0% found this document useful (0 votes)
16 views

Computer Network SBI SO

Computer Network SBI SO notes
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

Computer Network SBI SO

Computer Network SBI SO notes
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Computer Network

3. Networking

- Types of Networks (LAN, WAN, MAN etc)

- Network Topologies (Ring , Mesh, Bus, Star, etc)

- Network Devices (Hub, Bridge, Routers, Gateway, etc)

- OSI Data Model, TCP/IP Model

- Subnets and Supernets

- UDP, TCP, sockets and ports.

- IPv4 vs IPv6

- Classless inter-domain routing.

- IP support protocols (ARP, DHCP, ICMP), Network Address Translation (NAT)

- Application layer protocols: DNS, SMTP, HTTP, FTP, etc.

- Internet Application Protocols (FTP, Telnet, SMTP, SNMP, POP3 etc).

- Different types of Network Security Protections:

o Firewall, Access Control, Remote Access VPN

o Types of Firewall

o Access Contro
Computer Network Architecture
Peer-To-Peer network

o Peer-To-Peer network is a network in which all the computers are linked together with equal
privilege and responsibilities for processing the data.

Client/Server Network

o The central controller is known as a server while all other computers in the network are
called clients.

Types of Networks (LAN, WAN, MAN etc)


https://www.youtube.com/watch?v=n0iaPtsnmxQ

Network Topologies (Ring , Mesh, Bus, Star, etc)

Comparison: Full Mesh vs. Partial Mesh

Feature Full Mesh Partial Mesh

Fewer ports, based on partial


Number of Ports Each device has (n - 1) ports
connections

Number of Fewer cables, depending on


n(n - 1) / 2 cables
Cables connections

Moderate to high (some


Reliability Very high (multiple redundant paths)
redundancy)

Very high (expensive in hardware and Moderate (less expensive than full
Cost
maintenance) mesh)

Large networks with budget


Use Case Critical systems (e.g., WAN, military)
constraints

Comparison Table

Topology Ports per Device Cables Reliability Cost

Bus 1 1 main cable Low (single point of failure) Low (minimal cables)

Ring 2 n cables Low (unless dual-ring) Moderate

1 per device, n for High (hub failure impacts


Star n cables Moderate
hub network)
Topology Ports per Device Cables Reliability Cost

n(n - 1) / 2 Very high (multiple Very high (lots of


Full Mesh (n - 1)
cables redundant paths) ports/cables)

Partial Varies (fewer than Fewer than full


Moderate to high Moderate
Mesh full mesh) mesh

1 per device, n for Backbone + star Moderate (backbone failure


Tree Moderate to high
backbone cables impacts network)

Part 1 https://www.youtube.com/watch?v=uDulBxDb7GM&t=65s

part 2 https://www.youtube.com/watch?v=7t0YJWTjmdI

Network Devices (Hub, Bridge, Routers, Gateway, etc


1. Hub https://www.youtube.com/watch?v=3N5a9cHYzCM

 Function: A basic networking device that connects multiple devices in a network but does
not filter data.

Key Characteristics:

 Data Handling: Forwards broadcast signals to all ports, even if the data is not intended for
all devices.

 Filtering: No filtering—sends data to all connected devices.

 Collision Domain: All devices connected to a hub are in the same collision domain, meaning
that collisions occur frequently.

 Full Duplex: Does not support full duplex; can only handle one transmission at a time.

Use Case:

 Suitable for very small, low-traffic networks where cost is the primary concern, and
performance is not critical.

2. Bridge https://www.youtube.com/watch?v=dDP36_ZBs6A

 Function: Connects and segments a network, reducing traffic by filtering data based on MAC
addresses.

Key Characteristics:

 Data Handling: Forwards data to the correct segment based on the destination MAC
address.

 Filtering: Filters traffic—only forwards data to the appropriate network segment.

 Collision Domain: Bridges help reduce collisions by breaking up the network into separate
collision domains.

 Full Duplex: Operates in half-duplex mode.

Use Case:

 Useful for smaller networks where you want to improve efficiency by segmenting the
network.
3. Switch

 Function: Directs data to specific devices by learning and using MAC addresses, thus
improving network efficiency.

Key Characteristics:

 Data Handling: Uses unicast, multicast, or broadcast to forward data only to the intended
recipient (MAC address filtering).

 Filtering: Intelligent filtering based on MAC addresses, allowing devices to communicate


without unnecessary data being sent to others.

 Collision Domain: Each connected device has its own collision domain, meaning no collisions
occur.

 Full Duplex: Supports full-duplex communication, allowing devices to send and receive data
simultaneously.

Use Case:

 Ideal for modern office networks where performance, scalability, and security are important.

4. Router

 Function: Routes data between different networks by using IP addresses and determines the
best path for the data.

Key Characteristics:

 Data Handling: Forwards data between different networks, using routing tables and IP
addresses to determine the best route.

 Filtering: Filters based on IP addresses to route data to its destination network.

 Collision Domain: Creates separate collision and broadcast domains for each connected
network.

 Full Duplex: Supports full duplex for efficient communication between networks.

Use Case:

 Used to connect multiple networks (e.g., LAN to WAN) and is critical for internet
connections.

5. Gateway
 Function: A protocol converter that allows communication between networks that use
different protocols.

Key Characteristics:

 Data Handling: Translates data between different network protocols, making it possible for
systems with different architectures to communicate.

 Filtering: Can apply security policies and protocol filtering based on the application layer
protocols.

 Collision Domain: Operates independently of collision domains, as it works on inter-network


communication.

Use Case:

 Used in heterogeneous networks to connect systems that use different communication


protocols.

6. Modem

 Function: Converts digital data from a computer to analog signals for transmission over
traditional phone lines and vice versa.

Key Characteristics:

 Data Handling: Modulates and demodulates signals, allowing data to travel over long-
distance analog networks.

 Filtering: No filtering—acts as a translator between digital and analog communication.

 Collision Domain: Operates outside collision domains since it works at the physical layer to
enable data transmission over telephone networks.

Use Case:

 Essential for internet access via DSL or phone lines.

7. Repeater

 Function: A device that amplifies or regenerates signals to extend the distance a signal can
travel.

Key Characteristics:

 Data Handling: Simply boosts the strength of the signal—does not filter or alter the data.

 Filtering: No filtering—forwards everything it receives.

 Collision Domain: Operates at the physical layer, so it doesn’t create new collision domains.

Use Case:

 Used in long-distance networks to maintain signal integrity.


8. Access Point (AP)

 Function: Allows wireless devices to connect to a wired network using Wi-Fi.

Key Characteristics:

 Data Handling: Provides wireless access to the network by acting as a bridge between the
wired and wireless networks.

 Filtering: Filters data based on wireless client addresses.

 Collision Domain: Each wireless device is in the same collision domain unless the access
point is configured to use separate channels.

Use Case:

 Used to provide wireless connectivity in home, office, or public networks.

9. Firewall

 Function: Monitors and controls network traffic, enforcing security rules to protect against
unauthorized access.

Key Characteristics:

 Data Handling: Filters data based on predefined security rules, allowing or blocking traffic.

 Filtering: Can filter traffic based on IP addresses, ports, protocols, and even the application
layer data.

 Collision Domain: Operates at higher layers, so it doesn’t deal with collision domains but
manages traffic security.

Use Case;

 Essential for network security, used to protect networks from cyber-attacks


andunauthorized access.

Comparison Table (with Filtering and Forwarding)


Device OSI Layer Function Filtering Forwarding Use Case

Connects
Layer 1 devices, Small, low-cost
Hub No filtering Broadcasts all signals
(Physical) broadcasts networks
data

Divides
Filters based
Layer 2 (Data network, Small-to-medium
Bridge on MAC Forwards to correct segment
Link) reduces LANs
addresses
collisions

Directs data Filters based


Layer 2 (Data Most modern
Switch using MAC on MAC Unicast/multicast/broadcast
Link) networks
addresses addresses

Routes data Filters based Connects LANs to


Layer 3
Router between on IP Forwards between networks WAN or the
(Network)
networks addresses internet

Protocol
Connecting
Layer 7 translation Filters based Forwards to different
Gateway different network
(Application) between on protocol protocols
architectures
networks

Converts
Internet
Layer 1 digital signals Forwards data after
Modem No filtering connection via
(Physical) to analog and modulation
telephone lines
vice versa

Amplifies
signals to Extends network
Layer 1
Repeater extend No filtering Forwards everything over long
(Physical)
network distances
distance

Provides
Filters based
wireless
Access Layer 2 (Data on wireless Forwards between wireless Wireless network
access to a
Point Link) client and wired devices connectivity
wired
addresses
network

Filters based Network security


Secures
on security for home or
Firewall Layer 3 & 7 network Forwards allowed traffic
rules (IP, enterprise
traffic
ports) environments

The Transmission Control Protocol/Internet Protocol (TCP/IP) model came before the Open Systems
Interconnection (OSI) model, and it has five layers:
1. Application layer

2. Transport layer

3. Network access layer

4. Network interface layer

5. Hardware layer

Physical Datalink Network Transport Session Prese

The OSI model has the following layers(Person Do Not Throw Sauses Pizzza
Away)

1. Physical. This consists of a data connection between a device generating data and the
network.

2. Datalink. The datalink layer is the point-to-point connection that transmits the data to the
network layer.

3. Network. In the network layer, the data gets its address and routing instructions in
preparation for its journey across the network.

4. Transport. In the transport layer, the data hops between different points on the network on
its way to its destination.

5. Session. The session layer has a connection that manages the sessions happening between
applications.

6. Presentation. The presentation layer is where data gets encrypted and decrypted and
converted into a form that is accessible by the application layer,

7. Application. In the application layer, an application, such as an internet browser, gets the
data and a user can then interact with it.
Here’s a simplified explanation of the key networking concepts you mentioned, with a focus on the
kind of knowledge typically needed for a multiple-choice exam (MCQ):

1. IP Support Protocols:

These protocols help the Internet Protocol (IP) function properly:

 ARP (Address Resolution Protocol):

o Maps an IP address (like a phone number) to a physical address (like a home address,
known as MAC address).

o Example: If your computer wants to send data to another computer, ARP finds out
the physical (MAC) address corresponding to the IP address.

 DHCP (Dynamic Host Configuration Protocol):

o Automatically assigns IP addresses to devices on a network.

o Example: When your phone connects to Wi-Fi, DHCP gives it an IP address without
you having to manually set it.

 ICMP (Internet Control Message Protocol):

o Used for sending error messages and operational information.

o Example: The ping command uses ICMP to check if a device is reachable over the
network.

2. Network Address Translation (NAT):

 NAT translates private IP addresses (used inside a local network) into a public IP address for
internet communication.

o Example: When multiple devices (like phones, laptops) use the same home internet
connection, NAT helps them share one public IP address.

3. Application Layer Protocols:

These protocols are used by applications to send and receive data over the network:

 DNS (Domain Name System):

o Translates human-friendly domain names (like google.com) into IP addresses (which


computers understand).

 SMTP (Simple Mail Transfer Protocol):

o Used to send emails.

o Example: When you send an email through Gmail, it uses SMTP.

 HTTP (HyperText Transfer Protocol):

o Used for browsing the web. When you type a URL in your browser, HTTP is used to
fetch the web page.

 FTP (File Transfer Protocol):


o Used to transfer files between a client and server.

o Example: Uploading files to a website often uses FTP.

4. Internet Application Protocols:

These are specific protocols used by internet applications for different tasks:

 FTP (File Transfer Protocol):

o Transfers files between two computers on a network.

 Telnet:

o Provides a way to remotely control another computer over a network.

 SMTP (Simple Mail Transfer Protocol):

o Sends emails between email servers.

 SNMP (Simple Network Management Protocol):

o Manages devices on a network (like routers, switches).

 POP3 (Post Office Protocol 3):

o Downloads emails from a mail server to your computer.

o Example: If you use an email client like Outlook to download your emails, it often
uses POP3.
1. Network Security Protections:

 Firewall:

o A firewall is a security device (software or hardware) that monitors and controls


incoming and outgoing network traffic based on security rules.

o It acts like a barrier between your internal network and untrusted external networks
(like the internet).

o Example: If a hacker tries to access your network, the firewall can block them based
on rules.

 Access Control:

o Determines who is allowed to access resources (like files, applications, or systems) in


a network.

o Access control can be Role-Based (based on user roles), Discretionary (controlled by


the resource owner), or Mandatory (based on a strict policy).

 Remote Access VPN (Virtual Private Network):

o Provides secure access to a private network over the internet.

o Example: Employees working from home use a VPN to securely connect to their
company’s network.

2. Types of Firewalls:

 Packet-Filtering Firewall:

o Analyzes data packets (small chunks of data) and decides whether to allow or block
them based on source/destination IP addresses, ports, and protocols.

o Example: A packet-filtering firewall may allow web traffic (HTTP on port 80) but block
file-sharing traffic.

 Stateful Inspection Firewall:

o Keeps track of active connections and only allows packets that are part of a valid
connection.

o Example: It checks if incoming data is part of an existing, trusted session.

 Proxy Firewall:

o Acts as an intermediary between users and the internet by inspecting all traffic and
providing additional security features like content filtering.

o Example: A proxy firewall can block access to certain websites based on company
policies.

 Next-Generation Firewall (NGFW):

o Combines traditional firewall functionality with advanced features like deep packet
inspection, intrusion prevention, and application-level filtering.
o Example: An NGFW can identify and block malware, even if it’s hidden within regular
network traffic.

3. Access Control:

 Role-Based Access Control (RBAC):

o Access is granted based on the role of the user (e.g., admin, user, guest).

o Example: A system admin might have access to all files, while a guest user might only
have read access to a specific folder.

 Discretionary Access Control (DAC):

o The owner of the resource decides who gets access and what permissions they have.

o Example: You own a file, and you decide which users can read, write, or modify it.

 Mandatory Access Control (MAC):

o Access is controlled by a central authority based on strict security policies. Users


cannot change access permissions on their own.

o Example: In a military system, only authorized users with the right security clearance
can access certain files, no matter what.

You might also like