We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Computer Networks Class Notes
What are Computer Networks?
Computer networks are interconnected systems of computing devices
(computers, smartphones, servers, etc.) that can communicate and share resources with each other. These connections can be wired (e.g., Ethernet cables) or wireless (e.g., Wi-Fi). Networks facilitate communication, collaboration, and access to information.
Key Concepts:
Nodes: Devices connected to the network.
Links: Communication pathways between nodes. Protocols: Sets of rules that govern how data is transmitted over the network. Network Topology: The physical or logical arrangement of nodes and links in a network.
Types of Networks:
Local Area Network (LAN): Connects devices within a limited
area (e.g., home, office, school). Wide Area Network (WAN): Connects devices over a larger geographical area (e.g., the internet). Metropolitan Area Network (MAN): Covers a larger area than a LAN but smaller than a WAN (e.g., a city). Personal Area Network (PAN): Connects devices within a short range (e.g., Bluetooth devices). Virtual Private Network (VPN): Creates a secure connection over a public network (like the internet). Network Topologies:
Bus: All devices are connected to a single cable. Simple but
vulnerable to cable breaks. Star: All devices are connected to a central hub or switch. Reliable and easy to manage. Ring: Devices are connected in a closed loop. Data travels in one direction. Mesh: Each device is connected to multiple other devices. Highly redundant and fault-tolerant. Tree (Hierarchical): Combines elements of star and bus topologies.
Network Protocols:
TCP/IP (Transmission Control Protocol/Internet Protocol):
The foundation of the internet. TCP provides reliable, ordered delivery of data, while IP handles addressing and routing. HTTP (Hypertext Transfer Protocol): Used for transferring web pages and other content over the internet. HTTPS (Secure HTTP): A secure version of HTTP that uses encryption. FTP (File Transfer Protocol): Used for transferring files between computers. SMTP (Simple Mail Transfer Protocol): Used for sending emails. DNS (Domain Name System): Translates domain names (e.g., google.com) into IP addresses.
Network Devices:
Routers: Forward data packets between networks.
Switches: Connect devices within a LAN and forward data only to the intended recipient. Hubs: Connect devices within a LAN but broadcast data to all devices. Less efficient than switches. Modems: Modulate and demodulate signals for transmitting data over communication channels (e.g., cable, DSL). Firewalls: Control network traffic based on predefined rules, enhancing security.
The OSI Model (Open Systems Interconnection):
A conceptual framework that describes the functions of a networking
system. Seven layers:
1. Application: Provides network services to applications (e.g.,
HTTP, SMTP). 2. Presentation: Handles data formatting and encryption. 3. Session: Establishes and manages connections between applications. 4. Transport: Provides reliable or unreliable delivery of data between hosts (e.g., TCP, UDP). 5. Network: Handles addressing and routing of data packets (e.g., IP). 6. Data Link: Handles error detection and correction in data transmission within a local network. 7. Physical: Defines the physical characteristics of the network (e.g., cables, connectors).
The TCP/IP Model:
A simplified version of the OSI model, commonly used in the internet.
Four layers: 1. Application: Combines the functions of the Application, Presentation, and Session layers of the OSI model. 2. Transport: Same as the OSI Transport layer (e.g., TCP, UDP). 3. Network (Internet): Same as the OSI Network layer (e.g., IP). 4. Link (Network Interface): Combines the functions of the Data Link and Physical layers of the OSI model.
IP Addressing:
IPv4: Uses 32-bit addresses. Limited number of addresses.
IPv6: Uses 128-bit addresses. Much larger address space.
Subnetting:
Dividing a network into smaller subnetworks to improve performance
and security.
Network Security:
Firewalls: Control network traffic.
Intrusion Detection Systems (IDS): Monitor network traffic for malicious activity. Virtual Private Networks (VPNs): Create secure connections over public networks. Encryption: Protects data from unauthorized access. Network Segmentation: Isolating parts of a network to limit the impact of a breach.
Further Study:
Networking is a vast and complex field. Further study should include
delving deeper into the OSI and TCP/IP models, exploring various networking protocols, understanding network security concepts, and learning about network design and management. Hands-on experience with configuring and troubleshooting networks is invaluable. Consider learning about network programmability (SDN) and network automation.