computer Network minimize

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

#A computer network is a group of devices connected with #OSI Reference Model: OSI (Open System and data rates

n System and data rates needed for transmission is defined in the


each other through a transmission medium such as cables, Interconnection) is reference model for how application physical layer. it converts the digital bits into electrical
wires, cables etc. These devices can be computers, printers, can communicate over a network. A reference model is a signal.
scanners, Fax machines etc. The purpose of having conceptual framework for understanding relationships. 2)Data link Layer: Data link layer synchronizes the
computer network is to send and receive data stored in other The purpose of the OSI reference model is to guide information which is to be transmitted over the data.
devices over the network. These devices are often referred vendors and developers so the digital communication Error controlling is easily done. The encoded data are
as node. #There are five basic component of computer products and software programs they create will then pass to physical. Error Detection bits are used by the
network. interoperate, and to facilitate clear comparisons among data link on layer. It also corrects the errors. Outgoing
1)Message: It is the data or information which needs to communications tools. messages are assembled into frames. Then the system
be transferred from one device to another device over a The OSI reference model architecture divides network waits for the acknowledgement to be receive after the
computer network. communication into seven layers. The seven layers of transmission. It is reliable to send message. This layer has
2)Sender: Sender is the device that has the data and function are provided by a combination of applications, two sub-layers, the logical link control layer and the
needs to send the data to others device connected to operating systems, network card device drivers and Media Access Control Layer.
network. networking hardware that enable a system to put a signal 3)The Network Layer: It routes the signal through
3)Receiver: A receiver is the device which is excepting the on a network cable or out over Wi-fi or other wireless different channel to the other end. It acts as a network
data from others device on the network. protocol). controller. It decides by which route data should take. It
4)Transmission media: In order to transfer data from one Each layer covers different network activities, equipment, divides the outgoing messages into packets and to
device to another device we need a transmission media or protocols. The OSI layers may be summarized by: assemble incoming packets into messages for higher
such as wires, cables, radio waves etc. 1)Physical Layer: The physical layer is the actual cable, levels. This layer also determines the route from the
5)Protocol: A protocol is a set of rules that are agreed by fibers, cards, switches, and other mechanical and source to the destination computer. Its determiners
both sender and receiver, without protocol two device electrical equipment that make up a network. This is the which path the data should take base on network
can be connected to each other but they cannot layer that transforms digital data into signals that can be conditions, priority of service, and other factors. It also
communicate. In order to establish a reliable sent down a wire to transmit data. These signals are often manages traffic problem on the network, such as
communication or data sharing between two different electrical but, as in the case of fiber optics, they can also switching and routing a packet and controlling the
device we need set of rules that are called protocol. be non-electrical signals such as optics or any other type congestion of data.
Example, http and https are the two-protocol used by of pulse that can be digitally encoded. It activates,
web browsers to get and post the data to internet. maintain and deactivate the physical connection. Voltage

#Firewall: A firewall is a software utility or hardware #OSI (Open System Interconnection) VS TCP/IP It has 7 layers It has 4 layers
device that acts as a filter for data entering or leaving a OSI TCP/IP Model #Transmission Media: Transmission media refer to the
network or computer. You could think of a firewall as a OSI provides layer TCP/IP model is more physical pathways through which data is transmitted
security guard that decides who enters or exits a building. functioning and also defines based on protocols and between devices in a network. It includes wired media
A firewall work by blocking or restricting network ports. functions of all the layers protocols are not flexible such as twisted pair cables, coaxial cables, and fiber optic
Firewalls are commonly used to help prevent with other layers. cables, as well as wireless media such as radio waves,
unauthorized access to both company and home In OSI model the transport In TCP/IP model the microwave, infrared, and satellite communication. The
networks. #There are two types: layer guarantees the delivery transport layer does not
choice of transmission media depends on factors such as
1)Software Firewalls: These firewalls are installed on a of packets guarantees delivery of
distance, data transfer rate, cost, and reliability. Here are
computer or a server and are typically included as part of packets.
the operating system or as a separate software Follows horizontal approach Follows vertical approach some examples of guided transmission media:
application. They can be configured to protect a single OSI model has a separate TCP/IP does not have a 1)Twisted pair cables: Twisted pair cables are the most
computer or a group of computers on a network. presentation layer separate presentation layer common type of guided transmission media used in local
Software-based firewalls can provide protection against OSI is a general model TCP/IP model cannot be area networks (LANs). They consist of two copper wires
inbound and outbound traffic and can be customized to used in any other twisted together in pairs and are available in two types:
block or allow specific types of traffic. application. unshielded twisted pair (UTP) and shielded twisted pair
2)Hardware Firewalls: Hardware firewalls are physical Network layer of OSI model The Network layer in (STP). UTP cables are used in most Ethernet networks,
devices that are installed on a network to protect provide both connection TCP/IP model provides while STP cables are used in environments where there is
multiple computers or devices. They are designed to oriented and connectionless connectionless service.
a high level of electromagnetic interference.
handle large amounts of traffic and can provide faster service.
and more reliable protection than software-based OSI model has a problem of TCP/IP model does not fit 2)Coaxial cables: Coaxial cables are thicker than twisted
firewalls. Hardware-based firewalls are typically more fitting the protocols in the any protocol pair cables and have a copper core surrounded by a layer
expensive than software-based firewalls and are used by model of insulation, a braided shield, and an outer jacket. They
larger organizations or businesses that require more Protocols are hidden in OSI In TCP/IP replacing are commonly used for cable TV networks and can
robust security solutions. model and are easily protocol is not easy. support higher data transfer rates than twisted pair
replaced as the technology cables.
changes

3)Fiber optic cables: Fiber optic cables use light to #Role of Switches in networks: A Switch is an intelligent so, there is lack of security in the Hub. The network Hubs
transmit data over long distances. They consist of thin device that works in the data link layer. The term are outdated and are out of the market.
glass or plastic fibers that are surrounded by a protective intelligent refers to the decision-making capacity of the #Role of repeaters in Networks: A repeater is a device
coating and an outer jacket. Fiber optic cables can switch. since it works in the Data link layer, It has similar to the Hub, but has additional features. It also
transmit data at very high speeds and are commonly used knowledge of the MAC addresses of the ports in the works in the physical layer. The repeaters are used in
in long-distance communication systems such as those network. If data has to be sent from Computer A to places where amplification of input signal is necessary.
used by internet service providers (ISPs). Computer B, then, the data is transferred to the but, the kind of amplification done by the repeater is
#Role of Router in networks: A router is connected to at Computer B only, and not any other computers connected different from the regular amplification by amplifiers. The
least two networks and decides which way to send each to the networks. Hence, it establishes a link between the regular amplifies everything fed on it. That means, If the
information packet based on its current understanding of Sender and receiver based on the MAC addresses. This input signal has noise induced into it, both the desired
the state of the networks it is connected to. A router is a also means that when data is being sent from A to B, signal and noise signal are together amplified. But, in the
device that forwards data packets along networks. A Computer C can establish a link with computer D and case of a repeater, it regenerates the input signal, and
router is connected to at least two networks, commonly communication can take place between them. so, amplifies only the desirable signal. Hence, the noise
two LANs or WANs or a LAN and its ISP’s network. Routers simultaneous data transfer is possible in switch. component of the signal is eliminated.
are located or more networks connect. A router may It also to be noted that a switch is a secure device, The repeaters are necessary since, during the
create or maintain a table of the available routes and because it sends information only to the desired transmission of the signal over a long distance, the signal
their conditions and use this information along with destinations, and also certain security features such as has attenuation, delay distortion and noise, which leads in
distance and cost algorithms to determine the best route firewalls can be implemented in the switches. loss of data. Hence, in order to prevent this, the
for a given packet. Typically, a packet may travel through a #Role of Hub in Networks: A hub works in the physical regenerative repeaters are used.
number of networks points with routers before arriving at layer of the OSI model. It is basically a non-intelligent #Role of Switches in Networks: A Switch is an intelligent
its destination. Routing is a function associated with the device, and has no decision-making capability, what a Hub device that works in the data link layer. The term
networks layer (layer3) in the standard model of the basically does it take the input data from one of the ports intelligent refers to the decision-making capacity of the
network programming, the Open System Interconnection and broadcast the information to all other ports Switch. Since it works in the Data Link Layer, it has
(OSI) model. connected to the network. knowledge of the MAC addresses of the ports in the
network.
If data has to be sent from Computer A to Computer B, #Role of Gateway in networks: A gateway is a device #Ethernet IEEE 802.3(CSMA/CD) Local Area Network
then the date is transferred to the Computer B only, and used to connect networks using different protocols. (LAN) Protocols: The IEEE 802.3 architecture is a set of
not to any other computers connected to the network. Gateways operate at the network layer of the OSI model. standards that defines the physical and data link layers of
Hence, it establishes a link between the sender and the In order to communicate with a host on another network, the Ethernet local area network (LAN). This architecture
receiver on the MAC addresses. This also means that an IP host must be configured with a route to the uses the Carrier Sense Multiple Access with Collision
when data is being sent from A to B, Computer C can destination network. If a configuration route is not found, Detection (CSMA/CD) protocol to manage the flow of
the host uses the gateway (default IP router) to transmit data between devices on the network.
establish with computer D and communication can take
the traffic to the destination host. The default t gateway
place between them.so, simultaneous data transfer is The CSMA/CD protocol determines when a device can
is where the IP sends packets that are destined for
possible in a switch. transmit data onto the network. Before transmitting, the
remote networks. If no default gateway is specified,
device listens to the network to check if there is any
#Role Of Bridge in networks: A bridge is also device communication is limited to the local network. Gateway
ongoing transmission. If the network is idle, the device
which works in the Data Link Layer, but is more primitive receive data from a network using one type of protocol
transmits its data. But if another device starts
when compared to switch. initial bridges were used to stack, removes that protocol stack and repackages it with
transmitting at the same time, a collision occurs, and
connect only 2 LANs, but the most recent one performs the protocol stack that the other network can use.
both devices detect it. The devices then stop
similar operation as the switches. It also works on the A gateway is a network point that acts as an entrance to
transmitting, wait for a random amount of time, and try
principle of transfer information using the MAC addresses another network. E-mail gateways-for example, a
again. This process is called collision detection.
gateway that receives Simple Mail Transfer Protocol
of the ports.
(SMTP) e-mail, translates it into a standard X.400 format, The IEEE 802.3 architecture specifies the physical layer
It can be noted is that normal ADSL modem can be and forwards it to its destination. standards for Ethernet, such as the type of cables and
connected via bridging also. The only difference is that, connectors used to connect devices on the network. It
when bridging is used, each time the device has to also defines the data link layer standards for Ethernet,
connected to the internet; It has to dial to the internet such as the frame format, maximum frame size, and
and establish a connection. Also, a bridge alone cannot be error detection and correction mechanisms.
used to connect to the internet, because the bridge works In addition to CSMA/CD, IEEE 802.3 includes other
in the Data link layer, and has no knowledge of the IP protocols and technologies that improve the
Addresses, which are used in the internet. performance and reliability of Ethernet networks. For
example, it defines the use of switches to replace hubs,

which allow for faster and more efficient data The most important properties of public key encryption #Symmetric Key Encryption (private Key): An encryption
transmission. It also includes the use of virtual LANs scheme are – system in which the sender and receiver of a message
(VLANs) to separate network traffic and improve security 1)Different keys are used for encryption and decryption. share a single, common key that is used to encrypt and
This is a property which set this scheme decrypt the message is called Symmetric key encryption
#public Key Cryptography (Asymmetric Key Encryption):
different than symmetric encryption scheme.
Asymmetric cryptography (public key cryptography) uses
encryption that splits the key into two smaller keys. One ➢ Each receiver possesses a unique decryption key,
of the keys is made public and one is kept private. You generally referred to as his private key.
encrypt a message with the recipient's public key. The ➢ Receiver needs to publish an encryption key, referred
recipient can then decrypt it with their private key. And to as his public key.
they can do the same for you, encrypting a message with ➢ Some assurance of the authenticity of a public key is
your public key so you can decrypt it with your private needed in this scheme to avoid spoofing Symmetric key encryption algorithm uses same
key. by adversary as the receiver. Generally, this type of cryptographic keys for both encryption and decryption of
cryptosystem involves trusted third party cipher text. Symmetric-key systems are simpler and
which certifies that a particular public key belongs to a faster, but their main drawback is that the two parties
specific person or entity only. must somehow exchange the key in a secure way.
➢ Encryption algorithm is complex enough to prohibit Symmetric encryption is also known as private-key
attacker from deducing the plaintext encryption and secure-key encryption. The salient
from the cipher text and the encryption (public) key. features of cryptosystem based on symmetric key
Though private and public keys are related encryption are:
mathematically, it is not be feasible to calculate Persons using symmetric key encryption must share a
Asymmetric cryptography is usually implemented by the
the private key from the public key. In fact, intelligent common key prior to exchange of
use of one-way functions. In mathematic terms, these are
part of any public-key cryptosystem is information.1)) Keys are recommended to be changed
functions that are easy to compute in one direction but
in designing a relationship between two keys. regularly to prevent any attack on the system.2)) A robust
very difficult to compute in reverse. This is what allows
you to publish your public key, which is derived from your mechanism needs to exist to exchange the key between
private key. It is very difficult to work backwards and the communicating parties. As keys are required to be
determine the private key. changed regularly, this mechanism becomes expensive

and cumbersome. 3)) In a group of n people, to enable • Minimal CPU/Memory overhead • Ability to load balance between multiple links
two-party communication between any two persons, the • No bandwidth overhead (updates are not shared Disadvantages of Dynamic Routing
number of keys required for group is n × (n – 1)/2. 4)) between routers) • Updates are shared between routers, thus consuming
Length of Key (number of bits) in this encryption is • Granular control on how traffic is routed bandwidth
smaller and hence, process of encryption decryption is Disadvantages of Static Routing • Routing protocols put additional load on router
faster than asymmetric key encryption. 5)) Processing • Infrastructure changes must be manually adjusted CPU/RAM
power of computer system required to run symmetric • No “dynamic” fault tolerance if a link goes down • The choice of the “best route” is route” is in the hands
algorithm is less. • Impractical on large network of the routing protocol, and not the
#Routing: Routing is the process of selecting best paths in 2)Dynamic Routing: Dynamic routing protocols are the network administrator
a network. A simple definition of routing is "learning how applications which discover network destinations #Routing Algorithm: The main function of the network
to get from here to there". The main function of the dynamically. Routers will communicate the adjacent layer is routing packets from the source machine to the
network layer is routing packets from source to machine routers which informs the network to which each router destination machine. In most subnets, packets will
to the destination machine. The various Routing are: is connected. Dynamic routing protocols are supported by require multiple hops to make the journey. The only
1)Static Routing: A static routing table is created, software applications running on the routing device (the notable exception is for broadcast networks, but even
maintained, and updated by a network administrator, router) which dynamically learn network destinations and here routing is an issue if the source and destination
manually. A static route to every network must be how to get to them and also advertise those destinations are not on the same network. The algorithms that choose
configured on every router for full connectivity. This to other routers. This advertisement function allows all the routes and the data structures that they use are a
provides a granular level of control over routing and is the routers to learn about all the destination networks major area of network layer design. The routing algorithm
completely manageable on smaller networks. However, that exist and how to use those networks. Router using is that part of the network layer software responsible for
static routing is not fault-tolerant, as any change to the dynamic routing will 'learn' the routes to all networks deciding which output line an incoming packet should be
routing infrastructure (such as a link going down, or a that are directly connected to the device. Next, the router transmitted on. If the subnet uses datagrams internally,
new network added) requires manual intervention. will learn routes from other routers that run the same this decision must be made a new for every arriving data
Routers operating in a purely static environment cannot routing protocol. packet since the best route may have changed since last
seamlessly choose a better route if a link becomes Advantages of Dynamic Routing time. If the subnet uses virtual circuits internally, routing
unavailable, because no information is intelligently • Simpler to configure on larger networks decisions are made only when a new virtual circuit is
shared between routers. • Will dynamically choose a different (or better) route if a being set up.Routing algorithm can be grouped into two
Advantages of Static Routing link goes down major classes: non-adaptive and adaptive. Non-adaptive
algorithms do not base their routing decision on 4) The computers that are connected to the mainframe or the client/server model, in which the client makes a
measurements or estimates of the current traffic and server are called Clients or Nodes.5) These nodes are not service request and the server fulfills the request, the P2P
topology. Adaptive algorithms, in contrast, change their connected to each other; they are only connected to network model allows each node to function as both a
routing decisions to reflect changes in the topology, and server client and server.
usually the traffic as well. Peer-to-Peer Network Model (P2P Architecture) and
#Networking Models Client server Architecture (Diffferences): In its simplest
#Client-Server Model (Architecture): A client-server form, a peer-to-peer (P2P) network is created when two
network is designed for end-users, called clients, to or more PCs are connected and share resources without
access resources such as files, songs, video collections, or going through a separate server computer. Peer-to-peer
some other service from a central computer called a networks are quite common in small offices that do not
server. A server's sole purpose is to do what its name use a dedicated file server. All client versions of Windows,
implies - serve its clients! The type of computing system, Mac and Linux can function as nodes in a peer-to-peer
in which one powerful workstation serves the requests of network and allow their files to be shared. It is easy to
other systems, is an example of client server technology. install and so is the configuration of computers on this
Once the server has fulfilled the client's request, the network. P2P is more reliable as central dependency is Fig: Client-Server Fig: Peer-to-Peer
connection is terminated. Your Web browser is a client eliminated. Failure of one peer doesn’t affect the Networking Model Networking Model
program that has requested a service from a server; in functioning of other peers.
fact, the service and resource the server provided is the In case of Client –Server network, if server goes down
#Difference between Circuit Switching and Packet
delivery of this Web page. whole network gets affected. The over-all cost of building
Switching:
1)It is also known as and maintaining this type of network is comparatively
centralized computing.2) In very less. In this network, the whole system is
Circuit Switching Packet Switching
this type of system, multiple decentralized thus it is difficult to administer. Security in
computers are joined to one this system is very less viruses, spywares, Trojans, etc.
In-circuit switching has there In Packet switching
powerful mainframe Malwares can easily transmit over this P-2-P architecture.
are 3 phases: directly data transfer
computer.3) The server or Peer-to-peer (P2P) is a decentralized communications
mainframe computer has huge model in which each party has the same capabilities and i) Connection Establishment. takes place.
storage and processing power. either party can initiate a communication session. Unlike ii) Data Transfer.

Circuit Switching Packet Switching Circuit Switching Packet Switching #Connection oriented and connectionless service
Connection-oriented Service Connection-less Service
iii) Connection Released. Circuit switching is more Packet switching is less
reliable. reliable. Connection-oriented service Connection-less service is
In Packet switching, is related to the telephone related to the postal
In-circuit switching, each data each data unit just Less wastage of system. system.
Wastage of resources is more
unit knows the entire path knows the final resources as compared
in Circuit Switching
address which is provided by destination address to Circuit Switching Connection-oriented service Connection-less Service is
the source. intermediate path is is preferred by long and preferred by bursty
decided by the routers. It is not a store and forward It is a store and forward steady communication. communication.
technique. technique.
In Packet switching, data Connection-oriented Service Connection-less Service is
In-Circuit switching, data is is processed at all Transmission of the data is necessary. not compulsory.
processed at the source system intermediate nodes Transmission of the data is is done not only by the
only including the source done by the source. source but also by the Connection-oriented Service Connection-less Service is
system. intermediate routers. is feasible. not feasible.

The delay between data Congestion can occur during In connection-oriented


The delay between data units Congestion can occur In connection-less Service,
units in packet switching the connection establishment Service, Congestion is not
in circuit switching is uniform. during the data transfer Congestion is possible.
is not uniform. phase because there might be possible.
a case where a request is being phase; a large number
Resource reservation is the There is no resource made for a channel but the of packets comes in no
Connection-oriented Service Connection-less Service
feature of circuit switching reservation because channel is already occupied. time.
gives the guarantee of does not give a guarantee
because the path is fixed for bandwidth is shared reliability. of reliability.
data transmission. among users.

Connection-oriented Service Connection-less Service future growth of the Internet and provides relief for what #DHCP (Dynamic Host Configuration Protocol): Dynamic
was perceived as an impending shortage of network Host Configuration Protocol (DHCP) is a client/server
In connection-oriented In connection-less Service, addresses. IPv6 also supports autoconfiguration to help protocol that automatically provides an Internet Protocol
Service, Packets follow the Packets do not follow the correct. Pv6 features include: (IP) host with its IP address and other related
same route. same route. Supports source and destination addresses that are 128 configuration information such as the subnet mask and
bits (16 bytes) long. default gateway. RFCs 2131 and 2132 define DHCP as an
Connection-oriented services Connection-less Service ✓ No more NAT (Network Address Translation) Internet Engineering Task Force (IETF) standard based on
require a bandwidth of a requires a bandwidth of ✓ Auto-configuration Bootstrap Protocol (BOOTP), a protocol with which DHCP
✓ No more private address collisions shares many implementation details. DHCP allows hosts
high range. low range. to obtain required TCP/IP configuration information from
✓ Better multicast routing
a DHCP server.
Ex: TCP (Transmission Ex: UDP (User Datagram ✓ Simpler header format, Simplified, more efficient
#DNS (Domain Name System): DNS, or the Domain Name
Control Protocol) Protocol) routing
System, translates human readable domain names (for
✓ Built-in authentication and privacy support. example, www.amazon.com) to machine readable IP
Connection-less Service #IPV4-Subnetting: addresses (for example, 192.0.2.44). The Domain Name
Connection-oriented
does not require System resolves the names of internet sites with their
requires authentication.
authentication. underlying IP addresses adding efficiency and even
security in the process. The Domain Name System (DNS)
#IPV6 and its necessity: IPv6 (Internet Protocol version 6) is one of the foundations of the internet, yet most people
is a set of specifications from the Internet Engineering outside of networking probably don’t realize they use it
Task Force (IETF) that's essentially an upgrade of IP every day to do their jobs, check their email or waste
version 4 (IPv4). The basics of IPv6 are similar to those of time on their smartphones.
IPv4-- devices can use IPv6 as source and destination
addresses to pass packets over a network, and tools
like ping work for network testing as they do in IPv4, with
some slight variations. The most obvious improvement in
IPv6 over IPv4 is that IP addresses are lengthened from 32
bits to 128 bits. This extension anticipates considerable
#HTTP (Hypertext Transfer Protocol): Hypertext Transfer Wi-Fi alliance. It provides a standard way to connect with #Computer Network: A computer network is a group of
Protocol. It's the communication protocol you use when wireless network. Wi-Fi is the trademark of the Wi-Fi interconnected computers and other devices that can
you browse the web. to a fundamental level, when you alliance and used as a brand name for products using the communicate and share resources with each other.
visit a website, your browser makes an HTTP request to a IEEE 802.11 standards. Wi-Fi can be used on several types Networks can be used for a wide variety of purposes,
server. Then that server responds with a resource (an of devices like personal computers, video game console, such as sharing files and printers, accessing the internet,
image, video, or the HTML of a web page) - which your smart phones, digital camera, tablet computers etc. You and communicating with other people and devices.
browser then displays for you. This is HTTP's message- There are many different types of computer networks,
can use Wi-Fi to create a hotspot within the range of 20
based model. Every HTTP interaction includes a request including local area networks (LANs), wide area networks
meters (66 feet). It is less secure than wired connection
and a response. By its nature, HTTP is stateless. Stateless (WANs), and wireless networks. LANs are typically used
means that all requests are separate from each other. So, because the intruder does not need the physical in a single building or location, while WANs can span
each request from your browser must contain enough connection to use the Wi-Fi. large distances and connect multiple LANs together.
information on its own for the server to fulfill the request. #WiMax: stands for Worldwide Inter-operability for Wireless networks, also known as Wi-Fi networks, use
That also means that each transaction of the message- Microwave Access. This technology is based on IEEE radio waves to connect devices without the need for
based model of HTTP is processed separately from the 802.16. It is used to provide higher data rates with physical cables.
others. HTTP is a protocol which allows the fetching of increased coverage. It is based on MAN (Metropolitan #Network protocol is a set of rules and standards that
resources, such as HTML documents. It is the foundation Area Network) technology. Its range is up to 50 Km. It govern the communication between devices in a
of any data exchange on the Web and it is a client-server may provide speed up to 70 Mbps and it can operate in computer network. It defines the format and sequence
protocol, which means requests are initiated by the Non-Line-of-Sight. This technology is fast, convenient and of messages exchanged between devices, as well as the
recipient, usually the Web browser. cost effective. Architecture: procedures for establishing, maintaining, and
WIFI: Wireless Fidelity: WIFI also Spelled as Wi-Fi is a terminating connections.
local area wireless technology. It allows an electronic Protocols allow different devices and software
device to transfer data or connect to the internet using applications to communicate with each other, regardless
ISM radio bands. It is an underlying technology of wireless of the hardware and operating systems they use. They
local area network (WLAN). Wi-Fi allows computers and ensure that data is transmitted reliably, efficiently, and
other devices to communicate over a wireless network. securely across the network.
Examples of common network protocols include the
Wi-Fi network components are based on the one of the
(TCP/IP), which is used for communication.
802.11 standards developed by the IEEE and adopted by

Flow control is the management of data flow between #Bandwidth refers to the range of component #Inter-network is a collection of multiple interconnected
computers or devices or between nodes in a network so frequencies that is contained in a signal. If the minimum computer networks that use a common set of protocols
that the data can be handled at an efficient pace. Too and maximum components of frequencies that occur in a to communicate with each other. It allows devices on
much data arriving before a device can handle it causes modulated signal are and, then the bandwidth is given by different networks to communicate with each other as if
data overflow, meaning the data is either lost or must be When the bandwidth is larger, a larger number of they were on the same network, even if they are
retransmitted. Flow Control is one important design issue frequencies can be represented by a signal. For digital physically separated by great distances.
for the Data Link Layer that controls the flow of data devices, the bandwidth is usually expressed in bits per Internetworks can be created by connecting multiple local
between sender and receiver. second (bps) or bytes per second. For analog devices, the area networks (LANs) together using routers and other
#FLOW CONTROL is introduced in Data Link Layer. It also bandwidth is expressed in cycles per second, or Hertz networking devices. This creates a larger network known
works on several higher layers. The main concept of Flow (Hz). For instance, AM radio signals which have a as a wide area network (WAN) that spans multiple
Control is to introduce efficiency in Computer Networks. bandwidth of 9-10 kHz fail to transmit higher frequencies locations and can support a larger number of users.
Networks of any size have many different devices of sound that FM radios, having bandwidths of 100-200 Internetworks can be found in many different settings,
connected and each device has unique data transmission kHz, can transmit without a problem. such as corporate networks, academic institutions,
parameters. For instance, a router is built to manage the # Channel Bandwidth: Channel bandwidth refers to the government agencies, and the internet itself. They allow
routing of data whereas a desktop, at the receiving end of range of frequencies available for data transmission over users to access resources and communicate with each
that data, has far less sending/receiving abilities. These a communication channel, such as a wired or wireless other across multiple networks, making it easier to share
differences sending/receiving abilities may lead to conflict network. It is typically measured in Hertz (Hz) and information and collaborate on projects.
if the sender starts transmitting data faster than the represents the difference between the highest and lowest Internetworking also requires the use of common
receiving node’s ability. To counteract this problem, flow frequencies that can be transmitted over the channel. networking protocols and standards, such as the
control is used. This technique manages the flow of data Transmission Control Protocol/Internet Protocol (TCP/IP),
between nodes, keeping the sending/receiving In general, a wider channel bandwidth allows for greater which is used to enable communication across different
capabilities of both nodes as the primary concern. One- data throughput and faster transmission speeds. This is networks and devices. These protocols ensure that data is
Off is an example of a flow control protocol that sync the because a wider bandwidth allows for more data to be transmitted reliably, securely, and efficiently across the
sender with the receiver. It transmits an off signal when transmitted at once, which can result in higher data rates internetwork, regardless of the specific devices and
the receiver no longer has space in its buffer and and better performance. networks involved.
transmits on signal when the receiver can resume taking
data. One-Off works on asynchronous serial connections.

#A transaction refers to a sequence of messages 2. Fragmentation and reassembly: The network layer can #Virtual Private Network (VPN) is the technology that
exchanged between two devices or applications to fragment large packets into smaller packets for you can use to access the office or home network
perform a specific task or operation. For example, a transmission over networks with smaller maximum remotely and securely over the Internet, so that the
transaction might involve a client sending a request to a transmission unit (MTU) sizes, and reassemble the communication data is protected from sniffing or
server, and the server responding with the requested packets at the receiving end. hijacking by hackers. Typically, private networks are not
data. 3. Error detection and handling: The network layer accessible from the Internet or other public networks,
IP packets are the basic units of data in the internet includes error detection and correction mechanisms to because firewalls will block all unrequested traffic. To
protocol (IP) suite, which includes both IPv4 and IPv6. ensure that packets are transmitted reliably and without remotely access a private network over Internet, we need
These packets are formed by the transport layer of the errors. to use technology like Virtual Private Network (VPN).
OSI model, which takes data from the application layer 4. Congestion control: The network layer includes When the VPN connection is established between 2
and adds headers to prepare it for transmission over the mechanisms for managing network congestion and parties (between a VPN client and VPN gateway or
network. avoiding packet loss and delays. between 2 VPN gateways), a secured virtual tunnel will be
The transport layer encapsulates the application layer The transition from IPv4 to IPv6 involves the adoption of created with capability to encrypt the data (so no hacker
data into segments or datagrams, depending on the a new version of the IP protocol that uses 128-bit can see the data content), preserve data integrity (no
protocol being used (TCP or UDP). These segments or addresses instead of 32-bit addresses. This transition is data change during transmission) and ensure the
datagrams include header information such as the source necessary because the number of available IPv4 communication only happen between that 2
and destination port numbers, sequence numbers, and addresses is running out, while IPv6 provides a virtually authenticated parties.
checksums, which are used to ensure reliable delivery and unlimited number of addresses to support the growing #WWW (World Wide Web): World Wide Web, which is
error detection. number of devices and users on the internet. also known as a Web, is a collection of websites or web
The network layer then takes the segments or datagrams The transition from IPv4 to IPv6 involves several steps, pages stored in web servers and connected to local
created by the transport layer and adds additional including the adoption of IPv6 addressing, the creation of computers through the internet. These websites contain
headers, including the source and destination IP dual-stack networks that support both IPv4 and IPv6, and text pages, digital images, audios, videos, etc. Users can
addresses, to route the packet across the network.The the eventual phase-out of IPv4 in favor of IPv6. This access the content of these sites from any part of the
functions of the network layer include: transition is expected to take many years and requires world over the internet using their devices such as
1. Addressing and routing: The network layer uses IP coordination between network operators, software computers, laptops, cell phones, etc. The WWW, along
addresses to identify devices on the network and routes vendors, and end-users. with internet, enables the retrieval and display of text
packets to their destination. and media to your device. The building blocks of the Web
are web pages which are formatted in HTML and #Flow control is necessary in the transport layer of the #Security is critical in the field of computer networks for
connected by links called "hypertext" or hyperlinks and network stack to prevent the sender from overwhelming several reasons:
accessed by HTTP. These links are electronic connections the receiver with data. The transport layer is responsible 1.Confidentiality: Network security ensures that data
that link related pieces of information so that users can for providing end-to-end communication between transmitted over the network remains confidential and is
access the desired information quickly. Hypertext offers applications running on different hosts. only accessible to authorized individuals or systems.
the advantage to select a word or phrase from text and Without flow control, a fast sender could send data to a Encryption, access control, and other security
thus to access other pages that provide additional slow receiver faster than the receiver can process it. As a mechanisms are used to prevent unauthorized access to
information related to that word or phrase. A particular result, the receiver's buffer could overflow, causing data sensitive data.
collection of web pages that belong to a specific URL is loss or degraded performance. To prevent this, flow 2.Integrity: Network security ensures that data
called a website, e.g., www.google.com, etc. control mechanisms regulate the rate of data transmitted over the network is not altered or modified
#Two protocol of transport layer: transmission to match the receiver's ability to process the by unauthorized parties. Data integrity mechanisms such
1.Transmission Control Protocol (TCP): TCP is a data. as message digests, hash functions, and digital signatures
connection-oriented protocol that provides reliable and Flow control can be implemented using various are used to detect and prevent data tampering.
ordered delivery of data between applications. It ensures techniques, such as window-based flow control, rate- 3. Availability: Network security ensures that the
that data is transmitted without errors or loss, and uses a based flow control, and credit-based flow control. The network and its resources are available when needed.
three-way handshake to establish a connection between most commonly used flow control mechanism is the Denial-of-service (DoS) attacks, malware, and other
devices before data transfer begins. TCP also includes sliding window protocol, which uses a window size to threats can disrupt network services and cause
flow control and congestion control mechanisms to control the amount of data that can be sent before downtime, which can be costly for businesses and
optimize the use of network resources. receiving an acknowledgment from the receiver. organizations.
2. User Datagram Protocol (UDP): UDP is a In summary, flow control is essential in the transport 4.Compliance: Many industries have regulatory
connectionless protocol that provides best-effort delivery layer to ensure that the sender does not overwhelm the compliance requirements that dictate specific security
of data between applications. It does not provide receiver with data, thereby preventing data loss or standards that must be followed to protect sensitive data.
reliability or error checking, and does not establish a degraded performance. Network security helps organizations meet these
connection before data transfer begins. UDP is often used requirements and avoid penalties for noncompliance.
for real-time applications such as video streaming and 5. Reputation: Security breaches and data leaks can have
online gaming, where speed and low latency are more a significant impact on an organization's reputation.
important than reliability.

Confidentiality, integrity, and availability (CIA) are the traffic evenly across multiple servers or devices to #Router and a Repeater are both devices used in
three primary goals of network security, and maintaining prevent overloading and ensure that network services computer networking, Here are the differences between:
these goals requires a variety of measures and remain available.
1) A router is a device that connects multiple networks
technologies. 1)Confidentiality: ##Encryption: Encryption
#computer network is a group of computers linked to together and routes data between them based on IP
is used to protect data from unauthorized access.
each other that enables the computer to communicate addresses.
Encryption techniques such as symmetric encryption,
with another computer and share their resources, data,
asymmetric encryption, and hashing are commonly used 1)A repeater is a device that amplifies or regenerates a
and applications. A computer network can be categorized
to secure data in transit and at rest. ##Access control: signal to extend its reach or improve its quality.
by their size. A computer network is mainly of four types:
Access control mechanisms such as firewalls, intrusion
1) Based on Size: ##Personal Area Network (PAN): A 2) A router operates at the network layer (Layer 3) of the
prevention systems, and user authentication are used to
network that spans a small area, such as a room or a OSI model and is responsible for forwarding data
ensure that only authorized users and systems have
building. ##Local Area Network (LAN): A network that between networks based on IP addresses.
access to sensitive data.2)Integrity: ##Message digests
connects devices within a small geographic area, such as
and hash functions: Message digests and hash functions 2)A repeater operates at the physical layer (Layer 1) of
a home, office, or campus. ##Metropolitan Area
are used to verify the integrity of data by creating a fixed- the OSI model and is responsible for amplifying or
Network (MAN): A network that spans a city or
size message digest or hash value of the original data. Any regenerating signals on a network
metropolitan area. ##Wide Area Network (WAN): A
alteration to the data will result in a different digest or 3)A router can cover a large geographic area and connect
network that covers a large geographical area, such as a
hash value, alerting the receiver to the tampering. multiple networks together.
country or the entire world.
##Digital signatures: Digital signatures are used to verify
the authenticity and integrity of digital documents or 2) Based on Topology: ##Bus Network: A network where 3)A repeater is typically used to extend the reach of a
messages. A digital signature provides proof of the all devices are connected to a common backbone or bus. network or improve its signal quality in a limited area,
identity of the signer and ensures that the document has ##Star Network: A network where all devices are such as a building or a room.
not been tampered with.3)Availability: #Redundancy: connected to a central hub or switch. ##Ring Network: A 4)A router can improve network performance by
Redundancy is used to ensure that network services are network where devices are connected in a circular ring, directing traffic between networks and providing network
available even if some components fail. Redundant and data flows in one direction around the ring. ##Mesh services such as QoS (
servers, network devices, and power supplies are Network: A network where devices are connected to
common examples of redundancy in networks. ##Load multiple other devices, forming a mesh of connections. 4) A repeater can improve signal strength and quality, but
balancing: Load balancing is used to distribute network it does not affect the performance of the network itself.

You might also like