Multiple Access) for better efficiency.

- Improved battery life for devices (TWT – Target Wake Time).

- Better performance in high-density environments.

- *Use Case:* Ideal for IoT, smart homes, and crowded networks.

- *Status:* Rapidly growing adoption.


*h) IEEE 802.11be (Wi-Fi 7, Expected 2024-2025)*

- *Frequency Bands:* 2.4 GHz, 5 GHz, and 6 GHz (tri-band).

- *Data Rate:* Up to 46 Gbps (theoretical).

- *Features:*

- Support for 320 MHz channel width.

- Enhanced MU-MIMO and multi-link operation.

- Designed for ultra-low latency and ultra-high speed.

- *Use Case:* Next-generation applications like AR/VR, 8K video streaming, and industrial automation.

*2. Frequency Bands*

- *2.4 GHz:*

- Wider range, better penetration through walls.

- Lower speed, prone to interference (e.g., from Bluetooth, microwaves).

- *5 GHz:*

- Higher speed, less interference.

- Shorter range, weaker penetration.

- *6 GHz (Wi-Fi 6E and Wi-Fi 7):*

- More spectrum availability.

- Faster speeds and lower latency.

*3. Security Standards for WLAN*

- *WEP (Wired Equivalent Privacy):* Deprecated due to weak encryption.

- *WPA (Wi-Fi Protected Access):* Introduced stronger security; replaced WEP.

- *WPA2:* Enhanced security with AES encryption; widely used today.

- *WPA3:* Latest security standard with improved encryption and protection against brute-force
attacks.

*4. Key Considerations*

- *Backward Compatibility:* Newer standards are typically backward compatible with older ones.
- *Network Design:* Choose standards based on use cases (e.g., high-density environments, IoT,
streaming).

- *Hardware Support:* Ensure devices and access points support the desired standard.

You might also like