Professional Documents
Culture Documents
Networks
Networks
Networks
OSI / TCP/IP
1. A computer network is a set of devices (computers) connected to
exchange information and resources such as files etc. The main goals of
computer networks are:
Resource sharing (such as software sharing, program sharing, etc.)
High Reliability (if one network link fails another can transfer the
data).
Cost Reduction (we can buy only required services from cloud services
like GCloud, AWS, Azure, etc.).
Communication (acts as a communication medium between sender and
receiver).
Load Sharing (a program may run on multiple machines).
2. The Internet operates on a technique called packet switching. In packet
switching, the data that is transferred among the different computers on
the internet are transmitted in the form of packets. These packets
contain information about the error control mechanisms, the address of
the destination, and also the sequence in which the packets are to be
transmitted.
3. The web has got upgraded from WEB 1.0 (on which, there is only single-
side communication between two computers) to WEB 2.0 (which allows
two-way communication between two computers). WEB 3.0 majorly
focuses on the data of the users. It lays emphasis on decentralized
applications based on blockchain technology aided with the power of AI
and Machine Learning.
4. In circuit switching, a dedicated communication channel is set up
between the sender and the receiver. Due to the dedicated circuit, there
is extremely little chance of data loss or error but a lot of bandwidth is
lost because other senders cannot utilize the same channel when a
transmission is going on.
5. In message switching, end-users communicate by sending and receiving
messages that included the entire data to be shared. Messages are the
smallest individual unit. There are a number of intermediate nodes that
transfer data and ensure that the message reaches its destination.
Message switched data networks are hence called hop-by-hop systems.
6. In packet switching, the message is first divided into data packets and
then transmitted. It is connectionless, as it doesn't require a dedicated
communication channel. These data packets are then grouped at the
receiver's end to obtain the actual data or message. It is not preferred
for transmissions with constant usage, such as voice calls.
7. The OSI model is a 7-layered model,and the basic idea behind layered
architecture is to divide the design into smaller pieces. Most networks
are organized in a series of layers to reduce the design complexity. The
layered architecture also provides abstraction from other layers.
8. The lower layer is responsible for all the data transfer issues and is
also known as the Hardware Layer. It consists of Physical Layer, Data
Link Layer and Network Layer.
9. The upper layer is responsible for all the application-related issues and
is also known as Software Layer. It includes Application Layer,
Presentation Layer, Session Layer, Transport Layer.
10. There are 7 layers in a OSI model:
various-layers-of-the-osi-model 1.webp
Application Layer
1. Application Layer
Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), File
Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP), and
TELNET are some of the protocols used in the application layer.
(ii) Client-Server
A client is a computer system that accesses the services provided by a
server. On the other hand, a server is a powerful centralized hub that
stores various information and handles the requests of the client(s). In
the client-server network, the files are not stored on the hard drive of
each computer system. Instead, the files are centrally stored and
backed up on a specialized computer known as a server. Here, a server
is designed to efficiently provide data to a remote client. On a large-
scale network, there can be more than one server.
what-is-a-client-server-network.webp
3. The Domain Name System (DNS) is a method for mapping alphabetic
names to numeric IP addresses on the Internet, similar to how a phone
book maps a person's name to a phone number. A DNS query is made
when a web address (URL) is typed into a browser to obtain the IP
address of a web server associated with that name. The DNS directory is
distributed worldwide to account for the millions of domain names listed
and accessed daily.
(i) Recursive DNS Service : In this type, if the DNS resolver only
communicates to the root servers and the remaining servers were
communicated recursively by the root server. The root server sends the
output (IP in this case) to the DNS resolver.
recursive-dns-service.webp
(ii) Iterative DNS Service : In this type, the DNS resolver can directly
communicate and receive input from the servers at different levels.
iterative-dns-service.webp
4. The DNS consists of different types of servers:
(i) DNS Resolver : An application, such as a web browser, sends DNS
queries to the recursive server. It's the user's first resource, and it
either provides the response to the query if it has it cached, or it goes
to the next-level server if it doesn't. Before answering the client, this
server may undergo multiple iterations of querying.
(ii) Root Name Server : If the recursive server does not have the answer
cached, it first sends a query to this server. The root name server is a
directory of all the servers that will hold the requested information.
(iii) Top-Level Domain Server : A TLD nameserver keeps track of all
domain names with the same domain extension, such as .com, .net, or
whatever comes after the last dot in a URL.
(iv) Authoritative name server : The server contains information specific
to the domain name it serves (e.g., scaler.com). If the authoritative
name server has access to the requested record, it will return the
requested hostname's IP address to the DNS Recursor (the librarian) who
initiated the request.
5. Three different types of DNS Queries:
(i) Recursive Query : A DNS client expects a DNS server (usually a DNS
resolver) to respond to a recursive query with either the requested
resource record or an error message if the resolver is unable to locate
it.
(i) Iterative Query : It occurs between the DNS resolver and the nonlocal
name servers, like the root, TLD, and authoritative name servers. The
root server refers to the recursive server to the TLD, which directs it to
an authoritative server. If the authoritative server has the domain name,
it passes it on to the recursive server.
(i) Non-Recursive Query : This usually happens when a DNS resolver client
requests a record from a DNS server that it has access to, either
because it is authorized for the record or because the record is in its
cache.
6. A Record stands for address and holds the IP address of a domain. Ns
record stands for name server records that specify which authoritative
server is responsible for maintaining all information for a specific
domain.TXT records enable administrators to enter text into DNS. When
there is an alias, canonical name records are utilized instead of an A
record.
7. DNS caching aims to shorten the time it takes to receive a response to a
DNS query. Caching allows DNS to save past answers to requests closer
to clients, allowing them to obtain the same information faster the next
time they query it. Caching improves efficiency by allowing servers to
react quickly when receiving a request for the same IP address.
8. The World Wide Web popularly known as WWW, W3, or the Web is an
interconnected system of public webpages accessible through the
Internet. The Web is not the same as the Internet : the Web is one of
many applications built on top of the Internet.
9. Protocols in the Application Layer help in building models for users to
interact with software applications over the World Wide Web. It contains
formatting rules specifying how data is packaged when the messages are
sent and received. There are several protocols in the application layer
used for different services like email services, file transfers, etc.
http-request.webp
11. After the client/browser sends an HTTP request to the web server, the
server responds back to the browser with an HTTP response. This
response consists of all the data that is requested by the client in the
HTTP request. An HTTP response consists of 3 parts: Response Status
Line, Response Headers, Response Body.
what-is-http-protocol 1.webp
12. An HTTP status code is a three-digit code that specifies the status of the
HTTP response. Some of the commonly seen HTTP status codes are: 200:
OK, 404: Page Not Found, 500: Internal Server Error
13. HTTP does not store the state/information of the client as well as the
server and hence, is a stateless protocol. But with the help of cookies,
we can make HTTP protocol as a stateful protocol.Since HTTP relies on
the TCP (Transmission Control Protocol), it is a connection-oriented
protocol. Hence, the connection is established and the data is sent over
the connection only after the establishment of the connection.
14. SMTP, which stands for, Simple Mail Transfer Protocol, is an email
protocol that is used to send and receive emails over the internet. It is a
set of guidelines that are followed to transmit electronic mail over the
Internet. The main purpose of the SMTP is to set up communication
guidelines between the servers.
Basically, in SMTP the actual transfer of the mail is done through the
message transfer agent (MTA). Hence, to send the mail, the system
must have the client MTA and similarly, to receive the mail, the system
must have the server MTA.
example-of-the-working-of-smtp-protocol.webp
15. The SMTP client sends the commands to the SMTP server and the server
responds with some kind of numerical codes. Some popular commands
are:
(i) HELO : This command is used for beginning the email-sending process
and is used to identify the user and full domain name.
(ii) MAIL : This command is used to initiate the message transfer and
identifies the originator of the mail.
(iii) RCPT : This command identifies the recipient of the mail and again
the SMTP server responds with the same code.
(iv) DATA : This command triggers the transfer of data between the
client and the server.
(v) QUIT : After the email has been sent, the client sends this command
to quit the server.
(vi) RSET : To abort or cancel the mail transaction, this command is
used. This doesn't close the connection but it does reset everything.
16. The FTP protocol helps to transfer files from one computer to another by
providing access to directories or folders on remote computers and
allows software, data, text file to be transferred between different
kinds of computers.
Although transferring files from one system to another is very simple and
straightforward, but sometimes it can cause problems. For example,
two systems may have different file conventions. Two systems may
have different ways to represent text and data. Two systems may have
different directory structures. FTP protocol overcomes these problems
by establishing two connections between hosts. One connection is used
for data transfer, and another connection is used for the control
connection.
mqtt-protocal-structure.webp
Transport Layer
1. Transport Layer
The transport layer in computer networks is a crucial component of the
networking stack responsible for ensuring reliable and efficient
communication between two devices over a network.
format-of-user-datagram.webp
(iii) Congestion Detection Phase : In this phase, the sender identifies the
segment loss and gives acknowledgment depending on the type of loss
detected.
Case-01: Detection On Time Out
Case-02: Detection Of Receiving 3 Duplicate Acknowledgements
10. The fairness metric in networking is used to determine whether the
application or user is receiving a fair share of the system’s resources.
In congestion control, the mechanism for transmission using the new
protocol must be well aligned with the TCP protocol. TCP fairness
determines that the new protocol receiver has a no larger share of the
network as compared to TCP flow. This is an important factor because if
a new protocol acquires unfair capacity then it leads to congestion in the
network.
Network Layer
1. Network Layer
Network Layer is responsible for how a machine in a network can
communicate with a machine in a different network. There are two
primary purposes of the network layer. The first one is to divide
segments into network packets and then reassemble them on the
receiving end. Another is to route packets across a physical network by
determining the optimum path. The network layer uses logical network
addresses (usually Internet Protocol addresses) to route packets to a
destination node.
2. The various network layer protocols are:
parts-of-ipv4-address.webp
Network part : The network part is also known as net id which is used
to classify the network to which the host is connected.
Host part : The host part is also known as the host id which is the part
of the IP address which is used to uniquely identify the host on a
network.
6. Addressing mode refers to the mechanism of hosting an address on a
given network. There are three different types of addressing modes
supported by IPv4:
Unicast addressing mode : As the name suggests, the data is sent to
only a single host. There is one source and one receiver. The
relationship between the source and the destination network is one-to-
one. The destination address field consists of a 32-bit IP address that
belongs to the destination host. It is the most common mode of
addressing.
Broadcast addressing mode : In broadcast addressing mode, the data
is sent to all the devices in the network, i.e., multiple hosts. The
destination address field of the packet consists of the IP address called
the Special Broadcast address which is represented by
255.255.255.255 The client then sends the packet which is received by
all other servers on the network.
Multicast addressing mode : In multicasting addressing mode, there is
one source and a group of destinations. The data, i.e., the packets
are neither sent to one host nor multiple hosts but are instead sent to
a group of hosts. The relationship between the source and the
destination is one too many. The destination address consists of a
special address starting with 224.x.x.x.
7. Subnetting is a method of dividing a single physical network into logical
sub-networks (subnets). Subnetting allows a business to expand its
network without requiring a new network number from its Internet
Service Provider. Subnetting helps to reduce the network traffic and also
conceals network complexity. Subnetting is necessary when a single
network number must be assigned to several portions of a local area
network (LAN).
The two advantages of NAT are now readily apparent. First, it would
reduce the number of IP addresses we need because not every computer
needs a public address. Second, it would shield these private computers
from prying eyes. Only the public address is visible to everyone,
everything else is concealed behind it. Therefore, nothing past the public
address on the firewall's or router's external interface may be seen
from the internet.
nat-examples.webp
Assume two hosts, A and B are connected in a network. Now, both
request the same destination, on the same port number, say 1000, on
the host side, at the same time. If NAT translates IP addresses, then
when their packets arrive at the NAT, both of their IP addresses will be
masked by the network's public IP address and delivered to the
destination. Destination will send replies to the router's public IP
address. As a result, when NAT receives a response, it will be unclear
which response belongs to which host (because source port numbers for
both A and B are the same). To avoid this issue, NAT conceals the
source port number and creates an entry in the NAT table.
12. There are generally three different types of NAT:
(i) Static NAT : In this, one unregistered (Private) IP address is mapped
to one legally registered (Public) IP address or local and global addresses
are mapped one to one. Usually, this is utilized for hosting websites.
(ii) Dynamic NAT : An unregistered IP address is converted into a
registered (Public) IP address using a pool of public IP addresses in this
sort of NAT. The packet will be dropped if the pool's IP address is not
free since only a predetermined number of private IP addresses can be
converted to public addresses.
(iii) Port Address Translation(PAT) : It is also known as NAT overload.
This allows for converting numerous local (private) IP addresses to a
single registered IP address. Port numbers are employed to identify the
traffic or which traffic comes from which IP address.
13. Quality of Service (QoS) is a group of technologies that operate on a
network to ensure that high-priority traffic and applications may be
reliably carried out even when the network's capacity is constrained.
Additionally, the QoS specifies that supporting priority for one or more
flows will not fail other flows. A flow can consist of a packet from a
particular application or an incoming interface as well as source and
destination addresses, source and destination socket numbers, session
identifiers, and packets.
Ping messages refer to both the ICMP echo request and echo reply
messages. A network device receives an ICMP echo request from the
ping command and immediately sends back an ICMP echo reply. The ICMP
header contains fields such as Type, Code, Checksum, Data.
ICMP messages are divided into two broad categories:
Error Messages
Query Messages
17. Types of ICMP error message:
Message "Unable to reach destination": Hosts and routers send this
message when IP packets cannot be routed to their destination.
Source quench message: When the network is congested or when the
source is sending packets faster than the router can handle, the host
or router will send this message.
Timeout message: The host/router sends this message if the datagram
lifetime value is reduced to zero or if the destination address does not
receive all packets at the specified time interval.
Parameter problem message: The host/router sends this message if the
datagram parameters are not set correctly. Used to indicate an error in
the datagram header field.
Redirect message: The host/router sends this message to update the
host's routing table.
18. ICMP Flood Internet Control Message Protocol (DDoS) attacks, also known
as ping flood attacks, are common denial of service (DoS) attacks in
which an attacker attempts to use ICMP to echo a target device.
Flooding the destination with request packets forces the network to
respond with the same number of response packets. This makes the
destination inaccessible to normal traffic.
Routing
1. Routing
Routing is the process of selecting an optimal path across one or more
networks. The Routing is performed on many types of networks like
circuit-switched and packet-switching on the internet, where packets
are forwarded from one node to another node with the help of a packet
forwarding system. The mechanism or device used for forwarding the
packets from source to destination is called a router.
The routing process directs the packets on the basis of the routing
table. Routing tables keeps the records of all the routes associated with
various networks.
On the other hand Routing protocols basically define a way the router can
communicate with each other. It is the process of communication
between two networks in order to share information regarding
reachability and network status.
2. There are three different types of routing:
(i) Static Routing : Static Routing is the process of manually adding the
routes in the routing table with the help of a configuration file, which is
loaded when the router starts. In static routing, all the changes are
done manually with the help of the system administrator.
(ii) Dynamic Routing : Dynamic routing protocols allow routers to
dynamically learn information about other routers and add the information
automatically to the router table. The Routing protocol determines the
best path to the network added to the routing table.
(iii) Default Routing : In default routing, the packets are forwarded
without the specific address of the next hop. The default route is
basically the address of another router. If the address on the packet
matches the route, the packet is forwarded; else, it is forwarded
through a default route of that router.
3. A routing table is a set of rules, which can also be viewed in a table
format, and it is used to discover where data packets (i.e., traveling
over an Internet Protocol network) will be directed. The routing table
consists of a list of all known network addresses and information about
where to forward the data packet. These entries in the routing table are
called route entries or routes. The router will forward the data packet
by selecting the best matching route entry. Directly connected networks
are added automatically.
BGP considers all available peering options a router has and selects the
one that is nearest to the router. Each potential peer communicates the
routing information it possesses, which is then stored in a Routing
Information Base (RIB). This information is accessible to BGP, which can
then use to choose the best peering option.
7. Major functions performed by the BGP:
(i) Route Storage : Individual BGPs that use route storage store
information about how to reach other networks in a set of databases.
(ii) Route Update : This task uses techniques to determine when and how
to use the information obtained from peers to update the routes
properly.
(iii) Route Selection : Each BGP selects the best routes to each network
on the internet using the information in its route databases.
(iv) Route Advertisement : BGP only advertises the best route to peers
when multiple feasible routes exist. Only viable routes are advertised,
which makes the network function more efficiently.
8. SDN (Software Defined Networking) is an architecture that divides the
control plane from the data plane to give networks additional flexibility
and programmability. Users can react fast to changes thanks to
software-defined networks in cloud computing. Network performance and
monitoring are enhanced thanks to SDN management, which also
increases network configuration efficiency.
SDN decouples the software from the hardware, much like any other
virtualized technology. SDN keeps the hardware-based data plane for
carrying out actual traffic forwarding while moving the control plane,
which decides where to send traffic, to software. This makes it possible
for network managers who work with software-defined networking to
program and manage the entire network through a single interface rather
than device by device.
9. SDN broadly consists of three layers:
(i) Infrastructure Layer : The numerous networking devices that make up
the infrastructure layer create the underlying network that carries out
network traffic forwarding. This layer would be the physical one over
which the control layer would establish network virtualization.
(ii) Control Layer : The control layer is the region of the control plane
where clever logic for SDN controllers to control network infrastructure
would be found. Each network vendor is focusing on developing its SDN
controller and framework products in this area.
(iii) Application Layer : Utilizing all available network information
regarding network topology, network state, network statistics, etc.,
the application layer is an open region where as many creative
applications as possible can be created. Eg: Applications for network
setup and automation, security.
10. Different models of SDN are:
(i) Switch Based SDN : It served as the foundation for the original SDN
concept. The network switches' behavior is determined by a system
called OpenFlow that the switches use to handle packets. As a result,
there is a single point of control for managing how the switches handle
network traffic
(ii) Hybrid SDN : In a single environment, the hybrid SDN model mixes two
or more networking technologies. While traditional networking protocols
regulate the other traffic flows on the network, a network manager, for
example, can configure the SDN control plane to manage a set of
specialized traffic flows.
(iii) SDN Overlay : To run numerous virtual network (VN) topologies on
top of existing infrastructure, the SDN overlay model tunnels through the
physical network. Depending on the type of overlay, this enables a VN to
be a layer 2 or layer 3 network and a physical network to be a layer 2
or layer 3 network.
Data Link Layer
1. Data Link Layer
Data Link Layer is the second layer of the seven-layer OSI model that is
responsible for simply ensuring and confirming that the bits and bytes
received are similar to the bits and bytes being transmitted. This is the
protocol layer that transports data between network nodes in a wide
area network (WAN) or nodes in the same local area network (LAN).
The problem with the data link layer is how to prevent a fast
transmitter from drowning a slow receiver in data. A traffic control
method is frequently required to inform the transmitter of how much
buffer space the receiver currently has. Flow regulation and error
management are frequently used techniques for controlling this problem.
The sender must send some additional bits together with the data bits
for error detection and correction. Based on the additional redundant
bits, the receiver performs the necessary checks. If the data is error-
free, it eliminates the unnecessary bits before delivering the message
to the upper layers.
5. The three main methods to detect error in frames:
(i) Parity Check : The parity check is performed by adding an extra bit to
the data known as the parity bit, which results in a number of 1s that
are either even in the case of even parity or odd in the case of odd
parity. The parity check is only useful for detecting single-bit errors.
(ii) Checksum : In this the sender adds the segments using 1's
complement arithmetic. It then adds the sum to get the checksum,
which is then recalculated on the receiver's end and compared to check
for errors.
(iii) Cyclic Redundancy Check : CRC is a hash function that identifies
accidental modifications to raw computer data and is widely used in
storage devices such as hard disc drives and digital telecommunications
networks.
6. Error correction techniques determine the exact number of corrupted bits
and their positions. Two approaches are:
(i) Backward Error Correction (Retransmission) : It is a straightforward
method. If the receiver identifies an error in the incoming frame, it
requests the sender to retransmit the frame. However, it can be used
efficiently only when retransmission is not expensive.
(ii) Forward Error Correction : If the receiver identifies an error in the
incoming frame, it performs an error-correcting code that generates the
actual frame. This reduces the amount of bandwidth required for
retransmission. In real-time systems, it is essential.
Four major error correcting codes:
Hamming Codes
Binary Convolution Codes
Reed-Solomon Code
Low Density Parity Check Code
7. The Data Link Layer has two main sublayers:
(i) Logical Link Sublayer : This part of the DLL is responsible for flow
control, frame acknowledgement and error notification.
(ii) Media Access Control Sublayer : This part of the DLL is responsible
for assigning media access and MAC addresses to devices on the
network.
8. Simplest protocol is used in noiseless channels, it has no error control
and no flow control. In the simplest protocol, we assume that the
receiver is always ready to handle any frames coming from the sender
immediately. The simplest protocol is a unidirectional protocol in which
the data frames are traveling in only one direction from the sender to the
receiver. Since the simplest protocol is unidirectional, there is no
acknowledgment (ACK). Also, as there is no data loss in the
transmission, there is no need for data re-transmission. It is also known
as the Elementary Data Link Protocol
flow-chart-for-simplest-protocol.webp
9. The flow control mechanism is to ensure that sender does not send data
more than what the receiver can handle. The DDL stores the data that
needs to be sent in the send buffer and the data to be received in the
receive buffer. Flow control makes sure that no more packets are sent
by the sender once the receiver’s buffer is full as the messages will be
dropped and the receiver won’t be able to handle them. In order to
control the amount of data sent by the DDL, the receiver will create a
buffer which is also known as Receive Window.
When the acknowledgment for one frame is not received by the sender or
the frames received by the receiver are out of order, then the whole
window starting from the corrupted frame is retransmitted.
another-working-of-go-back-n-arq-protocol.webp
15. In the Selective Repeat ARQ, we only resend the data frames that are
damaged or lost. On the other hand, the correct frames are received at
the receiver's end and are buffered for future usage. In the selective
repeat ARQ, both the sender and the receiver have windows of the same
size.
Now, if any frame is lost or damaged then the receiver sends a NACK to
the sender. When the sender gets NACK then it retransmits the lost
frame only. The receiver does not discard all the subsequent frames
following a lost frame, it just sends back a NACK and stores the rest of
the frames in its memory buffer. In this way, the sender does not need
to wait for the timer to expire. Hence, the performance of the selective
repeat ARQ increases. The ACK and the NACK have the sequence number
of the frame that helps the sender identify the lost frame.
working-of-selective-repeat-protocol.webp
16. Piggybacking is a process of attaching acknowledgment with the data
packet to be sent. It is an efficient solution for reducing the bandwidth
utilization of the network. TCP is a full-duplex communication protocol,
so piggybacking is used to transmit packets.
The IEEE 802 is a collection of networking standards that deals with the
data link layer and physical layer technologies like ethernet and wireless
communications.
IEEE 802: The IEEE 802 deals with the standards of LAN and MAN.
IEEE 802.1: The IEEE 802.1 deals with the MAC(Media Access Control).
IEEE 802.2: The IEEE 802.2 deals with the LLC (Logical Link Control).
Physical Layer
1. Physical Layer
Physical layer in the OSI model is the lowest layer of the OSI reference
model. It is responsible for sending raw bits from one computer to
another computer over a network. It does not deal with the data of
these bits and is majorly concerned with the setup of physical connection
to the network. It plays the role of interacting with actual hardware and
signaling mechanisms.
It's the only layer of the OSI network model that deals with physical
connectivity and is responsible for establishing, maintaining, and
deactivating the physical connection of two different computing devices
in a network. This layer defines the hardware equipment, topologies,
cabling, modes of transmission, wiring, frequencies, pulses used to
represent binary signals, etc.
2. Some basic functions that are performed by the physical layer are:
(i) Topologies : It defines the way how different computing devices in a
network must be arranged with each other. Different types of topologies
include Mesh, Star, Ring, and Bus.
(ii) Configuration : It refers to the way two or more communication
devices are attached to a link. A Link is the physical communication
pathway that transfers data from one device to another. There are two
types of configurations : Point to Point Configuration and Multipoint
Configuration.
(iii) Transmission Modes : It defines the direction of transmission
between two devices. Different modes of transmission are Simplex, Half
Duplex, and Full Duplex modes.
(iv) Hardware Layer : This layer comes under the category of Hardware
Layer because it deals with the setting up of a physical connection to
the network.
(v) Bits Synchronization : It deals with the Synchronization of bits. This
means that the sender and the receiver are synchronized at bit level with
the help of a clock.
(vi) Bits rate control : Physical Layer maintains the flow of data rate,
i.e the number of bits sent per second from the sender to a receiver.
(vii) Baseband and Broadband transmissions : The baseband transmits the
digital signal using a physical medium like wires and the broadband
transmits the analog signals using optical fibers and twisted cables as a
medium of transmission.
3. The different network topologies come under the Physical Layer:
(ii) Switch
A switch is a multiport network device with a buffer and design that
can improve its efficiency (having a large number of ports means less
traffic) and performance. When a data frame arrives at any network
switch port, it evaluates the destination MAC address, performs the
necessary checks, and sends the frame to the associated device. The
switch performs error checking before forwarding the data, making it
very efficient.
There are 4 types of switches:
Managed Switch : These switches are used in organizations with large
and complex networks because of functionalities like QoS (Quality of
Service) enhancements such as higher security levels, better precision
control, and complete network management.
Unmanaged Switch : These low-cost switches are commonly found in
home networks and small businesses. They can be easily set up by
simply connecting to the network, and they will immediately begin
operating.
LAN Switches : LAN switches connect devices on an organization's
internal LAN. They are also known as Ethernet switches. These
switches are especially useful for alleviating network congestion or
bottlenecks.
PoE Switches : PoE Gigabit Ethernets uses Power over Ethernet (PoE)
switches. Devices linked to it can receive energy and data over the
same line thanks to PoE technology, which combines data and power
transmission over the same connection.
(iii) Router
A router is a network layer device similar to a switch that routes data
packets based on their IP addresses. A router examines a data
packet's destination IP address and uses headers and forwarding
tables to determine the best way to transfer the packets.
There are various types of routers:
Wireless Router : These routers can generate a wireless signal in
your home or office, allowing computers to connect to routers within a
specific range and access the internet
Brouter : A brouter is a hybrid of a bridge and a router. It acts as a
bridge, allowing data to be transferred between networks, and it can
also route data within a network to individual systems, much like a
router.
Core Router : A core router is a kind of router that can route data
within a network but cannot route data between networks.
Edge Router : An edge router is a low-capacity device that sits at the
network's edge. It enables an internal network to communicate with
external networks. For internet-based connectivity with distant
networks, it uses an external BGP (Border Gateway Protocol).
Broadband Router : Broadband routers are primarily used to provide
computers with high-speed internet access. It is required when
connecting to the internet via phone and using Voice over IP technology
(VoIP).
(iv) Bridge
A bridge is a network device that operates at the data link layer
device. A bridge is a repeater with the added functionality of filtering
content by reading the MAC addresses of the source and destination. It
is also used to connect two LANs that use the same protocol. It has a
single input and output port, making it a two-port device.
There are generally two types of bridges:
Transparent Bridges : These bridges operate in a manner that is
transparent to all networked hosts. A transparent bridge stores MAC
addresses in a table similar to a routing table and uses that information
to route packets to their destination.
Source Routing Bridges : The source station performs the routing
operation in these bridges, and the frame specifies which route to
take. The host can find the frame by sending a special frame known as
the discovery frame, which propagates throughout the network using
all possible paths to the destination.
(v) Gateway
A gateway is a network node in telecommunications that connects two
networks that use different transmission protocols. Gateways serve as
network entry and exit points because all data must pass through or
communicate with the gateway before being routed. It also
consolidates internet connectivity into a single device. A gateway node
in the enterprise can also serve as a proxy server and a firewall.
There are basically 2 different types of gateways:
Unidirectional Gateway : These gateways allow alerts to go in only
one direction. Changes that are made in the source ObjectServer are
replicated in the target ObjectServer and not the other way around.
Bidirectional Gateway : These gateways enable alerts to be sent
from the source ObjectServer to the target ObjectServer or application,
as well as feedback to the source.
Apart from these two types, gateways can also be classified on the
basis of functionality as Network Gateway, IOT Gateway, Cloud
Storage Gateway etc.
(vi) Modem
A modem is a network device that modulates and demodulates analog
carrier signals (known as sine waves) to encode and decode digital
data for processing. Because modems perform both of these tasks
simultaneously, the term modem is a combination of "modulate" and
"demodulate".
There are mostly 5 different types of modems:
Optical Modem : Instead of other metallic media, optical cables are
used in optical modems. It converts digital data signals into light
pulses transmitted via the optical fiber it employs.
Digital Modem : Digital data are converted into digital signals by a
digital modem. The digital data is modulated on the digital carrier
signals before being transmitted over the digital transmission lines.
Acoustic Modem : A specific modem called an "acoustic modem" can
connect a phone handset to a gadget that traveling salespeople use to
connect hotel phones. It has a microphone and speaker.
Smart Modem : The smart modem has capabilities for auto-dialing,
auto-redialing, and auto-answering. It has a microprocessor onboard
that performs these tasks using the Hayes AT command set.
Short Haul Modem : This modem is the one that is installed on your
home computers. They are typically used to connect PCs in a building
or office and can transmit the data over distances of up to 20 miles.
(vii) Repeater
A repeater is a two-port device that operates at the physical layer . It
is used to regenerate the signal over the same network before it
becomes too weak or corrupted, allowing the signal to be transmitted
for a longer distance over the same network. It is important to
understand that repeaters do not amplify the signal. When the signal
weakens, repeaters copy it bit by bit and regenerates it at its original
strength.
They are generally of two types:
Analog Repeater : In an analog repeater, data is transmitted through
analog signals to increase its amplitude. These repeaters are used in
trunk lines to help broadcast multiple signals using **frequency division
multiplexing
Digital Repeater : In a digital repeater, data is transmitted in the
form of binary digits such as 0s and 1s. While transmitting data, 0 and
1 values are generated, and it is capable of transmitting data over long
distances.
importance-of-a-bandwidth.webp
Since it is globally unique, two devices cannot share the same MAC
address. Each device displays it in hexadecimal formats, such as
00:0a:95:9d:67:16 . The 12-digit number is 48 bits long, the first 24
bits are utilized for the OUI(Organization Unique Identifier), and the
remaining 24 bits are used for NIC/vendor-specific information. It
operates on the OSI model's data link layer. A logical address is
connected to a physical or MAC address using the ARP protocol.
architecture-of-mac 1.webp
unicast-mac-address.webp
(i) Multicast Address : The source device can send a data frame to
numerous other devices or NICs by using multicast addresses. The first
three bytes of the first octet of an address, or the LSB (least significant
bit), in a Layer-2 (Ethernet) Multicast address, are set to one and
reserved for multicast addresses.
multicast-mac-address.webp
Network Security
1. Cryptography is a term used in data communication that refers to
protecting the private information shared between two parties. Network
Security refers to securing and protecting the network and data to
ensure the confidentiality of data.
The message of the sender also known as plain text is converted into an
unreadable form by using a key ‘k’, that unreadable resultant text is
called cipher text. And this whole process is known as encryption.
Decryption is the reverse process of encryption. In decryption, at the
receiver end cipher text is converted into plain text using the key, so
the receiver can understand it.
cryptography.webp
2. The main principles of cryptography:
Confidentiality refers to rules and regulations that make sure that the
data is restricted to certain people or certain places.
Data integrity ensures that data remains accurate and consistent over
its whole transmission process.
Authentication ensures that the data is being claimed by the person
who is related to it.
Non-repudiation ensures that a person or a party related to the
transmission process cannot deny the authenticity of their signature on
the data or the transmission of a message.
3. Network Security generally refers to action taken by an enterprise or
organization to protect and secure its computer network and data. The
main aim is to ensure the confidentiality and accessibility of the network
and data.
network-security-model 1.webp
4. Digital signatures allow us to verify the author, date, and time of
signatures and authenticate the message contents. To verify the
integrity and validity of digital messages and documents, it employs a
cutting-edge mathematical technique. It helps us combat the issue of
impersonation and tampering in digital communications and ensures that
the contents of a message are not changed while in transit. Additionally,
digital signatures offer details about the message's origin, status, and
signer's agreement.
working-of-firewall 1.webp
There are many other types of firewalls based on their features and level
of security:
(i) Packet-Filtering Firewall : It is the most basic firewall that functions
as a management program, monitoring network traffic and filtering
incoming packets based on security rules that have been configured.
(ii) Circuit-Level Gateways : These firewalls examine information about
transmission, just like packet-filtering firewalls, but they do not look for
real data and hence they work without using a lot of processing
resources
(iii) Application-Level Gateways : These firewalls work at the application
layer and can prohibit particular types of information and identify when
applications and protocols (such as HTTP and FTP) are being abused.
(iv) Stateful Multi-layer Inspection Firewalls :They are preferable to
packet-filtering firewalls or circuit-level gateways because they provide
both packet inspection technology and TCP handshake verification. These
firewalls also monitor the status of connections that have already been
made.
(v) Next-Generation Firewalls : NGFW monitors the complete data
transaction, including packet headers, packet contents, and sources, in
contrast to traditional firewalls and are created in a way that enables
them to counteract more complex and developing security risks.
(vi) Threat-Focused NGFW : Along with all the characteristics of Next-
Generational Firewalls, they additionally offer enhanced threat detection
and remediation. These firewalls can respond to threats quickly.
(vii) NAT Firewalls : These firewalls are primarily intended to access
Internet traffic while blocking all unauthorized connections. These
firewalls usually hide our devices' IP addresses, making them safe from
attackers.
(viii) Cloud Firewalls : A firewall is built using a cloud solution, it is
referred to as a cloud firewall or FaaS. (firewall-as-service). Third-
party vendors typically maintain and operate cloud firewalls on the
Internet. This type of firewall is comparable to a proxy firewall.
(ix) Unified Threat Management Firewalls : The UTM firewalls are a
unique class of devices that combine stateful inspection firewall
functionality with intrusion detection and prevention capabilities.
7. SSL (Secure Sockets Layer) is a cryptographic protocol that enables
data transmission security over a TCP (Transmission Control Protocol)
connection. SSL encrypts your data to ensure that any information
transmitted between the two parties remains confidential and safe from
potential attackers. This is critical for protecting sensitive information
online. TLS (Transport Layer Security) is the successor to SSL and
offers stronger encryption and security features.
phases-of-ssl-connection.webp
8. There are various steps involved in establishing an SSL connection: