Ch. Computer Network
Ch. Computer Network
Network Architecture
● Scope: Covers a larger geographic area than a LAN but smaller than a WAN, such
as a city or a large campus.
● Features: High-speed connections that can span multiple buildings or sites within
a city.
● Typical Use: Connecting multiple LANs within a city or metropolitan area, often
used by organizations or city governments.
Network Models
1. Client-Server Model:
● Description: A network architecture where each device (peer) can act as both a
client and a server. Peers share resources and communicate directly with each
other.
● Characteristics:
○ Decentralized: No central server; each peer can provide and consume
resources.
○ Scalability: Easier to scale as new peers can join the network without
central coordination.
○ Resource Sharing: Peers share files, printers, or other resources directly.
● Use Cases: File-sharing networks, ad-hoc networks, and small office networks.
LAN Architecture/Standards
1. Bus Topology:
● Description: All devices are connected to a single central cable (the bus). Data
sent by a device travels along the bus to all other devices.
● Advantages: Simple to install and configure.
● Disadvantages: Difficult to troubleshoot, and a failure in the central cable can
bring down the entire network.
2. Ring Topology:
3. Star Topology:
Summary
These network architectures and models provide the foundation for designing and
implementing networks based on different needs and scales.
Connectivity and media are crucial components in network design, as they define how
devices connect and communicate over a network. Here’s an overview of network cables,
connectors, and their roles:
Network Cables
2. Coaxial Cables:
● RG-6: Commonly used for cable television and internet. Supports frequencies up
to 1 GHz.
● RG-59: Used for lower-frequency applications, such as analog video signals. Less
effective at higher frequencies compared to RG-6.
Network Connectors
1. Ethernet Connectors:
● RJ-45: The most common connector for twisted pair Ethernet cables (Cat5e, Cat6,
etc.). Used for connecting computers, switches, routers, and other network
devices.
● RJ-11: Used for telephone connections and can also be used in older networking
setups. Not typically used for Ethernet.
2. Coaxial Connectors:
● F-Type: Commonly used for cable television and broadband internet. Provides a
secure and reliable connection for coaxial cables.
● BNC (Bayonet Neill-Concelman): Used in older network setups, such as
10BASE2 (Ethernet over coaxial) and for video connections.
Summary
● Ethernet Cables: Include Cat5e, Cat6, Cat6a, Cat7, and Cat8, used for various
speeds and distances in LAN environments.
● Coaxial Cables: Include RG-6 and RG-59, used for cable television and internet.
● Fiber Optic Cables: Include Single-Mode Fiber (SMF) and Multi-Mode Fiber
(MMF), used for high-speed and long-distance communication.
● Connectors: Include RJ-45 for Ethernet, F-Type and BNC for coaxial cables, and
SC, LC, ST, and MTP/MPO for fiber optic cables.
Choosing the right cables and connectors ensures optimal performance and reliability for
network connections.
Here's an overview of the OSI and TCP/IP reference models, which are both frameworks
that define networking protocols and communication processes.
Number of 7 4
Layers
Layer Each layer has a specific, Combines some OSI layers (e.g.,
Functions unique function application, presentation, session are
all in the Application Layer)
Usage Mostly theoretical, useful for Widely used as the standard for
teaching and understanding internet and modern network
networking communications
Summary
● The OSI Model is a 7-layer conceptual framework that standardizes the functions
of a network communication system. It separates functions into layers, each with a
specific role.
● The TCP/IP Model is a 4-layer protocol suite that is practical and widely used in
the real world, particularly for internet communications. It consolidates some of
the OSI layers and focuses on the TCP/IP protocol stack.
Both models help network professionals understand and implement networking protocols
and guide the design and troubleshooting of networks.
3.4. Network Hardware (NIC, Repeater, Hub, Bridge, Access Points, Switch, Router,
and Gateway), their functions, features and configuration.
2. Repeater
● Function: A repeater is a device used to regenerate or replicate signals in a
network. It amplifies the incoming signal to extend the distance over which the
signal can be transmitted.
● Features:
○ Type: Simple, bidirectional.
○ Distance Extension: Used to extend the range of a network segment.
○ No Filtering: Does not filter traffic; it repeats all signals it receives.
● Configuration:
○ Typically plug-and-play with minimal configuration.
○ Can be set up by connecting it between two network segments that need to
be extended.
3. Hub
4. Bridge
● Function: Access points are networking devices that allow wireless devices to
connect to a wired network using Wi-Fi.
● Features:
○ Types: Standalone or controller-based.
○ Wireless Standards: Supports various Wi-Fi standards (e.g.,
802.11a/b/g/n/ac/ax).
○ Frequency Bands: Operates on 2.4 GHz and/or 5 GHz bands.
○ Security: Supports encryption standards like WEP, WPA, WPA2, and
WPA3.
● Configuration:
○ Requires configuring SSID, security settings, IP address (static or DHCP),
and channel selection.
○ Advanced configurations may include VLAN settings, QoS (Quality of
Service), and guest network setup.
6. Switch
7. Router
8. Gateway
● Function: A gateway is a device that acts as an entry and exit point between two
different networks, often with different protocols or architectures.
● Features:
○ Protocol Translation: Can translate between different network protocols
(e.g., IP to IPX, IPv4 to IPv6).
○ Application Layer: Operates at various layers, often at Layer 7
(Application Layer).
○ Security: Can perform functions like firewalls, proxies, and NAT.
● Configuration:
○ Configured based on the specific function it serves (e.g., internet gateway,
VoIP gateway).
○ Settings may include protocol translation, NAT, firewall rules, and access
control lists (ACLs).
Conclusion
These network hardware components play essential roles in establishing, managing, and
securing network connectivity. Proper understanding and configuration of these devices
ensure efficient, reliable, and secure communication within and between networks.
3.5. Common TCP and UDP ports, protocols, and their purpose
Here is an overview of common TCP and UDP ports, the associated protocols, and their
purposes. Understanding these ports and protocols is crucial for network configuration,
security, and troubleshooting.
110 POP3 (Post Office Protocol Retrieves emails from a mail server.
3)
143 IMAP (Internet Message Retrieves emails and maintains server folders.
Access Protocol)
443 HTTPS (HTTP Secure) Secure web traffic over SSL/TLS encryption.
445 SMB (Server Message Network file sharing and printer services on
Block) Windows networks.
993 IMAPS (IMAP Secure) Secure IMAP over SSL/TLS for retrieving
emails.
995 POP3S (POP3 Secure) Secure POP3 over SSL/TLS for retrieving emails.
443 QUIC (Quick UDP Internet Used for secure, low-latency transport in
Connections) HTTP/3.
500 IKE (Internet Key Exchange) Used in IPsec VPNs for key exchange.
170 L2TP (Layer 2 Tunneling Protocol) VPN tunneling protocol used with IPsec.
1
450 NAT-T (NAT Traversal for IPsec) Used for IPsec VPNs to traverse NAT
0 devices.
Some protocols use both TCP and UDP for different purposes.
67/6 DHCP (Dynamic Host Assigns and receives IP addresses (UDP only).
8 Configuration Protocol)
636 LDAPS (LDAP Secure) Secure version of LDAP for directory services.
● Common TCP Ports: Typically used for reliable data transmission, such as web
traffic (HTTP/HTTPS), email (SMTP, IMAP, POP3), file transfers (FTP), and
secure remote access (SSH, RDP).
● Common UDP Ports: Used for fast, connectionless communication where speed
is preferred over reliability, such as DNS queries, DHCP, TFTP, and streaming
protocols.
● Both TCP and UDP: Some ports, like those used by DNS or SIP, can use both
protocols, depending on the use case.
Conclusion
Understanding these common TCP and UDP ports and protocols is essential for
configuring and securing networks, as well as for effective troubleshooting and network
management.
3.6. Application of Network utilities (e.g. IPCONFIG, PING, TRACERT,
NSLOOKUP)
Network utilities are essential tools for diagnosing, configuring, and troubleshooting
network-related issues. Below are some of the most common network utilities, such as
IPCONFIG, PING, TRACERT, and NSLOOKUP, along with their applications:
● Description: A network utility that traces the route packets take from the source
(your computer) to the destination host, identifying each hop along the path.
● Applications:
○ Identify Network Path: Displays the path and each hop between the
source and the destination, which helps in diagnosing routing issues.
○ Measure Latency at Each Hop: Shows the time (latency) taken for
packets to reach each router (hop) along the path to the destination.
○ Locate Points of Failure: Helps identify where a network connection is
failing or slowing down, useful for troubleshooting connectivity problems.
○ Determine Network Topology: Provides insight into the routing paths
taken by packets across networks, helping network administrators
understand network topology.
● Description: A command-line tool used for querying the Domain Name System
(DNS) to obtain domain name or IP address mapping information.
● Applications:
○ DNS Query Testing: Allows users to query specific DNS servers to
retrieve DNS records (like A, MX, CNAME, TXT records).
○ Diagnose DNS Issues: Helps troubleshoot problems related to DNS
resolution, such as unreachable domain names or incorrect IP addresses.
○ Check Mail Server Configuration: Can be used to look up MX (Mail
Exchange) records to verify email server settings for a domain.
○ Verify DNS Server Configuration: Allows checking the configuration and
response of specific DNS servers, useful for diagnosing DNS-related issues.
Summary of Applications
NSLOOKU Queries DNS servers for Test DNS queries, diagnose DNS issues,
P domain name resolution. verify email server settings, check DNS
server configurations.
Conclusion
These network utilities are essential tools for network administrators and IT professionals
to diagnose, troubleshoot, and manage network environments. Understanding their
applications helps in maintaining network performance, security, and reliability.
3.7. Network cabling and cable testing
Network cabling forms the physical foundation of any network, providing the necessary
connections between devices. Proper selection, installation, and testing of network cables
are crucial for ensuring reliable and efficient network performance.
Network cables are primarily used to connect devices within a Local Area Network
(LAN), Wide Area Network (WAN), or other types of networks. The most common types
of network cabling are:
● Description: Twisted pair cables consist of pairs of insulated copper wires twisted
together to reduce electromagnetic interference (EMI) and crosstalk.
● Types:
○ Unshielded Twisted Pair (UTP): The most commonly used type for
LANs. UTP cables are not shielded, making them less expensive but more
susceptible to interference.
○ Shielded Twisted Pair (STP): Includes a shield (usually a metal foil or
braid) around the twisted pairs, providing better protection against EMI and
crosstalk but at a higher cost.
● Categories:
○ Category 5e (Cat5e): Supports up to 1 Gbps at 100 MHz; used for Ethernet
networks up to 100 meters.
○ Category 6 (Cat6): Supports up to 10 Gbps at 250 MHz; suitable for
gigabit Ethernet and 10G Ethernet over shorter distances (up to 55 meters).
○ Category 6a (Cat6a): Supports up to 10 Gbps at 500 MHz; can handle 10G
Ethernet over distances up to 100 meters.
○ Category 7 (Cat7): Supports up to 10 Gbps at 600 MHz; offers additional
shielding and is suitable for high-speed networking.
○ Category 8 (Cat8): Supports up to 40 Gbps at 2000 MHz; designed for
high-speed data centers and server farms over short distances (up to 30
meters).
b. Coaxial Cables
● Description: Coaxial cables consist of a central copper conductor, a layer of
insulating material, a metallic shield, and an outer insulating layer. The shielding
reduces EMI.
● Uses: Commonly used for cable television, broadband internet connections, and
older Ethernet networks (e.g., 10BASE2 and 10BASE5).
● Types:
○ RG-6: Used for cable television, satellite television, and broadband
internet.
○ RG-59: Used for short-distance video applications, such as CCTV.
● Description: Fiber optic cables transmit data as light signals through glass or
plastic fibers. They offer high bandwidth and are immune to EMI.
● Types:
○ Single-Mode Fiber (SMF): Uses a single light path for long-distance
communication; supports high bandwidth over distances up to 100 km or
more.
○ Multi-Mode Fiber (MMF): Uses multiple light paths; suitable for shorter
distances (up to 2 km) and applications like local area networks (LANs).
● Uses: Commonly used for backbone connections in networks, long-distance
telecommunications, and high-speed internet.
Cable testing is essential to ensure that network cabling is correctly installed and
functions as expected. Testing helps identify faults such as shorts, opens, miswiring, or
poor connections.
● Continuity Testing: Verifies that there are no breaks in the cable and that all
connections are intact.
● Wiremap Testing: Checks for wiring faults such as open circuits, short circuits,
split pairs, crossed pairs, or incorrect terminations.
● Length Testing: Measures the length of the cable to ensure it meets the required
specifications.
● Attenuation Testing: Measures signal loss along the length of the cable; higher
attenuation indicates poor signal quality.
● Crosstalk Testing: Measures electromagnetic interference between adjacent
cables. Two types are tested:
○ Near-End Crosstalk (NEXT): Interference measured at the transmitter end
of the cable.
○ Far-End Crosstalk (FEXT): Interference measured at the far end of the
cable.
● Return Loss Testing: Measures the amount of signal reflection due to impedance
mismatches in the cable.
● Network Performance Testing: Ensures that the installed cabling can support the
required network speed and bandwidth (e.g., 1 Gbps, 10 Gbps).
● Cable Tester: A handheld device used to check the integrity of network cables.
Basic testers can check for continuity, shorts, and wiremap issues, while advanced
testers can measure length, attenuation, and crosstalk.
● Certifier: A more advanced tool that performs comprehensive tests and provides
detailed certification reports for compliance with industry standards (e.g.,
TIA/EIA standards for twisted-pair cables).
● Time Domain Reflectometer (TDR): A device that measures the length of the
cable and identifies the location of faults by sending an electrical signal through
the cable and measuring the reflection.
● Optical Time Domain Reflectometer (OTDR): A specialized device for testing
fiber optic cables. It measures the length, loss, and signal quality, and identifies
faults such as breaks or bends.
● Plan the Cabling Layout: Ensure a well-organized cabling layout that follows
standards (e.g., TIA/EIA-568) and allows for future expansion.
● Use Proper Cable Management: Utilize cable management tools like cable trays,
conduits, and patch panels to keep cables organized and reduce stress on
connections.
● Maintain Proper Distance: Keep UTP cables away from sources of EMI, such as
power cables, fluorescent lights, and machinery.
● Ensure Proper Termination: Follow proper cable termination practices, using the
correct tools and connectors (e.g., RJ45) to avoid faulty connections.
● Label Cables and Ports: Label cables and network ports to simplify
troubleshooting and future maintenance.
● Perform Regular Cable Testing: Conduct regular cable tests during installation
and periodically afterward to ensure network reliability and performance.
● Document Test Results: Keep a record of cable test results to identify potential
issues and maintain compliance with standards.
Twisted Pair Copper cables with twisted wire Common in Ethernet LANs
(UTP/STP) pairs to reduce EMI (Cat5e, Cat6, Cat6a)
Conclusion
Proper selection, installation, and testing of network cabling are vital for ensuring a
reliable and high-performing network. Regular cable testing helps identify faults and
maintain optimal network performance.
ChatGPT
Network cabling forms the physical foundation of any network, providing the necessary
connections between devices. Proper selection, installation, and testing of network cables
are crucial for ensuring reliable and efficient network performance.
Network cables are primarily used to connect devices within a Local Area Network
(LAN), Wide Area Network (WAN), or other types of networks. The most common types
of network cabling are:
a. Twisted Pair Cables
● Description: Twisted pair cables consist of pairs of insulated copper wires twisted
together to reduce electromagnetic interference (EMI) and crosstalk.
● Types:
○ Unshielded Twisted Pair (UTP): The most commonly used type for
LANs. UTP cables are not shielded, making them less expensive but more
susceptible to interference.
○ Shielded Twisted Pair (STP): Includes a shield (usually a metal foil or
braid) around the twisted pairs, providing better protection against EMI and
crosstalk but at a higher cost.
● Categories:
○ Category 5e (Cat5e): Supports up to 1 Gbps at 100 MHz; used for Ethernet
networks up to 100 meters.
○ Category 6 (Cat6): Supports up to 10 Gbps at 250 MHz; suitable for
gigabit Ethernet and 10G Ethernet over shorter distances (up to 55 meters).
○ Category 6a (Cat6a): Supports up to 10 Gbps at 500 MHz; can handle 10G
Ethernet over distances up to 100 meters.
○ Category 7 (Cat7): Supports up to 10 Gbps at 600 MHz; offers additional
shielding and is suitable for high-speed networking.
○ Category 8 (Cat8): Supports up to 40 Gbps at 2000 MHz; designed for
high-speed data centers and server farms over short distances (up to 30
meters).
b. Coaxial Cables
Cable testing is essential to ensure that network cabling is correctly installed and
functions as expected. Testing helps identify faults such as shorts, opens, miswiring, or
poor connections.
● Continuity Testing: Verifies that there are no breaks in the cable and that all
connections are intact.
● Wiremap Testing: Checks for wiring faults such as open circuits, short circuits,
split pairs, crossed pairs, or incorrect terminations.
● Length Testing: Measures the length of the cable to ensure it meets the required
specifications.
● Attenuation Testing: Measures signal loss along the length of the cable; higher
attenuation indicates poor signal quality.
● Crosstalk Testing: Measures electromagnetic interference between adjacent
cables. Two types are tested:
○ Near-End Crosstalk (NEXT): Interference measured at the transmitter end
of the cable.
○ Far-End Crosstalk (FEXT): Interference measured at the far end of the
cable.
● Return Loss Testing: Measures the amount of signal reflection due to impedance
mismatches in the cable.
● Network Performance Testing: Ensures that the installed cabling can support the
required network speed and bandwidth (e.g., 1 Gbps, 10 Gbps).
● Plan the Cabling Layout: Ensure a well-organized cabling layout that follows
standards (e.g., TIA/EIA-568) and allows for future expansion.
● Use Proper Cable Management: Utilize cable management tools like cable trays,
conduits, and patch panels to keep cables organized and reduce stress on
connections.
● Maintain Proper Distance: Keep UTP cables away from sources of EMI, such as
power cables, fluorescent lights, and machinery.
● Ensure Proper Termination: Follow proper cable termination practices, using the
correct tools and connectors (e.g., RJ45) to avoid faulty connections.
● Label Cables and Ports: Label cables and network ports to simplify
troubleshooting and future maintenance.
● Perform Regular Cable Testing: Conduct regular cable tests during installation
and periodically afterward to ensure network reliability and performance.
● Document Test Results: Keep a record of cable test results to identify potential
issues and maintain compliance with standards.
Conclusion
Proper selection, installation, and testing of network cabling are vital for ensuring a
reliable and high-performing network. Regular cable testing helps identify faults and
maintain optimal network performance.
3.8. IP Addressing, subnet mask, gateway, DNS, WINS, static and automatic address
assignment
1. IP Addressing
2. Subnet Mask
● Definition: A 32-bit number used to divide an IP address into network and host
portions. It determines which portion of the IP address identifies the network and
which part identifies the specific device (host).
● Purpose:
○ Subnetting: Enables the creation of smaller, more efficient sub-networks
(subnets) within a larger network. This improves network performance and
security.
○ Network Communication: Helps devices determine if an IP address is on
the same local network or if the data should be routed through a gateway to
reach a different network.
● Common Subnet Masks:
○ 255.0.0.0 (/8): Used for Class A networks, supports 16,777,214 hosts per
network.
○ 255.255.0.0 (/16): Used for Class B networks, supports 65,534 hosts per
network.
○ 255.255.255.0 (/24): Used for Class C networks, supports 254 hosts per
network.
3. Gateway
● Definition: A device (typically a router) that serves as an entry and exit point for
traffic between different networks. It connects a local network to external
networks, such as the internet.
● Purpose:
○ Routing Traffic: Forwards data packets from the local network to other
networks (e.g., from a private LAN to the internet) and vice versa.
○ Default Gateway: The IP address of the router or device that routes traffic
to destinations outside the local network.
Term Description
IP Address Unique identifier for a device on a network (IPv4 or IPv6).
Conclusion
Switching and routing are two fundamental concepts in networking that ensure data
packets reach their correct destination efficiently and reliably. Switching operates
primarily at the data link layer (Layer 2) of the OSI model, while routing functions at the
network layer (Layer 3). Understanding the basic techniques behind both helps in the
effective management of network traffic.
1. Switching Techniques
Switching involves the process of forwarding data packets within a local area network
(LAN). A network switch is a device that connects multiple devices (such as computers,
printers, and servers) on the same network, allowing them to communicate with each
other.
a. Types of Switching
1. Circuit Switching:
○ Definition: Establishes a dedicated communication path between two
devices for the duration of a session.
○ Characteristics:
■ Continuous, dedicated bandwidth.
■ Typically used in telephony (PSTN) but less common in data
networks.
○ Advantages: Low latency once the circuit is established; predictable and
reliable.
○ Disadvantages: Inefficient use of resources; a dedicated path remains
reserved even when no data is being transmitted.
2. Packet Switching:
○ Definition: Data is broken down into packets, each of which is sent
independently across the network.
○ Characteristics:
■ Packets can take different paths to reach their destination.
■ Commonly used in LANs and the Internet.
○ Advantages: Efficient use of network resources; supports multiple
conversations simultaneously.
○ Disadvantages: Possible delays due to variable paths and congestion;
requires packet reassembly at the destination.
3. Message Switching:
○ Definition: Similar to packet switching, but the entire message is treated as
a single unit and is stored and forwarded by each node until it reaches its
destination.
○ Characteristics:
■ No direct connection is established; messages are temporarily stored
at each intermediate node.
○ Advantages: No need for a dedicated path; better resource utilization.
○ Disadvantages: Potential delays due to intermediate storage; less suitable
for real-time communication.
b. Switching Methods
1. Store-and-Forward Switching:
○ Description: The switch receives the entire data frame, checks it for errors
(using a checksum), and then forwards it to the appropriate destination port.
○ Advantages:
■ Error checking ensures only error-free frames are forwarded.
■ Suitable for networks where data integrity is a priority.
○ Disadvantages:
■ Higher latency due to the need to store and check the entire frame
before forwarding.
2. Cut-Through Switching:
○ Description: The switch begins forwarding a frame as soon as it reads the
destination address, without waiting for the entire frame to arrive.
○ Advantages:
■ Low latency; faster than store-and-forward switching.
○ Disadvantages:
■ No error checking; corrupted frames may be forwarded.
3. Fragment-Free Switching:
○ Description: The switch checks the first 64 bytes of each frame (where
most errors occur) before forwarding it. This is a compromise between
store-and-forward and cut-through switching.
○ Advantages:
■ Reduces the chance of forwarding corrupted frames while
maintaining relatively low latency.
○ Disadvantages:
■ Still less error-checking than store-and-forward.
2. Routing Techniques
Routing involves determining the best path for data packets to travel from a source to a
destination across interconnected networks. Routers are the devices responsible for this
process.
a. Routing Basics
1. Static Routing:
○ Definition: The network administrator manually configures routes in the
routing table.
○ Characteristics:
■ Used in smaller or simpler networks with predictable traffic patterns.
○ Advantages:
■ Simple, with no additional overhead; less susceptible to routing
loops.
■ Predictable, since routes do not change dynamically.
○ Disadvantages:
■ Not scalable; requires manual reconfiguration for any changes in the
network.
■ Does not automatically adapt to network failures or topology
changes.
2. Dynamic Routing:
○ Definition: Routers automatically learn and adapt routes using routing
protocols.
○ Characteristics:
■ Used in larger, more complex networks.
■ Routers exchange information using routing protocols like RIP,
OSPF, EIGRP, or BGP.
○ Advantages:
■ Automatically adjusts to changes in network topology, such as link
failures or new routers.
■ Scalable and suitable for complex networks.
○ Disadvantages:
■ Requires additional resources (CPU, memory) for processing routing
updates.
■ Can be more complex to configure and manage.
Store-and-Forward Receives entire data frame, checks for errors, then forwards.
Switching Low error risk but higher latency.
Distance Vector Routing protocols using distance metrics like hop count (e.g.,
Protocols RIP). Simple but slower convergence.
Link State Protocols Protocols using a network map to determine the shortest path
(e.g., OSPF). Fast convergence.
Hybrid Routing Combines distance vector and link state features (e.g., EIGRP).
Protocols Efficient and scalable.
Networking protocols like TCP and UDP ensure data is reliably transmitted across
networks. To achieve this, they use techniques like multiplexing, demultiplexing, flow
control, and congestion control. Understanding these concepts is fundamental to grasping
how data flows effectively in a network.
● Multiplexing is the process of combining multiple signals or data streams into one.
In networking, it involves combining data from multiple applications or
connections over a single network connection or transport layer protocol.
● Demultiplexing is the reverse process, where the data arriving at the destination is
separated and delivered to the appropriate application or service.
● Applications Requiring Speed: Ideal for applications that prioritize speed over
reliability, such as video streaming, online gaming, and VoIP (Voice over IP).
● Simple Query/Response Protocols: Used in protocols like DNS (Domain Name
System), where quick request/response cycles are more important than reliable
delivery.
1. Slow Start:
○ Description: TCP begins transmission at a low rate and gradually increases
the transmission rate until it detects congestion.
○ Mechanism:
■ The congestion window (cwnd) starts with a small size, usually one
Maximum Segment Size (MSS).
■ For each acknowledgment received, the congestion window size
increases exponentially (doubling each round trip time, or RTT).
○ Objective: Quickly find the available capacity of the network without
causing congestion.
2. Congestion Avoidance:
○ Description: Once the network's capacity is approached, TCP switches
from exponential growth to a more conservative linear growth.
○ Mechanism:
■ After reaching the slow start threshold (ssthresh), TCP increments
the congestion window size by one MSS per RTT.
■ If packet loss is detected (indicating congestion), the congestion
window size is reduced.
○ Objective: Prevent congestion by gradually probing for additional capacity.
3. Fast Retransmit and Fast Recovery:
○ Fast Retransmit:
■ If TCP receives three duplicate ACKs (indicating packet loss), it
immediately retransmits the lost packet without waiting for a
timeout.
○ Fast Recovery:
■ Instead of returning to slow start, TCP enters congestion avoidance
mode. The congestion window size is cut in half, and linear growth
resumes.
○ Objective: Quickly recover from packet loss and prevent drastic reductions
in transmission rates.
4. Additive Increase/Multiplicative Decrease (AIMD):
○ Description: Combines linear growth with multiplicative decrease.
○ Mechanism:
■ Additive Increase: For every RTT, increase the congestion window
by one MSS.
■ Multiplicative Decrease: On detecting congestion, reduce the
congestion window size by half.
○ Objective: Gradually probe for available capacity while quickly reacting to
congestion.
Term/Technique Description
TCP Slow Start Gradually increases the transmission rate until congestion is
detected.
3.11. Web and Web caching, FTP (File Transfer Protocol), Electronic mail, DNS
(Domain Name Service)
Understanding key protocols and services like web caching, FTP, email systems, and
DNS is crucial for managing and optimizing network communication, ensuring faster
content delivery, efficient data transfer, and accurate domain name resolution.
● Definition: FTP is a standard network protocol used for transferring files between a
client and a server over a network.
Variants of FTP:
● FTPS (FTP Secure): Adds support for the SSL/TLS protocol to encrypt the
control and/or data channels.
● SFTP (SSH File Transfer Protocol): A completely different protocol from FTP,
SFTP runs over SSH and provides secure file transfer with full encryption and
authentication.
3. Electronic Mail
1. Email Clients:
○ Applications used by users to send, receive, and manage email (e.g.,
Microsoft Outlook, Mozilla Thunderbird, Apple Mail).
2. Mail Servers:
○ Servers responsible for receiving, storing, and forwarding email messages.
○ Types of Mail Servers:
■ MTA (Mail Transfer Agent): Transports email from one server to
another (e.g., Sendmail, Postfix).
■ MDA (Mail Delivery Agent): Delivers the email to the recipient's
inbox (e.g., Dovecot, Cyrus).
■ MSA (Mail Submission Agent): Accepts outgoing mail from a
client and forwards it to an MTA.
Email Protocols:
1. DNS Resolvers:
○ Client-side servers that receive domain name queries from users and
forward them to DNS servers to get the corresponding IP addresses.
2. DNS Servers:
○ Authoritative DNS Servers: Store DNS records for specific domains and
provide responses to queries.
○ Recursive DNS Servers: Receive queries from clients, then perform
queries on behalf of the client to find the correct IP address.
3. DNS Records:
○ Different types of DNS records include:
■ A Record: Maps a domain name to an IPv4 address.
■ AAAA Record: Maps a domain name to an IPv6 address.
■ CNAME Record: Maps one domain name to another domain name
(aliasing).
■ MX Record: Specifies the mail server responsible for receiving
emails on behalf of the domain.
■ NS Record: Specifies the authoritative name servers for the domain.
■ TXT Record: Holds text information for various purposes, such as
verification or domain ownership.
1. Recursive Query:
○ The DNS server takes full responsibility for resolving the domain name,
querying other servers as needed, and returning the final answer to the
client.
2. Iterative Query:
○ The DNS server returns the best answer it has or refers the client to another
server that might know the answer.
DNS Caching:
● Definition: To speed up the domain name resolution process, DNS resolvers and
servers cache DNS records for a period defined by the Time-to-Live (TTL) value.
● Benefits:
○ Reduces latency for users.
○ Decreases DNS server load and network traffic.
Concept/Service Description
Web Caching Storing copies of web content closer to users to reduce latency, save
bandwidth, and improve content delivery speed.
FTP A protocol for transferring files between clients and servers, offering
modes like active/passive and variants like FTPS and SFTP for
secure transfer.
Understanding these protocols and systems ensures efficient data transfer, faster content
delivery, and accurate resolution of domain names, enhancing overall network
performance and user experience.
ChatGPT
Network Security
Network security involves protecting data and systems from unauthorized access, attacks,
and other threats. Key aspects of network security include cryptography, digital
signatures, firewalls, Virtual Private Networks (VPNs), and data encryption standards.
Additionally, disaster recovery and data storage techniques play crucial roles in ensuring
data integrity and availability.
1. Cryptography
1. Encryption:
○ Definition: The process of converting plain text into ciphertext to prevent
unauthorized access.
○ Types:
■ Symmetric Encryption: Uses the same key for both encryption and
decryption (e.g., AES, DES).
■ Asymmetric Encryption: Uses a pair of keys (public and private)
for encryption and decryption (e.g., RSA, ECC).
2. Decryption:
○ Definition: The process of converting ciphertext back into readable plain
text using the appropriate key.
3. Hash Functions:
○ Definition: Functions that convert data into a fixed-size hash value or
digest, which is unique to the input data (e.g., SHA-256, MD5).
○ Use Cases: Data integrity verification, password storage.
4. Key Management:
○ Definition: The process of handling cryptographic keys, including their
generation, distribution, storage, and revocation.
2. Digital Signatures
Key Components:
1. Signature Generation:
○ The sender generates a digital signature using their private key.
○ The signature is attached to the message or document.
2. Signature Verification:
○ The recipient uses the sender's public key to verify the signature.
○ Ensures that the message has not been altered and confirms the sender's
identity.
Uses:
3. Firewalls
● Definition: Firewalls are network security devices or software that monitor and
control incoming and outgoing network traffic based on predetermined security
rules.
Types of Firewalls:
1. Packet-Filtering Firewalls:
○ Definition: Inspects packets at the network layer and filters them based on
source/destination IP addresses and ports.
○ Limitations: Limited inspection, cannot understand application-layer
protocols.
2. Stateful Inspection Firewalls:
○ Definition: Tracks the state of active connections and makes decisions
based on the state and context of traffic.
○ Advantages: Better security than packet-filtering firewalls.
3. Proxy Firewalls:
○ Definition: Acts as an intermediary between clients and servers, forwarding
requests and responses while hiding internal network addresses.
○ Advantages: Provides additional security by hiding network topology.
4. Next-Generation Firewalls (NGFWs):
○ Definition: Integrates traditional firewall features with advanced features
like deep packet inspection, intrusion prevention, and application
awareness.
Types of VPNs:
Benefits:
● Definition: DES is a symmetric-key block cipher that was widely used for
encrypting data.
Key Features:
Limitations:
● Security: DES is considered insecure for modern applications due to its relatively
short key length and vulnerability to brute-force attacks.
Replacement:
● AES (Advanced Encryption Standard): DES has been largely replaced by AES,
which offers stronger security and supports longer key lengths (128, 192, and 256
bits).
6. Disaster Recovery
● Definition: Disaster recovery involves strategies and processes for recovering data
and IT systems in the event of a disaster or major disruption.
Key Components:
● Clustering:
○ Definition: Clustering involves grouping multiple servers or storage
devices to work together as a single system, providing high availability,
load balancing, and redundancy.
○ Types:
■ Server Clustering: Multiple servers working together to provide
uninterrupted service.
■ Storage Clustering: Grouping storage devices to enhance
performance and redundancy.
● Network Attached Storage (NAS):
○ Definition: NAS is a dedicated file storage system connected to a network,
allowing multiple users and devices to access and share files over the
network.
○ Features:
■ File-Level Access: Provides access to files and folders using
network protocols like NFS, SMB/CIFS.
■ Scalability: Can be easily expanded by adding more storage devices.
■ Centralized Management: Simplifies file management and backup.
● Storage Area Network (SAN):
○ Definition: SAN is a high-speed network of storage devices that provides
block-level access to data, typically used in enterprise environments for
high-performance and high-availability storage.
○ Features:
■ Block-Level Access: Direct access to storage blocks, allowing for
higher performance and flexibility.
■ High Performance: Designed for high-speed data transfers and low
latency.
■ Scalability: Supports large-scale storage deployments and can be
expanded as needed.
Concept/Technique Description
Understanding these network security principles and storage techniques helps protect
data, ensure reliable access, and prepare for potential disruptions, enhancing overall
network resilience and security.