0% found this document useful (0 votes)
25 views32 pages

Computer Networking

The document provides a comprehensive overview of computer networking fundamentals, including definitions of key concepts, types of networks (LAN, WAN, MAN, PAN, WLAN), network topologies (bus, star, ring, mesh), and essential network devices (routers, switches, hubs). It also covers network protocols like TCP/IP, HTTP, and FTP, as well as security measures against threats such as malware and hacking. Practical skills such as configuring network settings and troubleshooting issues are also emphasized.

Uploaded by

mragovindan2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views32 pages

Computer Networking

The document provides a comprehensive overview of computer networking fundamentals, including definitions of key concepts, types of networks (LAN, WAN, MAN, PAN, WLAN), network topologies (bus, star, ring, mesh), and essential network devices (routers, switches, hubs). It also covers network protocols like TCP/IP, HTTP, and FTP, as well as security measures against threats such as malware and hacking. Practical skills such as configuring network settings and troubleshooting issues are also emphasized.

Uploaded by

mragovindan2009
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Compsciencenotesby-mrpioe

COMPUTER NETWORKS:

Understanding Fundamentals

1. Define basic networking concepts: Understand terms like network, node,


topology, and protocol.

2. Identify types of networks: Familiarize yourself with LAN, WAN, MAN,


PAN and WLAN.

Network Topologies and Architectures

1. Describe network topologies: Understand bus, star, ring, and mesh


topologies.

2. Explain network architecture: Learn about client-server and peer-to-peer


architecture.

Network Devices and Components

1. Identify network devices: Understand the roles of routers, switches, hubs, and
bridges.

2. Explain network interface cards (NICs): Learn about NICs and their
functions.

Network Protocols and Standards

1. Understand TCP/IP model: Familiarize yourself with the TCP/IP protocol


suite.

2. Explain common network protocols: Learn about HTTP, FTP, and DNS.

Network Security and Safety

1. Understand network security threats: Learn about common threats like


malware, viruses, and hacking.
Compsciencenotesby-mrpioe

2. Explain network security measures: Understand firewalls, encryption, and


access control.

Practical Skills

1. Configure basic network settings: Learn to configure IP addresses, subnet


masks, and default gateways.

2. Troubleshoot basic network issues: Understand how to identify and resolve


common network problems.
Compsciencenotesby-mrpioe

1. Define basic networking concepts: Understand terms like network,


node, topology, and protocol.

NETWORK

In computer networking, a network is a collection of interconnected devices


(such as computers, servers, printers, and routers) that are connected with each
other to share resources, exchange data, and provide services.

Key Characteristics of a Network

1. Interconnected Devices: Devices are connected using physical(guided) or


wireless(unguided) links.

2. Communication: Devices can exchange data and messages.

3. Resource Sharing: Devices can share resources, such as files, printers, and
internet connections.

Importance of Networks

1. Communication: Networks enable devices to communicate and exchange


data.

2. Resource Sharing: Networks allow devices to share resources, reducing


costs and increasing efficiency.

3. Collaboration: Networks facilitate collaboration and teamwork.

#Networks play a vital role in modern computing, enabling devices to


communicate, share resources, and provide services.

Nodes

In computer networking, a node refers to any device that is connected to a


network and can communicate with other devices.
Compsciencenotesby-mrpioe

Types of Nodes

1. Computers: Desktops, laptops, and servers can all be nodes on a network.

2. Network Devices: Routers, switches, hubs, and bridges are all types of nodes
that help manage and direct network traffic.

3. Peripherals: Printers, scanners, and other devices can be nodes on a network


if they are connected and can communicate with other devices.

4. Mobile Devices: Smartphones, tablets, and other mobile devices can be


nodes on a network if they have network connectivity.

Characteristics of Nodes

1. Unique Address: Each node on a network has a unique address, such as an


IP address, that allows it to be identified and communicated with.

2. Data Transmission: Nodes can send and receive data to and from other
nodes on the network.

3. Network Participation: Nodes can participate in network activities, such as


file sharing, communication, and data exchange.

NB\*Nodes are the building blocks of a network, and understanding how they
work is essential for designing, implementing, and managing computer
networks.

NETWORK TOPOLOGY

In computer networking, a topology refers to the physical or logical


arrangement of devices (nodes) and connections (links) within a network. It
describes how devices are connected and how data is transmitted between them.
Compsciencenotesby-mrpioe

It defines how we arrange computers in a network.

Types of Topologies

1. Physical Topology: Refers to the physical layout of devices and cables.

2. Logical Topology: Refers to the way data is transmitted and routed through
the network.

Importance of Topology

1. Network Performance: Topology affects network speed, reliability, and


scalability.

2. Network Design: Topology influences network design, including device


placement and cable arrangement.

3. Troubleshooting: Understanding topology helps with identifying and


resolving network issues.

NB*/Topology plays a crucial role in determining the efficiency, reliability, and


scalability of a network.

NETWORKING PROTOCOL

In computer networking, a network protocol is a set of rules, conventions, and


standards that govern how devices communicate and exchange data over a
network. Protocols ensure that devices can understand each other's messages
and communicate effectively.

Key Characteristics of Network Protocols

1. Standardization: Protocols follow standardized rules and formats.

2. Communication: Protocols enable devices to exchange data and messages.


Compsciencenotesby-mrpioe

3. Error Handling: Protocols often include mechanisms for error detection and
correction.

Examples of Network Protocols

1. TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of


protocols used for communication over the internet.

2. HTTP (Hypertext Transfer Protocol): Used for transferring web pages and
data over the internet.

3. FTP (File Transfer Protocol): Used for transferring files between devices over
a network.

4. DNS (Domain Name System): Used for translating domain names to IP


addresses.[DNS query, DNS resolution, IP address, Connection]

Importance of Network Protocols

1. Interoperability: Protocols enable devices from different manufacturers to


communicate.

2. Reliability: Protocols ensure that data is transmitted accurately and


efficiently.

3. Scalability: Protocols allow networks to grow and adapt to changing needs.

NB/*Network protocols play a vital role in enabling devices to communicate


and exchange data over networks, including the internet.
Compsciencenotesby-mrpioe

2. Identify types of networks: Familiarize yourself with LAN, WAN, MAN, and
WLAN.

Types of Networks

1.Local Area Network (LAN)

2.Metropolitan Area Network (MAN)

3.Wide Area Network (WAN) }all are diff by range

4.Personal Area Network (PAN)

5.Campus Area Network (CAN)

1.Local Area Network (LAN):

-A network that spans a small geographic area, such as a home, office, or


campus.

-Computers will be connected in a limited range.

-meant to share resources eg. printer, software application, data, server etc.

-it has high security due to the limited number of devices connected.

-less costly to install and maintain due to limited nodes.

-however; there’s lack of privacy and security as data is accessed by all users of
LAN.

2. Metropolitan Area Network (MAN):

- A network that spans a metropolitan area, such as a city or town.

-it is a connection of different LANS.eg a bank connecting all branches in a city.


Compsciencenotesby-mrpioe

-meant to share data, server etc

-multiple LANS can relate to the help of cables, fiber optic.

-however, it is less secure as multiple users can access the data. It is also more
costly as more cables are required to install and maintain.

2. Wide Area Network (WAN):

-A network that spans a larger geographic area, such as a city or country.

-connect computers across the whole world.

-it is a collection of MANS.

-transmission media will be satellite/telephone cables

-meant to share data

-Data is shared with the help of routers

-an example is the INTERNET (www)

-these types of networks are less secure without firewalls& are more costly to
maintain.

4. Personal Area Network (PAN)

-collection of nearby devices connected together in a very small area (around an


individual) e.g connecting a phone to a laptop, via Bluetooth, earphones ,or to
share data/network resource.
Compsciencenotesby-mrpioe

Network Topologies and Architectures

1. Describe network topologies: Understand bus, star, ring, and mesh


topologies.

Network topology refers to the physical or logical arrangement of devices in a


network. It is the arrangement of computers in a network-defines how we
arrange computers.

Types of Network Topologies

1. Bus Topology:

Diagram of a bus topology:

All devices are connected to a single/main cable called the bus.


Communication with all other devices/nodes will be done through the bus.
When a message is sent to any node, it will go to the bus and be transmitted to
all nodes connected to the bus, but only the intended destination node will
accept and respond to the message.

Advantages of bus topology

-One cable is used hence less expensive/costly.


Compsciencenotesby-mrpioe

-Installation and maintenance are very easy.

-Easy to reconfigure.

Disadvantages of bus topology

-If the main cable fails, the complete network will fail.

-no security-as every node will receive the message

-if there are more computers, signal strengths will be reduced.

-collision-assuming two devices are sending data at the same time; chances of
collision will be very high.

2. Star Topology:

Diagram of a Star topology

All devices are connected to a central device (hub or switch). If the central
device is a hub, messages transmitted will be broadcasted to all other nodes
connected to a network. However, the intended destination address will respond
to the message sent. If the central device is a switch, message sent will be routed
only to the intended destination address i.e. transmission will be unicast.

Advantages of a Star Topology

-multiple communication is possible.

-if using a switch, communication is secure


Compsciencenotesby-mrpioe

-less expensive to install and maintain.

Disadvantages of a Star topology

-if centralized device fails, the whole network fails.

-if centralized device is a hub; there’s less security.

2. Ring Topology:

Diagram of a Ring topology

Devices are connected in a circular configuration. Each node is connected to


its adjacent node forming a closed loop. Data will be transmitted in
unidirectional i.e. in a circular fashion.

Advantages of a ring topology

-fault tolerance-easy to identify faults.

-no collision since data will be travelling in the same direction.

Disadvantages

-it’s expensive since more cables are needed.

-difficult to reconfigure.

-if any node fails, transmission will also fail.


Compsciencenotesby-mrpioe

-less security since data will be transmitted to all other nodes.

3. Mesh Topology:

Diagram of a Mesh Topology

Each device is connected to every other device. If n-nodes, links to each node
will be n-1: total links n(n-1)/2 ie if bi-directional. For uni-directional total
links will be n(n-1).

Advantages of Mesh topology

-more robust i.e. failure of one link will not affect communication

Disadvantages of mesh topology:

-expensive as more cables are needed.

-difficult to reconfigure
Compsciencenotesby-mrpioe

4. Hybrid Topology:
5. Diagram of a hybrid topology:

Combination of two or more topologies. A bus topology, star topology


and ring topology can be combined to form a hybrid topology.
Such a topology is very expensive and difficult to reconfigure, but they
are robust.
Compsciencenotesby-mrpioe

2. Explain network architecture: Learn about client-server and peer-to-peer


architecture.

1.Client-Server architecture

Diagram of a client-server architecture:

- Central server manages resources.

-clients communicate through the server, share files and applications through
the server.

-backup can be done centrally through the server.

-applications and files can be controlled centrally on the server

-security is easy to do centrally.


Compsciencenotesby-mrpioe

2.Peer-to-Peer:

Diagram of peer-to-peer architecture.

- Devices act as both clients and servers.

-security varies from device to device

-no central control of resources/data/files

Importance of understanding network topology:

1. Scalability: Topology affects network growth.

2. Reliability: Topology impacts fault tolerance.

3. Performance: Topology influences data transfer speed.

4. Security: Topology can affect vulnerability to attacks.

5. Cost: Topology impacts installation and maintenance costs.

NB/ *Understanding network topology helps design efficient, scalable, and


reliable networks.
Compsciencenotesby-mrpioe

Network Devices and Components

1.Identify network devices:

Understand the roles of routers, switches, hubs, and bridges.

Networking devices are hardware components that enable communication


between devices on a network. Some common examples include:
Compsciencenotesby-mrpioe
Compsciencenotesby-mrpioe

1. Router:

Diagram of a router:

Routers are used in both WAN and LAN environments.

LAN Routers

*Local Network connectivity-connects devices within a local network e.g


home, offices.

*Device Interconnectivity-They enable devices on the same network to


communicate with each other.

*Network segmentation-LAN router can segment a network into smaller


subnetworks, improving security and performance.

WAN Routers:

*Wide Area Network Connectivity- WAN routers connect multiple LANs or


sites over a large geographic area.

*Internet Connectivity-They often provide internet connectivity to the LANs


they serve.

*Secure VPN connections-WAN routers can establish secure VPN connections


between sites.
Compsciencenotesby-mrpioe

General functions of Routers

Packet forwarding-routers forward packets of data between networks, ensuring


data reaches its destination.

Network connectivity-Routers connect multiple networks together, enabling


communication between them.

Routing-Routers determine the best path for data to travel between networks
(dynamic routing).

Network security-Routers can provide network security features such as


firewalls, to protect against unauthorized access and malicious activity.

-Done at Network layer.

Benefits of using routers.

*Improved network performance: routers improve network performance by


forwarding packets to respective destinations.

*Enhanced network security: by providing features such as firewalls.

*Increased flexibility: enable communication between devices on different


networks, making it possible to connect multiple networks together.

2. Switch:
Compsciencenotesby-mrpioe

*Perform error checking on packets send & routes data packets.

*Connect devices within a network and forwards data

*Packet switching forwards packets of data between devices on the network

*Packets with errors will not be sent.

*Filtering and forwarding filtering incoming packets based on their destination


MAC address and forwarding them to intended destination.

-collision domain reduction

-network segmentation

3.Hub:

-Send data packets to all connected devices.

-Connects devices, but doesn't manage traffic


Compsciencenotesby-mrpioe

4.Bridge

-Used to interconnect two different LANS working on the same protocol

-Done at Data link layer.

5.Repeater:

-Regenerate the signal to maintain signal strength (weak/corrupted).

-Done at physical layer.

6.Gateway: Responsible for passing data to the network of different networking


models/protocols

-Often referred to as Protocol converters.

7. Modem: Connect to the internet via ISP

8. Firewall: Secures network by controlling incoming/outgoing traffic

9. Wireless Access Point (WAP): provides wireless connectivity

10. Network Interface Card (NIC): connects devices to a network


Compsciencenotesby-mrpioe

#*These devices help establish, manage, and secure computer networks.

2. Explain network interface cards (NICs): Learn about NICs and their
functions:

A Network Interface Card (NIC) is a hardware component that connects a


computer to a network. Its primary function is to transmit and receive
data over a network.

Key Functions of a NIC


1. Data Transmission: NICs transmit data from the computer to the
network.
2. Data Reception: NICs receive data from the network and pass it to the
computer.
3. Network Connectivity: NICs provide a physical or wireless
connection to the network.
4. MAC Address: NICs have a unique MAC (Media Access Control)
address that identifies the device on the network.

Types of NICs
1. Wired NICs: Use Ethernet cables to connect to the network.
2. Wireless NICs: Use wireless technologies (such as Wi-Fi) to connect
to the network.
3. Fiber Optic NICs: Use fiber optic cables to connect to the network.

Importance of NICs
1. Network Connectivity: NICs enable devices to connect to networks.
Compsciencenotesby-mrpioe

2. Data Communication: NICs facilitate data transmission and reception


over the network.
3. Device Identification: NICs provide a unique identifier (MAC
address) for the device on the network.

NICs play a crucial role in enabling devices to connect to networks and


communicate with other devices.

Network Protocols and Standards

1.Understand TCP/IP model: Familiarize yourself with the TCP/IP protocol


suite.

Network protocols are a set of rules and standards that govern data
communication over a network. They ensure that devices on a network can
communicate with each other efficiently and accurately.

TCP/IP Protocol Suite

1. TCP (Transmission Control Protocol):

-A connection-oriented protocol that guarantees reliable data transfer between


devices.

-Ensure sender and receiver are connected first before transmitting, this
guarantees delivery of data packets.

-Error detection and correction: detect corrupted or lost data packets and
retransmit them.

-Ensure reliable transmission of data packets.

-Mostly used where data delivery and reliability is to be guaranteed e.g sending
an email, browsing over the internet, making a telephone call etc.
Compsciencenotesby-mrpioe

-Packets are sent and received in their correct order.

2. UDP (User Datagram Protocol):

A connectionless protocol that prioritizes speed over reliability.

-Does not guarantee delivery of data packets,

-Do not provide mechanisms of error detection and correction hence some
packets may be lost/corrupted.

-No sequencing data packets are sent; thus, packets may be received in a
haphazard manner.

-Mainly used in livestreaming,

3. IP (Internet Protocol): A protocol that provides logical addressing and


routing for data packets.
Compsciencenotesby-mrpioe

2. Explain common network protocols: Learn about HTTP, FTP, and DNS.

Application Layer Protocols

1. HTTP (Hypertext Transfer Protocol): A protocol used for transferring data


over the web.

2. FTP (File Transfer Protocol): A protocol used for transferring files over a
network.

3. SMTP (Simple Mail Transfer Protocol): A protocol used for sending and
receiving email.

4. DNS (Domain Name System): A protocol that translates domain names into
IP addresses.

Internet Layer Protocols

1. IP: Provides logical addressing and routing for data packets.

2. ICMP (Internet Control Message Protocol): A protocol used for error-


reporting and diagnostic functions.

Network Access Layer Protocols

1. Ethernet: A protocol that defines how data is transmitted over a local area
network (LAN).

2. Wi-Fi: A protocol that defines how data is transmitted over a wireless


network.

Other Protocols

1. DHCP (Dynamic Host Configuration Protocol): A protocol that assigns IP


addresses and other network settings to devices on a network.

2. SNMP (Simple Network Management Protocol): A protocol used for


managing and monitoring network devices.
Compsciencenotesby-mrpioe

Network protocols play a crucial role in enabling devices to communicate with


each other and exchange data efficiently and accurately.

Network Security and Safety

1. Understand network security threats: Learn about common threats like


malware, viruses, and hacking.

Network Security Threats

1. Malware: Software that harms or exploits a network, such as viruses,


worms, and trojans.
Virus

Worms

Trojan horse
Compsciencenotesby-mrpioe

2. Phishing: Attacks that trick users into revealing sensitive information,


such as passwords or credit card numbers.

3. DDoS (Distributed Denial of Service): Attacks that overwhelm a


network with traffic, making it unavailable to users.

4. Unauthorized Access: Attacks that gain access to a network without


permission, often through stolen credentials or exploits.

5. Data Breaches: Incidents that compromise sensitive data, such as


financial information or personal identifiable information.

2. Explain network security measures: Understand firewalls, encryption,


and access control.

Network Security Measures

1. Firewalls: Network devices that control incoming and outgoing traffic based
on predetermined security rules.

2. Intrusion Detection and Prevention Systems (IDPS): Systems that detect


and prevent intrusion attempts.

3. Encryption: Techniques that protect data in transit or at rest by converting it


into an unreadable format.

4. Access Control: Measures that restrict access to network resources based on


user identity, role, or privileges (passwords, authentication, authorization).
Compsciencenotesby-mrpioe

5. Antivirus Software: Software that detects and removes malware from a


network.

6. Regular Updates and Patching: Keeping software and systems up to date


with the latest security patches.

7. Network Segmentation: Dividing a network into smaller segments to limit


the spread of malware and unauthorized access.

8. Security Awareness Training: Educating users about network security best


practices and threats.

Importance of Network Security

1. Protect Sensitive Data: Network security measures protect sensitive data


from unauthorized access.

2. Prevent Financial Loss: Network security measures prevent financial loss


due to cyber-attacks.

3. Maintain Business Continuity: Network security measures ensure business


continuity by preventing network downtime.

4. Protect Reputation: Network security measures protect an organization's


reputation by preventing security incidents.

Network security is crucial for protecting sensitive data, preventing financial


loss, and maintaining business continuity.
Compsciencenotesby-mrpioe

****************************************************************
*********

1. OSI Model: A 7-layered model that describes how data is transmitted over a
network

2. TCP/IP Model: A 4-layered model that describes how data is transmitted over
the internet

3. Network Protocols: Protocols that govern data communication, such as TCP,


UDP, HTTP, FTP

Questions and Answers:

1. Q: What is the difference between TCP and UDP?

A: TCP is a connection-oriented protocol that guarantees reliable data transfer,


while UDP is a connectionless protocol that prioritizes speed over reliability.

2. Q: What is the purpose of the OSI model?


Compsciencenotesby-mrpioe

A: The OSI model provides a standardized framework for understanding how


data is transmitted over a network, allowing different systems to communicate
with each other.

################################################################
######

1. LAN, WAN, MAN: Different types of networks, including local area


networks, wide area networks, and metropolitan area networks

2. Network Topologies: Different network topologies, including bus, star, ring,


and mesh

3. Network Devices: Devices that connect and manage networks, including


routers, switches, and firewalls

Questions and Answers:

1. Q: What is the difference between a LAN and a WAN?

A: A LAN is a local area network that spans a small geographic area, while a
WAN is a wide area network that spans a larger geographic area.

2. Q: What is the purpose of a router?

A: A router connects multiple networks together and routes traffic between


them, allowing devices on different networks to communicate with each other.

****************************************************************
*************

Network Security

Notes:
Compsciencenotesby-mrpioe

1. Security Threats: Types of security threats, including malware, phishing,


and denial-of-service attacks

2. Security Measures: Measures to protect networks, including firewalls,


intrusion detection systems, and encryption

3. Secure Communication: Methods for secure communication, including


SSL/TLS and VPNs

Questions and Answers:

1. Q: What is a denial-of-service attack?

A: A denial-of-service attack is a type of attack that overwhelms a network or


system with traffic, making it unavailable to users.

2. Q: What is the purpose of a firewall?

A: A firewall is a network security system that monitors and controls incoming


and outgoing network traffic, blocking unauthorized access to a network.

Advanced Networking Topics

Notes:

1. Software-Defined Networking: A approach to networking that allows for


programmable networks

2. Network Function Virtualization: A approach to networking that allows for


virtualized network functions

3. Internet of Things: The network of physical devices, vehicles, and other items
that are embedded with sensors, software, and connectivity

Questions and Answers:


Compsciencenotesby-mrpioe

1. Q: What is software-defined networking?

A: Software-defined networking is an approach to networking that allows for


programmable networks, enabling administrators to manage and configure
networks dynamically.

2. Q: What is the Internet of Things?

A: The Internet of Things is the network of physical devices, vehicles, and other
items that are embedded with sensors, software, and connectivity, allowing them
to collect and exchange data.

You might also like