Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

CISCO

 What’s networking :
Allows computers to communicate perfectly despite
them all running on different operating systems.
We can connect more than 2 computers with an
Ethernet then to a networking device (a switch or a
hub). We can send data through IP adresses (by this,
computers recognize each other network). That
structure is called Local Area Network (LAN).
This can make the company save more money: like
despite connecting a printer to every computer, we can
buy a really strong printer (IT infrastructures) and
connect it to all the computers.
We can consider a LAN as an Office. So how can we
connect the two offices that are separated ( each one is
in a different country) ?
Internet Service Providers (ISP) work as
intermediates between the offices. Each office has
its own ISP. And the two ISPs are strongly
connected between each other. So the office1
send data to its ISP that sends it to the ISP2 who
send it at his turn to Office2.
Technically, Office one has a Jack on its wall that
connects a cable from its ISP. The two ISPs
connected with a cable that goes through the
underground. That cable is connected to the jack
of the Office2.
The two LANs form a Wide Area Network (WAN),
which is a wide geographical area.
 What’s Internet:
It’s simply: a very massive WAN that covers the entire
world. Or, connected WANs.
 How do applications work?
For instance: Youtube is owned by Google who has put
a public server somewhere on the Internet, accessible
to everybody on the Internet.
When we type www.youtube.com on our browser, the
computer sends an HTTP request to youtube public
server. After receiving it, they send an HTML file back
that allows you to watch your video. And it goes the
same for all the apps.
 Bits and Bytes :
Bit (b) is the smallest information a computer can
understands. It’s either a 0 or a 1. Bit refers to speed or
connection.
Byte (B) is formed by 8 bits. Byte refers to DATA.
- When we talk about the speed of the network: we
talk about Speed (the speed of the
interconnections), Delay (how long is the process,
the route that going to take the data) and
Availability (all the links are properly running).
- About the network topology: we have STAR
( connected with a ring, if one goes down, the
others are not affected), RING (the direct
connection between two goes down, they still can
connect the other way), BUS ( we have 2 sections
connected, if the connection goes down, the first
section can connect with each other but not with
the second one).
 Today we use hybrid network.

 OSI Model and TCP/IP Model


OSI (Open System Interconnect) developed by ISO to
make the connection happen between devices of the
IMB and DEC producers. TCP/IP Model promoted by
the department of defense is more relevant to the OSI.
They are a set of rules and standards needed in the
computer industry. That’s why; we need to understand
layers approaches of each model to know from where
the problem comes from.
OSI Layers TCP/IP Layers
7-Application
4-Aplication
6-Presentation
5-Session
4-Transport 3-Transport
3-Network 2-Internet
2-DataLink 1-Network Interface
1-Physical
All People Seem To Need TCP/IP comes in A TIN
Data Processing
7-6-5 are taken care by the operation system.
Application layers are the point of contact for all
Network aware application. (The HTTP request
communicates with the application layer then
gives it to the session layer, all the way down, till it
reaches the physical layer.)
The application layer is involved only if an app
communicates with the network within a protocol.
The presentation layer Generify Data and does an
Encryption service: it converts data from session
layers into an image if it’s an image …
Session layer creates and maintains sessions
(separate session).
Transport layer breaks information into
manageable segments and creates an
encapsulation to each segment. It has to take two
critical decisions:
- Whether to use Reliable (TCP Transmission
control protocol) or unreliable communication
(UDP User datagram protocol): reliable
communication has to get an acknowledgement
for every packet what makes unreliable
communication faster.
- Creates a Port number: it’s a number that is
attached with the TP address to identify which
application this information is coming from. And
also, to know the destination of the information by
creating a socket (an IP address and a post
number) and send it down to a network layer. The
port number helps us link the info with the right
app when we have 2 apps going to the same IP
address.
Network layer: it adds a layer header to the
segment from the transport layer which will be
called Packet. It compares the IP addresses and
checks if the destination IP address is in the local
subnet. If it’s not, it will find the best path to go
to the destination.
DATALink: it will add a data link header called a
Frame. It’s responsible for MAC (Media access
control) addressing, which is a hardware address
(every network interface card of your computer
has its own MAC address known as Burn In
Address that cannot be changed). They use
Cyclic Redundancy Check (CRC) to identify the
errors or any other error checking mechanism.
Physical layer: where the actual data transfer
happen. It deals with wires, cables and hardware
ports/connectors.

You might also like