CCN Module 1
CCN Module 1
Computer networks first developed in 1950 for military and defense purpose. At that time they
are mainly used to send data through telephone lines and had limited use in business or
science.
Today computer networks are essential for businesses also. Modern networks offer more than
just connecting devices. They play a key role in helping businesses adapt to the digital world
and succeed. These networks have become more flexible, automated, and secure, making them
even more important in today’s business environment.
There are a variety of fields in computer networks that are used in industries. Some of them are
as follows:
In computer networks, we have a global internet, also known as the World Wide Web, that offers
us various features like access to websites, online services and retrieval of information. With the
help of the World Wide Web, we can browse, and we can do search, and access web pages and
multimedia content.
2. Communication
With the help of computer networks, communication is also easy because we can do email,
instant messaging, voice and video calls and video conferencing, which helps us to communicate
with each other effectively. People can use these features in their businesses and organizations to
stay connected with each other.
3. File Sharing and Data Transfer
Data transfer and file sharing are made possible by networks that connect different devices. This
covers file sharing within a business setting, file sharing between personal devices, and
downloading/uploading of content from the internet.
4. Online gaming
Multiplayer online games use computer networks to link players from all over the world,
enabling online competitions and real-time gaming experiences.
Networks enable users to access and control systems and devices from a distance. This is helpful
when accessing home automation systems, managing servers, and providing remote IT support.
6. Social media
With the help of a computer network, we can use social media sites like Facebook, Twitter and
Instagram to help people set up their profiles, and we can connect with others and share content
on social media.
7. Cloud Computing
The provision of on-demand access to computing resources and services hosted in distant data
centres relies on networks. Some example of cloud computing is software as a service (SaaS),
platform as a service (PaaS) and infrastructure as service (IaaS).
Online banking and e-commerce platforms, where customers conduct financial transactions and
make online purchases, require secure computer networks.
9. Enterprise Networks
In Computer networks, we have some networks that are only used in businesses and
organizations so they can store data and share files and resources like printers, scanners, etc.
10. Healthcare
With the help of computer networks in the health industry, we can share patient records and store
the records in the form of data that is easy and secure compared to the file method. Networks are
also necessary for telemedicine and remote patient monitoring.
11. Education
Schools use networks to access online courses, virtual classrooms, and other online learning
materials. Campuses of colleges and universities frequently have extensive computer networks.
The transportation sector uses Computer Networks to manage and track shipments, plan the best
routes, and coordinate logistics activities.
Through the Internet of Things (IoT), smart homes use networks to connect to and manage a
variety of devices, including thermostats, security cameras, and smart appliances.
To share data, work together on projects, and access high-performance computing resources for
data analysis and scientific simulations, researchers use networks.
With the help of computer networks, we can communicate, share data, and advance national
defence. Government agencies and the military rely on secure networks.
COMPUTER NETWORK TYPES
A computer network is a group of computers linked to each other that enables the computer to
communicate with another computer and share their resources, data, and applications.
A computer network can be categorized by their size. A computer network is mainly of four
types:
o Local Area Network is a group of computers connected to each other in a small area such
as building, office.
o LAN is used for connecting two or more personal computers through a communication
medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters,
and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.
PAN(Personal Area Network)
o Body Area Network: Body Area Network is a network that moves with a person. For
example, a mobile network moves with a person. Suppose a person establishes a network
connection and then creates a connection with another device to share the information.
o Offline Network: An offline network can be created inside the home, so it is also known
as a home network. A home network is designed to integrate the devices such as
printers, computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a
corporate network using a VPN
o A Wide Area Network is a network that extends over a large geographical area such as
states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and
education.
NETWORK SOFTWARE
Network software encompasses a broad range of software used for design, implementation, and
operation and monitoring of computer networks. Traditional networks were hardware based with
software embedded. With the advent of Software – Defined Networking (SDN), software is
separated from the hardware thus making it more adaptable to the ever-changing nature of the
computer network.
Network Operating Systems form the backbone of network management, allowing control over
resources and facilitating essential services. Large enterprises extensively use NOS for the
centralized management of complex networks, streamlining administrative tasks and enhancing
efficiency.
Asset management software, on the other hand, is designed to track and manage assets within an
organization. This encompasses physical assets like equipment, hardware, and real estate, as well
as intangible assets like software licenses and intellectual property. The software assists in
optimizing the use and maintenance of assets, reducing costs, and ensuring compliance with
relevant regulations and standards. It provides valuable insights into asset utilization and
lifecycle management, facilitating strategic planning and decision-making in resource allocation.
Crucial for real-time oversight, network monitoring tools provide insights into traffic flow,
network utilization, and potential issues. They enable organizations to proactively manage
network performance, making them indispensable in maintaining optimal network health.
Network monitoring tools also facilitate the early detection of network anomalies and security
breaches, allowing for swift response and mitigation. These tools often come equipped with
customizable alerts and dashboards, providing a comprehensive view of network health and
enabling IT teams to make informed decisions based on real-time data and trends.
This category encompasses firewalls, anti-malware tools, and intrusion detection systems, vital
for protecting networks against cyber threats. In an era of increasing digital risks, network
security software is a must-have for organizations to safeguard their data and network integrity.
Network security software has evolved to include advanced features like behavioral analytics and
AI-driven threat detection, making it more adept at identifying and responding to sophisticated
cyberattacks.
Data archiving software plays a crucial role in efficiently storing, securing, and managing digital
data over extended periods. These tools ensure that data remains accessible and intact for future
reference, compliance, or recovery needs. They often include features like data compression,
deduplication, and encryption, catering to the diverse requirements of data backup and long-term
preservation.
Network configuration and change management (NCCM)
NCCM tools are essential for managing network configurations and tracking changes. They
ensure compliance and reduce risks associated with network modifications, particularly critical
for organizations with evolving and extensive network landscapes.
This software allows the creation of virtual network resources, enhancing resource utilization
and network management efficiency. It’s especially beneficial for large organizations with
intricate network needs, providing flexibility and improved resource management.
PROTOCOL HIERARCHIES
1. OSI Reference Model
2. TCP/IP Reference Model
1. OSI REFERENCE MODEL-OPEN SYSTEM INTERCONNECTION
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different
computer systems communicate over a network. OSI Model was developed by
the International Organization for Standardization (ISO). The OSI Model consists of 7
layers and each layer has specific functions and responsibilities.
This layered approach makes it easier for different devices and technologies to work together.
OSI Model provides a clear structure for data transmission and managing network issues. The
OSI Model is widely used as a reference to understand how network systems function.
Physical Layer
The lowest layer of the OSI reference model is the Physical Layer. It is responsible for the
actual physical connection between the devices. The physical layer contains information in the
form of bits. Physical Layer is responsible for transmitting individual bits from one node to the
next. When receiving data, this layer will get the signal received and convert it into 0s and 1s
and send them to the Data Link layer, which will put the frame back together. Common
physical layer devices are Hub, Repeater, Modem, and Cables.
Network Layer
The network layer works for the transmission of data from one host to the other located in
different networks. It also takes care of packet routing i.e. selection of the shortest path to
transmit the packet, from the number of routes available. The sender and receiver’s IP
address are placed in the header by the network layer. Segment in the Network layer is referred
to as Packet. Network layer is implemented by networking devices such as routers and
switches.
Transport Layer
The transport layer provides services to the application layer and takes services from the
network layer. The data in the transport layer is referred to as Segments. It is responsible for
the end-to-end delivery of the complete message. The transport layer also provides the
acknowledgment of the successful data transmission and re-transmits the data if an error is
found. Protocols used in Transport Layer are TCP, UDP NetBIOS, PPTP.
Session Layer
Session Layer in the OSI Model is responsible for the establishment of connections,
management of connections, terminations of sessions between two devices. It also provides
authentication and security. Protocols used in the Session Layer are NetBIOS, PPTP.
Presentation Layer
The presentation layer is also called the Translation layer. The data from the application layer
is extracted here and manipulated as per the required format to transmit over the network.
Protocols used in the Presentation Layer are JPEG, MPEG, GIF, TLS/SSL, etc.
Application Layer
At the very top of the OSI Reference Model stack of layers, we find the Application layer
which is implemented by the network applications. These applications produce the data to be
transferred over the network. This layer also serves as a window for the application services to
access the network and for displaying the received information to the user. Protocols used in
the Application layer are SMTP, FTP, DNS, etc.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and retransmit
missing packets to ensure that packets arrive in order and without error. End-to-end
communication is referred to as such. Transmission Control Protocol (TCP) and User
Datagram Protocol are transport layer protocols at this level (UDP).
TCP: Applications can interact with one another using TCP as though they were physically
connected by a circuit. TCP transmits data in a way that resembles character-by-character
transmission rather than separate packets. A starting point that establishes the connection,
the whole transmission in byte order, and an ending point that closes the connection make up
this transmission.
UDP: The datagram delivery service is provided by UDP, the other transport layer protocol.
Connections between receiving and sending hosts are not verified by UDP. Applications that
transport little amounts of data use UDP rather than TCP because it eliminates the processes
of establishing and validating connections.
4. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data. It shields the upper-layer applications from the
complexities of data. The three main protocols present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the World
Wide Web to manage communications between web browsers and servers. HTTPS stands
for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is
efficient in cases where the browser needs to fill out forms, sign in, authenticate, and carry
out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet.
The reason SSH is preferred is because of its ability to maintain the encrypted connection. It
sets up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP. Suppose you carry out a
transaction, where your computer reads the time at 2:30 PM while the server records it at
2:28 PM. The server can crash very badly if it’s out of sync.
In the OSI model, the transport layer The transport layer does not provide the
provides a guarantee for the delivery of surety for the delivery of packets. But
the packets. still, we can say that it is a reliable model.
The usage of this model is very low. This model is highly used.