Computer Network SBI SO
Computer Network SBI SO
3. Networking
- IPv4 vs IPv6
o Types of Firewall
o Access Contro
Computer Network Architecture
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.
Client/Server Network
o The central controller is known as a server while all other computers in the network are
called clients.
Very high (expensive in hardware and Moderate (less expensive than full
Cost
maintenance) mesh)
Comparison Table
Bus 1 1 main cable Low (single point of failure) Low (minimal cables)
Part 1 https://www.youtube.com/watch?v=uDulBxDb7GM&t=65s
part 2 https://www.youtube.com/watch?v=7t0YJWTjmdI
Function: A basic networking device that connects multiple devices in a network but does
not filter data.
Key Characteristics:
Data Handling: Forwards broadcast signals to all ports, even if the data is not intended for
all devices.
Collision Domain: All devices connected to a hub are in the same collision domain, meaning
that collisions occur frequently.
Full Duplex: Does not support full duplex; can only handle one transmission at a time.
Use Case:
Suitable for very small, low-traffic networks where cost is the primary concern, and
performance is not critical.
2. Bridge https://www.youtube.com/watch?v=dDP36_ZBs6A
Function: Connects and segments a network, reducing traffic by filtering data based on MAC
addresses.
Key Characteristics:
Data Handling: Forwards data to the correct segment based on the destination MAC
address.
Collision Domain: Bridges help reduce collisions by breaking up the network into separate
collision domains.
Use Case:
Useful for smaller networks where you want to improve efficiency by segmenting the
network.
3. Switch
Function: Directs data to specific devices by learning and using MAC addresses, thus
improving network efficiency.
Key Characteristics:
Data Handling: Uses unicast, multicast, or broadcast to forward data only to the intended
recipient (MAC address filtering).
Collision Domain: Each connected device has its own collision domain, meaning no collisions
occur.
Full Duplex: Supports full-duplex communication, allowing devices to send and receive data
simultaneously.
Use Case:
Ideal for modern office networks where performance, scalability, and security are important.
4. Router
Function: Routes data between different networks by using IP addresses and determines the
best path for the data.
Key Characteristics:
Data Handling: Forwards data between different networks, using routing tables and IP
addresses to determine the best route.
Collision Domain: Creates separate collision and broadcast domains for each connected
network.
Full Duplex: Supports full duplex for efficient communication between networks.
Use Case:
Used to connect multiple networks (e.g., LAN to WAN) and is critical for internet
connections.
5. Gateway
Function: A protocol converter that allows communication between networks that use
different protocols.
Key Characteristics:
Data Handling: Translates data between different network protocols, making it possible for
systems with different architectures to communicate.
Filtering: Can apply security policies and protocol filtering based on the application layer
protocols.
Use Case:
6. Modem
Function: Converts digital data from a computer to analog signals for transmission over
traditional phone lines and vice versa.
Key Characteristics:
Data Handling: Modulates and demodulates signals, allowing data to travel over long-
distance analog networks.
Collision Domain: Operates outside collision domains since it works at the physical layer to
enable data transmission over telephone networks.
Use Case:
7. Repeater
Function: A device that amplifies or regenerates signals to extend the distance a signal can
travel.
Key Characteristics:
Data Handling: Simply boosts the strength of the signal—does not filter or alter the data.
Collision Domain: Operates at the physical layer, so it doesn’t create new collision domains.
Use Case:
Key Characteristics:
Data Handling: Provides wireless access to the network by acting as a bridge between the
wired and wireless networks.
Collision Domain: Each wireless device is in the same collision domain unless the access
point is configured to use separate channels.
Use Case:
9. Firewall
Function: Monitors and controls network traffic, enforcing security rules to protect against
unauthorized access.
Key Characteristics:
Data Handling: Filters data based on predefined security rules, allowing or blocking traffic.
Filtering: Can filter traffic based on IP addresses, ports, protocols, and even the application
layer data.
Collision Domain: Operates at higher layers, so it doesn’t deal with collision domains but
manages traffic security.
Use Case;
Connects
Layer 1 devices, Small, low-cost
Hub No filtering Broadcasts all signals
(Physical) broadcasts networks
data
Divides
Filters based
Layer 2 (Data network, Small-to-medium
Bridge on MAC Forwards to correct segment
Link) reduces LANs
addresses
collisions
Protocol
Connecting
Layer 7 translation Filters based Forwards to different
Gateway different network
(Application) between on protocol protocols
architectures
networks
Converts
Internet
Layer 1 digital signals Forwards data after
Modem No filtering connection via
(Physical) to analog and modulation
telephone lines
vice versa
Amplifies
signals to Extends network
Layer 1
Repeater extend No filtering Forwards everything over long
(Physical)
network distances
distance
Provides
Filters based
wireless
Access Layer 2 (Data on wireless Forwards between wireless Wireless network
access to a
Point Link) client and wired devices connectivity
wired
addresses
network
The Transmission Control Protocol/Internet Protocol (TCP/IP) model came before the Open Systems
Interconnection (OSI) model, and it has five layers:
1. Application layer
2. Transport layer
5. Hardware layer
The OSI model has the following layers(Person Do Not Throw Sauses Pizzza
Away)
1. Physical. This consists of a data connection between a device generating data and the
network.
2. Datalink. The datalink layer is the point-to-point connection that transmits the data to the
network layer.
3. Network. In the network layer, the data gets its address and routing instructions in
preparation for its journey across the network.
4. Transport. In the transport layer, the data hops between different points on the network on
its way to its destination.
5. Session. The session layer has a connection that manages the sessions happening between
applications.
6. Presentation. The presentation layer is where data gets encrypted and decrypted and
converted into a form that is accessible by the application layer,
7. Application. In the application layer, an application, such as an internet browser, gets the
data and a user can then interact with it.
Here’s a simplified explanation of the key networking concepts you mentioned, with a focus on the
kind of knowledge typically needed for a multiple-choice exam (MCQ):
1. IP Support Protocols:
o Maps an IP address (like a phone number) to a physical address (like a home address,
known as MAC address).
o Example: If your computer wants to send data to another computer, ARP finds out
the physical (MAC) address corresponding to the IP address.
o Example: When your phone connects to Wi-Fi, DHCP gives it an IP address without
you having to manually set it.
o Example: The ping command uses ICMP to check if a device is reachable over the
network.
NAT translates private IP addresses (used inside a local network) into a public IP address for
internet communication.
o Example: When multiple devices (like phones, laptops) use the same home internet
connection, NAT helps them share one public IP address.
These protocols are used by applications to send and receive data over the network:
o Used for browsing the web. When you type a URL in your browser, HTTP is used to
fetch the web page.
These are specific protocols used by internet applications for different tasks:
Telnet:
o Example: If you use an email client like Outlook to download your emails, it often
uses POP3.
1. Network Security Protections:
Firewall:
o It acts like a barrier between your internal network and untrusted external networks
(like the internet).
o Example: If a hacker tries to access your network, the firewall can block them based
on rules.
Access Control:
o Example: Employees working from home use a VPN to securely connect to their
company’s network.
2. Types of Firewalls:
Packet-Filtering Firewall:
o Analyzes data packets (small chunks of data) and decides whether to allow or block
them based on source/destination IP addresses, ports, and protocols.
o Example: A packet-filtering firewall may allow web traffic (HTTP on port 80) but block
file-sharing traffic.
o Keeps track of active connections and only allows packets that are part of a valid
connection.
Proxy Firewall:
o Acts as an intermediary between users and the internet by inspecting all traffic and
providing additional security features like content filtering.
o Example: A proxy firewall can block access to certain websites based on company
policies.
o Combines traditional firewall functionality with advanced features like deep packet
inspection, intrusion prevention, and application-level filtering.
o Example: An NGFW can identify and block malware, even if it’s hidden within regular
network traffic.
3. Access Control:
o Access is granted based on the role of the user (e.g., admin, user, guest).
o Example: A system admin might have access to all files, while a guest user might only
have read access to a specific folder.
o The owner of the resource decides who gets access and what permissions they have.
o Example: You own a file, and you decide which users can read, write, or modify it.
o Example: In a military system, only authorized users with the right security clearance
can access certain files, no matter what.