Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
8 views

Module-9-Basic-Network-Components-and-Protocol

A computer network consists of interconnected computer systems that can communicate via hardware and software components, such as switches, routers, servers, and clients. Protocols are standardized rules that enable data formatting and processing for effective communication between devices on a network. While computer networks offer advantages like resource sharing and efficient communication, they also have drawbacks, including high initial setup costs and potential security risks.

Uploaded by

Bars
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Module-9-Basic-Network-Components-and-Protocol

A computer network consists of interconnected computer systems that can communicate via hardware and software components, such as switches, routers, servers, and clients. Protocols are standardized rules that enable data formatting and processing for effective communication between devices on a network. While computer networks offer advantages like resource sharing and efficient communication, they also have drawbacks, including high initial setup costs and potential security risks.

Uploaded by

Bars
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

IT213 – Platform Technologies

Module 9 - Basic Network Components and Protocol


What is Computer Networking? Basics, Uses & Components

What is a Computer Network?

A computer network is a group of two or more interconnected computer systems. You can establish a network connection
using either cable or wireless media.

Every network involves hardware and software that connects computers and tools.

Computer Network Components

Here are essential computer network components:

Switches

Switches work as a controller which connects computers, printers, and other hardware devices to a network in a campus or a
building.

It allows devices on your network to communicate with each other, as well as with other networks. It helps you to share
resources and reduce the costing of any organization.

Routers

Routers help you to connect with multiple networks. It enables you to share a single internet connection with multiple
devices and saves money. This networking component acts as a dispatcher, which allows you to analyze data sent across a
network. It automatically selects the best route for data to travel and send it on its way.

Servers

Servers are computers that hold shared programs, files, and the network operating system. Servers allow access to network
resources to all the users of the network.

Clients
Clients are computer devices which access and uses the network as well as shares network resources. They are also users of
the network, as they can send and receive requests from the server.

Transmission Media

Transmission media is a carrier used to interconnect computers in a network, such as coaxial cable, twisted-pair wire, and
optical fiber cable. It is also known as links, channels, or lines.

Access points

Access points allow devices to connect to the wireless network without cables. A wireless network allows you to bring new
devices and provides flexible support to mobile users.

Shared Data

Shared data are data which is shared between the clients such as data files, printer access programs, and email.

Network Interface Card

Network Interface card sends, receives data, and controls data flow between the computer and the network.

Local Operating System

A local OS which helps personal computers to access files, print to a local printer and uses one or more disk and CD drives
which are located on the computer.

Network Operating System

The network operating system is a program which runs on computers and servers. It allows the computers to communicate
via network.

Protocol

A protocol is the set of defined rules that allows two entities to communicate across the network. Some standard protocols
used for this purpose are IP, TCP, UDP, FTP, etc.

Hub

Hub is a device that splits network connection into multiple computers. It acts a distribution center so whenever a computer
requests any information from a computer or from the network it sends the request to the hub through a cable. The hub will
receive the request and transmit it to the entire network.

LAN Cable

Local Area Network(LAN) cable is also called as Ethernet or data cable. It is used for connecting a device to the internet.

OSI

OSI stands for Open Systems Interconnection. It is a reference model which allows you to specify standards for
communications.

Unique Identifiers of Network

Below given are some unique network identifiers:

Hostname

Every device of the network is associated with a unique device, which is called hostname.

IP Address
IP (Internet Protocol) address is as a unique identifier for each device on the Internet. Length of the IP address is 32-bits. IPv6
address is 128 bits.

DNS Server

DNS stands for Domain Name System. It is a server which translates URL or web addresses into their corresponding IP
addresses.

MAC Address

MAC (Media Access Control Address) is known as a physical address is a unique identifier of each host and is associated
with the NIC (Network Interface Card). General length of MAC address is : 12-digit/ 6 bytes/ 48 bits

Port

Port is a logical channel which allows network users to send or receive data to an application. Every host can have multiple
applications running. Each of these applications are identified using the port number on which they are running.

Other Important Network Components

ARP

ARP stands for Address Resolution Protocol which helps network users to convert the IP address into its corresponding
Physical Address.

RARP

Reverse Address Resolution Protocol gives an IP address of the device with given a physical address as input.

Uses of Computer Networks

Here are some common application of computer networks

• Helps you to share resource such as printers

• Allows you to share expensive software’s and database among network participants

• Provides fast and effective communication from one computer to another computer

• Helps you to exchange data and information among users via a network.

Advantages of Computer Networking

Here are the fundamental benefits/pros of using Computer Networking:

• Helps you to connect with multiple computers together to send and receive information when accessing the
network.

• Helps you to share printers, scanners, and email.

• Helps you to share information at very fast speed

• Electronic communication is more efficient and less expensive than without the network.

Disadvantages of Computer Networking

Here are drawbacks/ cons of using computer networks:

• Investment for hardware and software can be costly for initial set-up

• If you don’t take proper security precautions like file encryption, firewalls then your data will be at risk.
• Some components of the network design may not last for many years, and it will become useless or malfunction and
need to be replaced.

• Requires time for constant administration

• Frequent server failure and issues of regular cable faults

Summary

• A computer network is a group of two or more interconnected computer systems

• Computer networks help you to connect with multiple computers together to send and receive information

• Switches work as a controller which connects computers, printers, and other hardware devices

• Routers help you to connect with multiple networks. It enables you to share a single internet connection and saves
money

• Servers are computers that hold shared programs, files, and the network operating system

• Clients are computer device which accesses and uses the network and shares network resources

• Hub is a device that split a network connection into multiple computers.

• Access points allow devices to connect to the wireless network without cables

• Network Interface card sends, receives data and controls data flow between the computer and the network

• A protocol is the set of defined rules which that allows two entities to communicate across the network

• Hostname, IP Address, DNS Server, and host are important unique identifiers of computer networks.

• ARP stands for Address Resolution Protocol

• RAR Reverse Address Resolution Protocol gives an IP address of the device with given a physical address as input.

• Computer network helps you to share expensive software’s and database among network participants

• The biggest drawback of installing computer network is that its initial investment for hardware and software can be
costly for initial set-up


What is a protocol? | Network protocol definition

In networking, a protocol is a standardized set of rules for formatting and processing data. Protocols enable computers
to communicate with one another.

What is a network protocol?

In networking, a protocol is a set of rules for formatting and processing data. Network protocols are like a common
language for computers. The computers within a network may use vastly different software and hardware; however, the
use of protocols enables them to communicate with each other regardless.

Standardized protocols are like a common language that computers can use, similar to how two people from different
parts of the world may not understand each other's native languages, but they can communicate using a shared third
language. If one computer uses the Internet Protocol (IP) and a second computer does as well, they will be able to
communicate — just as the United Nations relies on its 6 official languages to communicate amongst representatives
from all over the globe. But if one computer uses IP and the other does not know this protocol, they will be unable to
communicate.

On the Internet, there are different protocols for different types of processes. Protocols are often discussed in terms of
which OSI model layer they belong to.

What are the layers of the OSI model?

The Open Systems Interconnection (OSI) model is an abstract representation of how the Internet works. It contains 7
layers, with each layer representing a different category of networking functions.

Protocols make these networking functions possible. For instance, the Internet Protocol (IP) is responsible
for routing data by indicating where data packets* come from and what their destination is. IP makes network-to-network
communications possible. Hence, IP is considered a network layer (layer 3) protocol.

As another example, the Transmission Control Protocol (TCP) ensures that the transportation of packets of data across
networks goes smoothly. Therefore, TCP is considered a transport layer (layer 4) protocol.

*A packet is a small segment of data; all data sent over a network is divided into packets.

Sign Up

Security & speed with any Cloudflare plan

Start for free


Which protocols run on the network layer?

As described above, IP is a network layer protocol responsible for routing. But it is not the only network layer protocol.

IPsec: Internet Protocol Security (IPsec) sets up encrypted, authenticated IP connections over a virtual private network
(VPN). Technically IPsec is not a protocol, but rather a collection of protocols that includes the Encapsulating Security
Protocol (ESP), Authentication Header (AH), and Security Associations (SA).

ICMP: The Internet Control Message Protocol (ICMP) reports errors and provides status updates. For example, if a router
is unable to deliver a packet, it will send an ICMP message back to the packet's source.

IGMP: The Internet Group Management Protocol (IGMP) sets up one-to-many network connections. IGMP helps set up
multicasting, meaning multiple computers can receive data packets directed at one IP address.

What other protocols are used on the Internet?

Some of the most important protocols to know are:

TCP: As described above, TCP is a transport layer protocol that ensures reliable data delivery. TCP is meant to be used
with IP, and the two protocols are often referenced together as TCP/IP.

HTTP: The Hypertext Transfer Protocol (HTTP) is the foundation of the World Wide Web, the Internet that most users
interact with. It is used for transferring data between devices. HTTP belongs to the application layer (layer 7), because it
puts data into a format that applications (e.g. a browser) can use directly, without further interpretation. The lower layers
of the OSI model are handled by a computer's operating system, not applications.

HTTPS: The problem with HTTP is that it is not encrypted — any attacker who intercepts an HTTP message can read
it. HTTPS (HTTP Secure) corrects this by encrypting HTTP messages.

TLS/SSL: Transport Layer Security (TLS) is the protocol HTTPS uses for encryption. TLS used to be called Secure Sockets
Layer (SSL).

UDP: The User Datagram Protocol (UDP) is a faster but less reliable alternative to TCP at the transport layer. It is often
used in services like video streaming and gaming, where fast data delivery is paramount.

What protocols do routers use?

Network routers use certain protocols to discover the most efficient network paths to other routers. These protocols are
not used for transferring user data. Important network routing protocols include:

BGP: The Border Gateway Protocol (BGP) is an application layer protocol networks use to broadcast which IP addresses
they control. This information allows routers to decide which networks data packets should pass through on the way to
their destinations.

EIGRP: The Enhanced Interior Gateway Routing Protocol (EIGRP) identifies distances between routers. EIGRP
automatically updates each router's record of the best routes (called a routing table) and broadcasts those updates to
other routers within the network.

OSPF: The Open Shortest Path First (OSPF) protocol calculates the most efficient network routes based on a variety of
factors, including distance and bandwidth.

RIP: The Routing Information Protocol (RIP) is an older routing protocol that identifies distances between routers. RIP is
an application layer protocol.

How are protocols used in cyber attacks?

Just as with any aspect of computing, attackers can exploit the way networking protocols function to compromise or
overwhelm systems. Many of these protocols are used in distributed denial-of-service (DDoS) attacks. For example, in
a SYN flood attack, an attacker takes advantage of the way the TCP protocol works. They send SYN packets to repeatedly
initiate a TCP handshake with a server, until the server is unable to provide service to legitimate users because its
resources are tied up by all the phony TCP connections.

Cloudflare offers a number of solutions for stopping these and other cyber attacks. Cloudflare Magic Transit is able to
mitigate attacks at layers 3, 4, and 7 of the OSI model. In the example case of a SYN flood attack, Cloudflare handles the
TCP handshake process on the server's behalf so that the server's resources never become overwhelmed by open TCP
connections.

Reference

https://www.guru99.com/basic-computer-network.html

https://www.cloudflare.com/learning/network-layer/what-is-a-protocol/

You might also like