CN
CN
4. TCP Model: The TCP/IP model, also known as the Internet Protocol Suite, is a
conceptual model and set of communications protocols used in the Internet and
similar computer networks. It consists of four layers:
a) Application Layer: This is the topmost layer, dealing with high-level protocols (HTTP, FTP,
SMTP, etc.), representation, encoding, and dialog control.
CN
5. OSI Model Layers: The Open Systems Interconnection (OSI) model is a conceptual
framework that describes how data communication occurs between devices in a
network. It consists of seven layers:
a) Physical Layer: Deals with the physical connection between devices. It defines
specifications for cables, cards, and physical aspects.
b) Data Link Layer: Provides node-to-node data transfer. It detects and possibly corrects
errors from the physical layer.
c) Network Layer: Manages the addressing and routing of data packets between different
networks.
d) Transport Layer: Ensures complete data transfer. It provides acknowledgment of
successful data transmission and re-transmits data if an error is found.
e) Session Layer: Establishes, manages, and terminates sessions between applications.
f) Presentation Layer: Transforms data into the form that the application accepts. This layer
is responsible for data compression, encryption, and description.
g) Application Layer: This is the layer closest to the end user. It provides network services
directly to applications.
Each layer serves the layer above it and is served by the layer below it.
6. Significance of Data Link Layer: The Data Link Layer is crucial in network
communication for several reasons:
a) Error detection and correction: It detects and corrects errors that may occur in the
Physical Layer, ensuring data integrity.
b) Flow control: It manages the rate of data transmission between sender and receiver to
prevent overwhelming slower receivers.
c) Media Access Control (MAC): It controls how devices in a network gain access to a
medium and permission to transmit data.
d) Addressing: It provides physical addressing (MAC addresses) for devices on the network.
e) Framing: It encapsulates data from the Network Layer into frames, adding header and
trailer information.
f) Reliable delivery: Some Data Link Layer protocols provide reliable delivery mechanisms for
data transfer between adjacent network nodes.
CN
NIC (Network Interface Card): A NIC is a hardware component that connects a computer to a
network. It:
CN
10. MAC Address: A Media Access Control (MAC) address is a unique identifier assigned
to a Network Interface Controller (NIC) for use as a network address in
communications within a network segment. It's often referred to as the physical
address.
Key points about MAC addresses:
• 48 bits long, usually represented as six groups of two hexadecimal digits
• Assigned by the manufacturer of the network interface
• Used in the Data Link Layer of the OSI model
• Essential for Ethernet and Wi-Fi networks
• Cannot be changed by software (though it can be spoofed)
14. Firewalls: A firewall is a network security device that monitors and filters incoming
and outgoing network traffic based on an organization's previously established
security policies.
Types of firewalls:
1. Packet filtering firewalls
2. Stateful inspection firewalls
3. Application layer firewalls (proxy firewalls)
4. Next-generation firewalls (NGFW)
Functions of firewalls:
• Block unauthorized access
• Prevent malware from entering the network
• Stop data leakage
• Create logs for security analysis
• Provide a layer of privacy
Processing Delay: The time required for a router to process the packet header and
determine where to direct the packet.
Queuing Delay: The time a packet waits in the buffer before it can be transmitted. It occurs
when more packets are received than can be transmitted at a given time.
Total Delay = Propagation Delay + Transmission Delay + Processing Delay + Queuing Delay
17. Server-side load balancer: A server-side load balancer is a device or software that
distributes incoming network traffic across multiple servers. It aims to:
• Optimize resource use
• Maximize throughput
• Minimize response time
• Avoid overload on any single server
Common algorithms include Round Robin, Least Connections, and IP Hash.
21. TCP and UDP protocols - differences: TCP (Transmission Control Protocol):
• Connection-oriented
• Reliable data transfer
• Flow control and congestion control
• Slower but ensures data integrity
UDP (User Datagram Protocol):
• Connectionless
• Unreliable data transfer
• No flow control or congestion control
• Faster but may lose packets
22. What happens when you enter "google.com": a) DNS resolution: Convert domain
name to IP address b) Browser initiates TCP connection with the server c)
HTTP/HTTPS request is sent d) Server processes request and sends response e)
Browser renders the webpage f) Additional resources (images, scripts) are requested
and loaded