Comprehensive Study Notes on Networks
Topic 3: Networks
Network Architecture
WAN (Wide Area Network): Connects geographically dispersed hosts, typically across regions or nations, often consisting of multiple LANs linked by leased lines.
LAN (Local Area Network): A network confined to a small geographic area, such as within a building or campus; uses wired communications protocols like Ethernet.
Intranet: A private network that uses web technologies but restricts access to users within an organization. Hosted internally.
Extranet: An extension of an intranet that provides limited access to selected outside users, such as customers or suppliers.
Internet: A global network of networks using Internet Protocol (IP) to connect millions of private, public, academic, business, and government networks.
Types of Networks
3.1.1 Identify Different Types of Networks
Definition of a Network: A computer network is a collection of computer systems and hardware devices linked through communication channels for facilitating communication and resource sharing among users.
Categorization: Networks are categorized based on characteristics such as size, range, and type of connection.
Different Types of Networks
LAN (Local Area Network):
Example: School or business networks
Characteristics: Confined to one building, uses wired protocols (e.g., Ethernet).
WLAN (Wireless Local Area Network):
Explanation: Similar to LAN but utilizes wireless technologies (e.g., WiFi).
VLAN (Virtual Local Area Network):
Definition: A subgroup of computers on a LAN treated as a separate network for security or access control without requiring physical hardware changes.
Comparison: More cost-effective and flexible than physical isolation.
WAN (Wide Area Network):
Characteristics: Connects geographically distant hosts; often comprises LANs linked by leased lines.
SAN (Storage Area Network):
Explanation: A specialized network for storage devices, not typically accessible from the main LAN (predominantly high-capacity storage).
PAN (Personal Area Network):
Definition: Short-range networks for personal devices (e.g., smartphones, tablets) using Bluetooth.
Intranet, Extranet, Internet
Intranet:
Definition: A private internal network similar to the internet but restricted to an organization.
Extranet:
Definition: An intranet with controlled access for select users outside the organization.
Internet:
Definition: A vast network of interconnected networks using IP, supporting services like the World Wide Web, email, and more.
Basic Network Components
Hub: A central device that connects multiple computers in a network.
Router: Routes data between different networks and manages traffic.
Switch: Connects devices within a LAN and filters traffic.
Bridge: Connects and filters traffic between two or more networks.
Wireless Access Point: Provides wireless connections to devices.
Network Architectures
Client–Server Architecture
Server: A program or computer that provides services to client requests over a network.
Software Defined: Listens for client requests on specific ports and provides responses.
Hardware: Dedicated machine optimized for service delivery, often with enhanced processing and storage capabilities.
Client: A computer or terminal that accesses services and resources offered by the server.
Used in: Network architectures relying on a centralized server for providing services and resources.
Peer-to-Peer Network Architecture
Description: All computers are interconnected without a central server.
Security: Generally less secure since each node must secure its own data.
Speed: Potential for faster speeds when optimized algorithms are applied, as seen in torrenting applications.
Internet Service Providers (ISP)
Definition: Organizations that offer services related to accessing the internet, web hosting, and data facilities.
Types of Providers:
Tier 1 Providers: Major companies that own the network infrastructure without needing services from other providers directly.
Various Connection Methods: Includes Dial-up, ISDN, ADSL, T1, Gigabit Ethernet, and Fiber Optic.
Connection Speed: Ranges from slow (dial-up) to fast (fiber optics).
Virtual Private Networks (VPN)
Definition: A secured network that uses the public internet to connect remote users as if they were on a private network; utilizes encryption and other security measures.
Components:
Encryption Protocols: Such as SSL and TLS for securing data.
Tunneling Protocols: Protocols like SSTP, IPSec, and OpenVPN that encapsulate data for secure transport.
Advantages:
Enables secure remote access to resources such as files, printers, and databases over the internet.
Cost-effective, avoiding the need for expensive leased lines.
Disadvantages:
Security risks due to the public nature of the internet requiring robust encryption and security protocols.
Importance of Standards in Networking
3.1.2 Outline the Importance of Standards
Role of Standards:
Provide a common framework for compatibility among devices from different manufacturers.
Facilitate communication and interoperability between diverse networking products.
Promote efficiency and reduce errors in data transmission and processing.
Communication Over Networks: Layered Model
3.1.3 Describe Communication Layers
The OSI Model: A conceptual framework that standardizes communications in telecommunication or computing systems, broken into seven layers.
Purpose: Each layer focuses on specific networking functions, allowing independence and abstraction.
Four Important Layers:
Application Layer: Manages user interface and application-level functions (e.g., HTTP).
Transport Layer: Ensures data transfer reliability and segmentation (e.g., TCP).
Network Layer: Manages addressing and routing (e.g., IP).
Physical Layer: Defines electrical/physical specifications for data transmission (e.g., Ethernet).
Packet Structure: Each layer may encapsulate data packets, each level's packets may have distinct terminologies (e.g., frame, datagram).
Networking Technologies for VPN
3.1.4 Identify Technologies Required for a VPN
Encapsulation and Encryption: Security for the data transmitted via public internet.
Tunneling Protocols: Essential for securing data synchronization over diverse networks.
Data Transmission Characteristics
3.1.6 Define Terms and Explain Importance of Protocols
Definition of Protocol: A standardized set of rules for data transfer and communication between devices in a network.
Importance of Protocols:
Ensure data integrity, reliability, and proper transmission rates while avoiding data collisions and congestion.
Enable error checking mechanisms and establish communication protocols among varied hardware.
Factors Affecting Data Transmission Speed
3.1.9 Explain Variability of Data Transmission Speeds
Factors Influencing Speed:
Bandwidth: Maximum data rate; higher bandwidth correlates with faster speeds.
Network Congestion: Reduced speeds due to high demand exceeding bandwidth.
Latency: Time faced due to distance or hardware routing time; increased physical distance leads to slower transmissions.
Packet Loss: The need for retransmission incurs time and reduces effective speed.
Protocols: Variability in protocol efficiency impacts overall transmission speed.
Physical Medium: Cable types influence data transmission rates; fiber optic is typically faster than copper.
Distance: Greater distances can increase latency, affecting transmission speeds adversely.
Network Hardware: Older hardware may not maintain high-speed efficiency.
Interference in Wireless Networks: Disruptions from environmental factors diminish speed and reliability.
Data Compression Necessity
3.1.8 Explain Necessity of Data Compression
Purpose of Data Compression: Achieving efficient data handling by reducing redundancy in bytes.
Types of Compression:
Lossless Compression: Original data is preserved, reversible.
Lossy Compression: Works on the principle of reducing size by discarding some data.
Transmission Media Characteristics
3.1.10 Describe Characteristics of Different Transmission Media
Guided Transmission Media: Wired methods, including twisted-pair cables, coaxial cables, and fiber-optic cables.
Unguided Transmission Media: Wireless methods utilizing electromagnetic spectrum, such as WiFi and Bluetooth.
3.1.11 Outline Wireless Network Advantages and Disadvantages
Advantages of Wireless Networks:
Enhanced mobility and convenience, no physical cables.
Disadvantages:
Susceptibility to signal interference, crowded channels affecting performance.
Packet Switching and Communication
3.1.12 Explain Packet Switching Communication
Packet Switching:
Interest: Data is broken into packets, efficiently routed through available paths.
Control Information: Headers indicate destination and data length; payload contains actual data.
Circuit Switching: A dedicated communication path is established, unlike the flexible routing in packet switching.
Advantages and Disadvantages of Wireless Networks
Advantages: Flexibility, easy device additions, and broad coverage.
Disadvantages: Possible signal degradation and vulnerability to eavesdropping.
Security Methods
3.1.15 Describe Network Security Methods
Usernames/Passwords: Identification and authentication of users.
Encryption: Securing unauthorized data access.
Antivirus: Protect against various cyber threats, often at network entry points.
Firewall: Monitors network traffic and blocks unapproved connections.
Physical Security: Physical barriers like locks and surveillance.
Attacks Overview
Types of Hacking Attacks: Denial of Service, Man-in-the-Middle, Phishing, Trojan Horse, Spoofing, Spyware.
Network Topologies
3.1.16 Network Topologies
Types of Topologies:
Single Isolated: Point-to-point connection between two systems.
Bus Topology: All devices connect to a single cable; easy to expand but reliant on the main cable functioning.
Star Topology: Central hub or switch connected to all devices; secure and efficient but dependent on central device.
Mesh Topology: Data can route through various paths; very flexible and resilient but complex to maintain.
Hybrid Topology: Combining different topological structures, capable of handling varied loads, but complex to set up and manage.
Summary: Key Concepts
Data Packets: Fundamental units of network communication; consist of headers and payloads.
Protocols: Necessary for clarity and reliability in communication.
VPNs: Provide secure remote access, especially beneficial in contexts like telecommuting.