You are on page 1of 4

Computer Science- IBDP

Unit 3: Networks
1. LAN (Local Area Network):
 Covers a local area like offices & homes.
 Based on ethernet, a set of protocols for exchanging data.
 Two ways to implement ethernet; UTP (tisted pair cables) or wireless
(WiFi radio waves).

2. WAN (Wide Area Network):


 Covers an area wider than LAN
 Most popular one is the internet
 Not tied to a single location
 WANs can be wired (using fibre optic cable) or wireless (using
micriwave or statellite transmission technology).

 VLAN (Virtual Local Area Network):


 Allows a network of computers & users to communicate in a
simulated environment

Internet:
 A network of networks
 Globally connected network system that uses the tcp/ip protocols to
transmit data vi various types of media.
 A network of global exchanges
 WWB (World Wide Web) is not the same as internet; internet refers
to global communication system, including hardware & infrastructure,
while the web is one of the services communicated over the internet.

Extranet:
 Controlled private network allowing customers, partners, vendors,
suppliers etc. to gain information about specific companies without
granting access to the organization's entire network.
 Often a private part of private.
 It is restricted to selected users through user IDs, passwords, and other
authentication mechanisms on login page.
Intranet:
 For individual ids like beaconite id.

VPN:
 Virtual Private Network
 Allows people to log into a website remotely and access its sources
but encrypts all data.

PAN:
 Personal Area Network
 A network covering a very small area.
 Eg Bluetooth & USB.

Peer to Peer (P2P):


 Network model i which devices exchange files.
 "Equal client" system where instead of accessing files from a server,
the "peer" computers just swap amongst each other.

Q))- What is OSI & TCP/IP model?


 OSI Model (the Open Systems interconnection model) is a conceptual
framework used to describe the functions of a networking system. The OSI
model characterizes computing functions into a universal set of rules and
requirements in order to support interoperability between different
products and software. It was the first standard model for network
communications, adopted by all major computer and telecommunication
companies in the early 1980s
 TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a
suite of communication protocols used to interconnect network devices on
the internet. TCP/IP is also used as a communications protocol in a private
computer network (an intranet or extranet).

Q))- How many layers are in OSI model


OSI:
 In the OSI reference model, the communications between a computing
system are split into seven different abstraction layers: Physical, Data Link,
Network, Transport, Session, Presentation, and Application.

Q))- Write a function of all layers of OSI & TCP/IP.


1. Physical Layer
The lowest layer of the OSI Model is concerned with electrically or optically
transmitting raw unstructured data bits across the network from the physical
layer of the sending device to the physical layer of the receiving device. It can
include specifications such as voltages, pin layout, cabling, and radio
frequencies. At the physical layer, one might find “physical” resources such as
network hubs, cabling, repeaters, network adapters or modems

2. Data Link Layer


Describes the format of data on the network. It further contains two sub-
layers of its own. The first, media access control (MAC), provides flow control
and multiplexing for device transmissions over a network and the second,
the logical link control (LLC), provides flow and error control over the physical
medium as well as identifies line protocols.

3. Network Layer
The network layer is responsible for receiving frames from the data link layer,
and delivering them to their intended destinations among based on the
addresses contained inside the frame. It decides which path the data will take.

4. Transport Layer
The transport layer manages the delivery and error checking of data packets.
It regulates the size, sequencing, and ultimately the transfer of data between
systems and hosts.

5. Sessions Layer
The session layer controls the conversations between different computers. A
session or connection between machines is set up, managed, and termined
at layer 5. Session layer services also include authentication and
reconnections.

6. Presentation Layer
Ensures that data is in a presentable format & encrypts it for protection .

7. Application Layer
At this layer, both the end user and the application layer interact directly
with the software application. This layer sees network services provided to
end-user applications such as a web browser or Office 365.

Two fundamental techniques in network:


 Encryption is the process of encoding data so that only the computer with
the right decoder will be able to read & use it.
 Tunneling involves establishing & maintaining a logical network connection
(that may contain intermediate hops). In it, packets constructed in a
specific VPN protocol format are encapsulated within some other base or
carrier protocol, then transmitted between vpn client & server then finally
de-encapsulated on the receiving side.

You might also like