Networking: Network Components

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

Networking

Network Components
Network
Two or more devices connected together via any means using some standard (protocols) to exchange
resources, data and services.

Types OF Networks
 Based on Size:
o PAN (Personal Area Network): around an individual person within a single building
(small office or residence) for computers, peripheral devices, video game consoles etc.
 HAN (Home Area Network): multiple individuals within a residence.
o LAN (Local Area Network): network at a single site typically single office building, useful
for sharing resources, via hubs, network adapter and Ethernet cables.
 SOHO: Small office/ Home office
o MAN (Metropolitan Area Network): network consist of entire city, collage campus etc.
o Wan (Wide Area Network): occupies very large area like entire country or world, consist
of small networks (LAN, MAN etc.), internet is an example of it.
 Based on Purpose:
o SAN (Storage Area Network): network dedicated to data storage, give administrator
more control over the network. Example database can access by specific users not all
users over the LAN.

Office have LAN, owns database, accessible for employees and not accessible over internet.
What if want to access via remote location?
o EPN (Enterprise Private Network): Network entirely controlled by one organization
used to connect multiple locations.
o VPN (Virtual Private Network): extends a private network over the internet, encrypt the
data before it goes to the internet, for security purpose.
 Based on Connection Type:
o Wired or Guided Network (Ethernet): An Ethernet connection uses a standard interface
known as an RJ45 connector. 'RJ' stands for 'registered jack.'
o Wireless or Unguided Network (Wi-Fi)

INTERNET: A global computer network providing a variety of information and facilities, consisting of
inter connected networks using standardized communication protocols.
General Purpose Networks
1. PAN
2. LAN: Data transfer on LAN is serial.
3. MAN
4. WAN

Private Networks
1. EPN
2. VPN

Special Purpose Networks:


1. SAN
2. HAN
3. BAN (Body Area Network): network of wearable computing devices, smart watches, tracking or
heart monitor devices etc.

Network Hardware
Communication Medium
Material substance used to carry energy waves.

Types of Wires
 Twisted Cables
 Coaxial Cable (TV companies, also used commonly)
 Fiber Optic cables (Transmit light rather than electronic signals, superior speed, nowadays
commonly used)

Cat5 cable + RJ45 pin Networking wire (8 tiny wires inside cover)

Types of Waves
 Radio Waves
 Infrared Waves
 Micro Waves

Repeaters
Receives electronic/data signals, cleans them and retransmit them with higher power in wider area.

Bridge
Device use to divides large networks into different Segments, also makes sure speed of network doesn’t
drop dramatically (by handling network traffic)

Hub
Networking device used to connect multiple devices into the network using cables. Each connection
called port. Sends all data it received to all ports, hence slows down the network.
Switch
Work similar to hub with the variation of it sends data to the specific destined port. Offers better
performance than hubs1.

Router
It is a device use to connect two different networks, for example HAN to WAN etc. It sorts incoming data
and distributes it to the specific destination. Only works if the network protocols are same.

Gateway
Interfaces networks that use different protocols, you can think of a gateway as a router that includes
protocol translators. 'Router' and 'Gateway' often used interchangeably. Any network that also includes
a mainframe system will need a gateway since this type of network uses different communication
protocols.

Modem
Device use to modulate or demodulate data signals (Modulate/Mod + Demodulate/Dem = Modem).

 Modulation: Encode digital information onto an analog carrier signals. It happens when data
is send to other devices.
 Demodulation: Decode electronic/analog signals onto digital information. It happens when
data is received.

Dial-up Connection (Dial-up Modems or fax Modems)


Modems used when telephone network is used to access the internet.

Broadband Modems
These can handle multiple connections at the same time (usually coaxial cable).

Network Interface Card (NIC)


Piece of hardware used to connect a device to the network, often built into the motherboard. It is also
known as Network interface controller, Network Adaptor and LAN adaptor.

 Wired (RJ45 port)


 Wireless (antenna; Wireless Access Points(WAPs)

Wi-Fi Card
It is a NIC for wireless devices which allows wireless connections.

1
Bits use to refer speed while bytes use to refer data.
LAN consists:
 Hosts(any device that have IP address: our pc’s, servers)
 Central connecting devices(hub, switches, routers)
Types of NIC
 Wi-Fi
 Ethernet

Network Node
Any addressable device connected to a network is called Network Node.

Characteristics
 Ability to communicate with other devices.
 Have unique identifier i.e. address for each device.
o For office, public and home networks MAC (media access control) address is used. This
address is hard-coded into NIC.
o To access internet, IP (Internet Protocol) address is used. It is assigned by a service
running on the network called TCP/IP, the common language ('protocol' in computer
terms) used to communicate with other devices on the Internet. To be a part of a TCP/IP
conversation, you need to have an IP address.
 Create, sends, received and stores data.
 Able to recognize network signals, process it and can also be able to respond.

Examples
Network infrastructure devices like hubs, switches, routers etc., IOT, Security firewalls, computers,
printers etc.

Types of Network Node


1. Broadcast Network: Transmission from a device on a network goes to every other device, if it is
not the recipient it simply ignores it. Ethernet is a type of broadcast network. If the device hears
a transmission on the network when it's getting ready to send, it stops and waits a random
period of time before trying again. This process is called carrier sense multiple access with
collision detection (CSMA/CD) (Method to minimize collisions).
2. Point-To-Point Network: Only two nodes connected together and none require any address.
3. Multi-Homed Network: Network having two paths to the internet. Use for redundancy (use one
when other is down) or load balancing.
4. Hybrid Network: Network involving wired and wireless connections.
Network Topologies
Three fundamental topologies
1. Star
2. Ring
3. Bus
4. Real world, hybrid topology (combination of all 3 or either of them) is used.

About Internet:
Three critical factors for internet
1) Speed (depends on different factors like slowest link in the network path etc.)
2) Delay (depends on distance, if distance is long time taken to transfer data increases
because there must be more nodes in network path, similarly shorter the distance faster
the connection (because there is no delay). Google doesn’t connects Pakistan’s IP to
US’s Google instead redirect it to content delivery network closer to Pakistan. ).
3) Availability (all the links between sender and receiver are up and running)

Types of internet connections


i. Dial-up (analog)
ii. ISDN (Integrated Service Digital Network)
iii. B-ISDN (Broadband ISDN; ISDN extension)
iv. DSL (digital subscriber line)
v. ADSL (Asymmetric DSL)
vi. ADSL +2 (ADSL extension)
vii. SDSL (Symmetric DSL)
viii. VDSL (very high DSL; DSL extension)
ix. Cable (via cable modem; Broadband internet connection)
x. Wireless / Wi-Fi
xi. T-1 Lines (Leased Line)
xii. Bonded T-1
xiii. T-3 Lines (Dedicated Leased Lines)
xiv. OC3 (Optical Carrier)
xv. Satellite
xvi. Cellular
OSI TCP/IP Model and Protocols
 TCP (Transmission control protocol) or OSI (Open System Interconnect) are nothing but set of
rules and standards.
 Early IBM and DEC computers are not compatible with each other so ISO formed (International
Organization for standards).
 ISO developed OSI (Open System Interconnect) = OSI reference model
 At same time, competing model TCP/IP came into being (promoted by department of defence).

OSI Model
It is the set of rules for internet traffic. OR

OSI model is designed to be a reference model to describe the functions of the communication system.

Layers of OSI Model

1. Application Layer:
Point of contact for all network aware apps, only when app interact with net then application layer is
invoked

2. Presentation Layer
 Character encoding

 Application encryption (SSL/TLS)

 SSL encryption

3. Session Layer
 Communication management between devices (start, stop, restart)

 control protocols and tunneling protocols

 Link the presentation to the transport layer

4. Transport Layer
 Post office layer (parcels & letters)

 TCP Segment or UDP Datagram

 TCP encapsulation

5. Network Layer
 Fragments frames to traverse different networks (packets)

 Routing layer

 IP addressing
 IP encapsulation

6. Data Link Layer


 Basic network language

 Switching

 Mac Addressing

 Frame

 Extend unique identifiers (EUI-48 & EUI-64)

 Ethernet

7. Physical Layer
 0’s and 1’s

TCP/IP Model
1. Application Layer

2. Transport Layer

3. Internet Layer

4. Network Interface Layer

Protocols
1. Telnet (transmission Network) tcp/23 : not secure

2. Ssh (Secure shell) tcp/22 : secure

3. DNS (Domain name service) udp/53

4. Mail Protocols

1. SMPT (simple mail transfer protocol) tcp/25 : not secure

2. SMPT tcp/465 : secure

3. POP (post office protocol) tcp/110 : not secure

4. POP3 tcp/995 : secure

5. IMAP (Internet Access message protocol) tcp/143 : not secure

6. IMAP tcp/993 : secure

5. File transfer protocol


1. FTP (file transfer protocol) : not secure

1. tcp/20 (active mode data)

2. tcp/21 (control)

2. TFTP (trivial file transfer protocol) udp/69 : extremely not secure

3. SFTP (secure file transfer protocol) tcp/22 same as ssh because using same protocol
underlying it. : secure

6. DHCP (dynamic host configuration protocol) udp/67 or udp/68

7. HTTP tcp/80

8. HTTPS tcp/443

9. SNMP (simple network management protocol) udp/161 : v1 & v2 : not secure v3 : secure

10. RDP (remote desktop protocol) tcp/3389

11. NTP (network time protocol) udp/123

12. Voice over IP (VoIP)

1. SIP (session initiation protocol) tcp/5060 & tcp/5061

2. H.323 tcp/1720

13. SMB (server message block for ms windows) tcp/445 (net-BIOS less)

14. LDAP (lightweight directory access protocol) tcp/389

15. LDAPS tcp/636

You might also like