You are on page 1of 3

# Class Notes: Computer Networks

## Introduction to Computer Networks


Computer networks enable the exchange of data and resources between connected
devices. Understanding the principles of computer networking is essential for
modern IT professionals, system administrators, and developers.

## Network Topologies

### Bus Topology


In a bus topology, all devices are connected to a central cable, called the bus.
Data transmission involves broadcasting the signal across the bus, and all devices
receive the signal, with the intended recipient processing the data.

### Star Topology


A star topology consists of a central hub or switch to which all devices connect
individually. Data is transmitted through the hub, which then forwards the data to
the intended recipient.

### Mesh Topology


In a mesh topology, each device is connected to every other device, creating a
redundant and highly fault-tolerant network. Mesh networks offer robustness, but
can be complex to implement and maintain.

## Network Protocols

### TCP/IP
The Transmission Control Protocol/Internet Protocol (TCP/IP) suite is the
foundation of the internet and many intranets. It provides a set of rules and
conventions for transmitting data over networks.

### HTTP/HTTPS
Hypertext Transfer Protocol (HTTP) and its secure variant HTTPS are application-
layer protocols for distributed, collaborative, and hypermedia information systems.
They define how web browsers and web servers communicate.

### DNS
The Domain Name System (DNS) resolves domain names to IP addresses, allowing users
to access websites using human-readable domain names rather than numerical IP
addresses.

## Network Devices

### Router
Routers are networking devices that forward data packets between computer networks.
They perform the function of traffic directing on the internet.

### Switch
Switches connect devices within a single network and use MAC addresses to forward
data to the correct destination.

### Firewall
Firewalls monitor and control incoming and outgoing network traffic based on
predetermined security rules. They act as a barrier between a trusted network and
an untrusted network.

## Network Security

### Encryption
Encryption plays a pivotal role in securing data transmitted over networks.
Protocols such as SSL/TLS provide secure communication over the internet.

### Authentication and Access Control


Network security measures include authentication mechanisms, access control lists,
and biometric identification to ensure that only authorized users can access
network resources.

## Types of Networks

### LAN (Local Area Network)


LANs connect devices over a relatively short distance, such as within a building or
campus. They are commonly used for sharing resources and data.

### WAN (Wide Area Network)


WANs cover a larger geographic area and connect multiple LANs. Examples include the
internet and corporate networks with geographically dispersed offices.

### Wireless Networks


Wireless networks use radio waves to connect devices without the need for physical
cabling. They provide flexibility and mobility but require careful security
measures.

## Network Addressing

### IP Addressing
IP (Internet Protocol) addresses uniquely identify devices on a network. IPv4
addresses are 32-bit numbers, while IPv6 addresses are 128-bit numbers, providing a
much larger address space to accommodate the growing number of connected devices.

### Subnetting
Subnetting allows for the segmentation of larger networks into smaller, more
manageable subnetworks. This practice helps optimize network performance and
security.

### DHCP
The Dynamic Host Configuration Protocol (DHCP) automates the process of assigning
IP addresses to devices on a network, reducing the need for manual configuration.

## Network Services

### Email (SMTP, POP, IMAP)


The Simple Mail Transfer Protocol (SMTP) is used for sending emails, while the Post
Office Protocol (POP) and Internet Message Access Protocol (IMAP) allow clients to
retrieve emails from a mail server.

### FTP
The File Transfer Protocol (FTP) enables the transfer of files between a client and
a server on a computer network.

### DNS
The Domain Name System (DNS) translates domain names to IP addresses, facilitating
human-friendly web browsing.

## Network Troubleshooting

### Ping
The ping command is used to test the reachability of a host on a network and
measure the round-trip time for data to travel to the target host and back.
### Traceroute
Traceroute is a network diagnostic tool for displaying the route and measuring
transit delays of packets across an IP network.

### Wireshark
Wireshark is a widely used network protocol analyzer for capturing and
interactively browsing the traffic running on a computer network.

## Network Virtualization and Cloud Computing

### Virtual LAN (VLAN)


VLANs allow for the segmentation of a single physical network into multiple logical
networks, providing improved security and management flexibility.

### Cloud Networking


Cloud computing relies on network virtualization to deliver resources and services
over the internet, allowing for rapid scalability and efficient resource
allocation.

## Emerging Technologies

### Software-Defined Networking (SDN)


SDN decouples network's control plane from the forwarding plane, enabling dynamic
and programmable network configuration.

### Internet of Things (IoT)


The IoT encompasses interconnected devices with unique identifiers and the ability
to transfer data over a network without requiring human-to-human or human-to-
computer interaction.

You might also like