Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
2 views

Computer Network

The document provides an overview of computer networks, including definitions of networks, network topology types (star, ring, bus, mesh, tree), and various network types (PAN, LAN, WAN, etc.). It also discusses VPNs, OSI and TCP/IP models, important protocols like HTTP, FTP, and the differences between TCP and UDP. Key networking concepts such as nodes, links, gateways, and network reliability metrics are also covered.

Uploaded by

aparna panda
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Computer Network

The document provides an overview of computer networks, including definitions of networks, network topology types (star, ring, bus, mesh, tree), and various network types (PAN, LAN, WAN, etc.). It also discusses VPNs, OSI and TCP/IP models, important protocols like HTTP, FTP, and the differences between TCP and UDP. Key networking concepts such as nodes, links, gateways, and network reliability metrics are also covered.

Uploaded by

aparna panda
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Computer Networks

Network: A network is a set of devices connected with a physical media link.


Network Topology: Network topology specifies the layout of a computer
network. It shows how devices and cables are connected to each other.
Types of Network Topology:
Star:
In this topology, all the nodes are connected to a single device known as a
central device.
If one cable is disconnected from the central device then that specific device
will face failure. But if the central device fails then the whole topology fails.
Easy to install, used in home and office.

Ring:
In this the nodes are connected to two or more nodes and thus forming a
continuous single path for transmission. It does not need any central device to
control the connectivity among the devies. Example: SONET network, SDH
network.
Bus:
In this topology, all the nodes are connected to a single cable known as a central
cable or bus. It acts as a shared communication medium. If any device wants to
send the data to other devices then it will send the data over the bus which in
turn sends the data to all the attached devices. Ex: Ethernet cable ,cable tv
system.

Mesh:
In this network topology, the nodes are individually connected to other nodes. It
does not need any central devices or central bus to control the connectivity
among the nodes.
Tree:
It is a combination of star and bus topology. This is also called extended star
topology. All extended star segments are connected to a central bus, so if any
segment faces failure rest assured the other segments will not be affected.
Different types of network
●​ PAN(Personal Area Network): Its range limit is up to 10 meters. It is
used for personal use. For example Computers, Fax, Printers etc.
●​ LAN(Local Area Network): It is used for small geographical locations
eg: Schools, office, hospitals, etc.
●​ HAN(House Area Network): It is actually a LAN used in a house and
used to connect homely devices like Computers, phones, printers, etc.
●​ CAN(Control Area Network): It is a multiple interconnected LAN. Also
known as Corporate Area Network.
●​ MAN(Metropolitan Area Network): It is used to connect devices that
span large cities over a geographical area.
●​ WAN(Wide Area Network): It is used over a wide geographical location
that may range to connect cities and countries.
●​ GAN(Global Area Network): It uses satellites to connect devices over
the global area.

VPN(Virtual Private Network): It is a private WAN built on the internet. It


allows the creation of secured tunnel (protected network) between different
networks using the internet (public network). By using VPN, a client can
connect to the organization’s network remotely.

Advantages of VPN:
1.​ VPN is used to connect offices in different geographical locations
remotely and is cheaper than WAN connections.
2.​ VPN is used for secured transactions and data transfer between multiple
offices located in different geographical locations.
3.​ VPN keeps an organization’s information secured against any potential
threats or intrusions by using virtualization.
4.​ VPN encrypts the internet traffic and disguises the online identity.
Types of VPN:
1.​ Access VPN: It provides secure remote access to a network, such as a
corporate network or private servers. It is commonly used by remote
workers or individuals who need to connect securely to a central network
over the internet.
2.​ Site-to-Site VPN: It is commonly used by a large company having
different branches in different locations to connect the network of one
office to another which is in different location.
2.1 Intranet VPN: It is used to connect remote offices in different
locations using shared infrastructure (internet connectivity and servers)
with accessibility policies as a private WAN.
2.2 Extranet VPN: It uses shared infrastructure over the intranet,
suppliers, customers, partners, and other entities and connects then using
dedicated connections.

OSI: Open System Interconnections: It is a network architecture model based


on ISO standards. It deals with connecting the systems that are open for
communication with other systems. It has 7 layers.

1.​ Physical layer


2.​ Data link layer
3.​ Network layer
4.​ Transport layer
5.​ Session layer
6.​ Presentation layer
7.​ Application layer
TCP/IP Model: (Transmission Control Protocol/ internet Protocol): It is a
connection-oriented protocol that is reliable, ordered, and error-checked
delivery of data between applications running on hosts in a network.
It is a compressed version of the osi model with 4 layers.
1.​ Link
2.​ Internet
3.​ Transport
4.​ Application:

HTTP and HTTPS: (HyperText Transfer Protocol/ HyperText Transfer


Protocol Secure)

HTTP defines the set of rules and standards on how the information can be
transmitted on the world wide web(www). It helps the web browsers and web
servers for communication.

HTTPs is an advanced and secured version of http. It enables secure


transactions by encrypting the communication and also helps identify network
servers securely.

DNS: (Domain Name System)


It is a naming system for all the resources over the internet which includes
physical nodes and applications. It is used to locate resources easily over a
network.
If you want to visit “linkedin” the user must type “https://www.linkedin.com”
into the address bar of the web browser.

In other words: For example, when a web server(URL-Uniform Resource


Locator) is typed into a browser, DNS server provides the ip address of the web
server associated with that name. So DNS converts the URL www.linkedin.com
into the ip address 192.168.10.1

TCP vs UDP:(User Datagram Protocol)


TCP is a connection -oriented protocol. UDP is a connectionless protocol. A
key difference between TCP and UDP is that TCP is comparatively slower than
UDP. However, retransmission of lost data is possible by TCP.
Important Protocols.
1.​ FTP: (File Transfer Protocol): It is an application layer protocol that
allows file and data transfer between hosts and also allows us to
download files from remote servers to our computers.
2.​ ICMP: (Internet Control Message Protocol): It is a network layer
protocol used for error-handling.
3.​ ARP: (Address Resolution Protocol): It is a network layer protocol
used to convert logical address i.e. IP address to device’s physical
address i.e. MAC address.
4.​ MAC(Media Access Control) and IP address :
MAC address is used to ensure the physical address of the computer.
IP address is used to uniquely identify the connection of a network.

Important key points


1.​ Hub: It is a networking device which is used to transmit a signal to each
port to respond from which the signal was received.
2.​ Check the reliability of the network:
Downtime: It is defined as the required time to recover.
Failure Frequency: It is the frequency when it fails to work the way it is
intended.
Performance can be measured by the transmit time and response time.
3.​ Node and Link: A network is a connection setup of two or more
computers by a physical medium like optical fiber or coaxial cable. The
physical medium of connection is known as Link and the computers that
connected known as nodes.
4.​ Gateway and router: A node that is connected to two or more networks
is known as gateway. It is also known as a router.
A router sends data to a similar network.
Gateway sends data to dissimilar networks.
5.​ NIC(Network Interface Card): It is a peripheral card that is attached to
a PC to connect to a network. Every NIC has MAC address that identifies
the PC on the network.
6.​ POP3(Post office protocol version 3): POP is responsible for accessing
mail service on a client’s machine.
7.​ RAID( Redundant Array of Independent Disks): It is a method to
provide fault tolerance using multiple hards dics drives.
8.​ Netstat: It is a command line utility program. It gives useful information
about the current TCP/IP setting of a connection.
9.​ Ping: It allows to check the connectivity between network devices.
10.​ P2P(peer-peer process) The process on each machine that
communicate at a given layer are P2P.
11.​ Unicasting: Sending message to a single node form the source.
12.​ Anycasting: Sending message to any of the node from the source.
13.​ Multicasting: if the message is sent to a subset of nodes from the
source.
14.​ Broadcasting: Message sent to all nodes in the network from the
source.

You might also like