Chapter #1
Chapter #1
What is a Network?
Types of PAN
Advantages of PAN
PAN is relatively flexible and provides high efficiency for short network
ranges.
Disadvantages of PAN
Applications of PAN
LAN is the most frequently used network. A LAN is a computer network that
connects computers through a common communication path, contained
within a limited area, that is, locally. A LAN encompasses two or more
computers connected over a server. The two important technologies
involved in this network are Ethernet and Wi-Fi. It ranges up to 2km &
transmission speed is very high with easy maintenance and low cost.
Examples of LAN are networking in a home, school, library, laboratory,
college, office, etc.
Advantages of a LAN
High Speed: LAN offers a much higher speed(around 100 mbps) and data
transfer rate comparatively to WAN.
Inexpensive and Simple: A LAN usually has low cost, installation, expansion
and maintenance and LAN installation is relatively easy to use, good
scalability.
Disadvantages of LAN
The initial setup costs of installing Local Area Networks are high because
there is special software required to make a server.
LAN administrator can see and check personal data files as well
as Internet history of each and every LAN user. Hence, the privacy of the
users are violated
Since all the data is stored in a single server computer, if it can be accessed
by an unauthorized user, can cause a serious data security threat.
CAN is bigger than a LAN but smaller than a MAN. This is a type of
computer network that is usually used in places like a school or colleges.
This network covers a limited geographical area that is, it spreads across
several buildings within the campus. CAN mainly use Ethernet technology
with a range from 1km to 5km. Its transmission speed is very high with a
moderate maintenance cost and moderate cost. Examples of CAN are
networks that cover schools, colleges, buildings, etc.
Advantages of CAN
Speed: Communication within a CAN takes place over Local Area Network
(LAN) so data transfer rate between systems is little bit fast than Internet.
Cost effective: With a little effort and maintenance, network works well by
providing fast data transfer rate with multi-departmental network access. It
can be enabled wirelessly, where wiring and cabling costs can be managed.
So to work with in a campus using CAN is cost-effective in view of
performance
A MAN is larger than a LAN but smaller than a WAN. This is the type of
computer network that connects computers over a geographical distance
through a shared communication path over a city, town, or metropolitan
area. This network mainly uses FDDI, CDDI, and ATM as the technology with
a range from 5km to 50km. Its transmission speed is average. It is difficult
to maintain and it comes with a high cost. Examples of MAN are
networking in towns, cities, a single large city, a large area within multiple
buildings, etc.
Advantages of MAN
MAN offers high-speed connectivity in which the speed ranges from 10-
100 Mbps.
MAN can serve multiple users at a time with the same high-speed internet
to all the users.
Disadvantages of MAN
This network is highly expensive because it required the high cost to set up
fiber optics.
Advantages of WAN
The travel charges that are needed to cover the geographical area of work
can be minimized.
WAN enables a user or organization to connect with the world very easily
and allows to exchange data and do business at global level.
Disadvantages of WAN
At the heart of the diagram lies the Internet circle, symbolizing the global
backbone of interconnected networks. This centralized depiction reinforces
the Internet’s pivotal role in networking and global communication.
Encircling the main Internet circle, the VPN circle is placed overlapping the
Internet towards the North-East. This placement suggests VPN’s role as an
overlay network, providing secure, encrypted tunnels within the broader
Internet, essential for private and secure communication.
Lastly, connected to the LAN via uni-directional arrows are PAN, Point-to-
Point, and Multi-Point networks. These arrows, pointing towards LAN,
emphasize LAN’s central role in these networks. While PAN addresses
personal space connectivity, Point-to-Point ensures direct, simple
connections between two devices. In contrast, Multi-Point thrives in
complexity, enabling multiple devices to share a single connection.
Network protocols
Network Communication
Network Management
Network Security
1. Network Communication
BGP is a routing protocol that controls how packets pass through the router
in an independent system one or more networks run by a single
organization and connect to different networks. It connects the endpoints
of a LAN with other LANs and it also connects endpoints in different LANs
to one another.
Internet Protocol(IP)
It is a protocol through which data is sent from one host to another over
the internet. It is used for addressing and routing data packets so that they
can reach their destination.
it’s a protocol for network management and it’s used for the method of
automating the process of configuring devices on IP networks.
A DHCP server automatically assigns an IP address and various other
configurational changes to devices on a network so they can communicate
with other IP networks. it also allows devices to use various services such
as NTP, DNS, or any other protocol based on TCP or UDP.
2. Network Management
These protocols assist in describing the procedures and policies that are
used in monitoring, maintaining, and managing the computer network.
These protocols also help in communicating these requirements across the
network to ensure stable communication. Network management protocols
can also be used for troubleshooting connections between a host and a
client.
Gopher
FTP is a Client/server protocol that is used for moving files to or from a host
computer, it allows users to download files, programs, web pages, and
other things that are available on other services.
It is a protocol that a local mail client uses to get email messages from a
remote email server over a TCP/IP connection. Email servers hosted by ISPs
also use the POP3 protocol to hold and receive emails intended for their
users. Eventually, these users will use email client software to look at their
mailbox on the remote server and to download their emails. After the email
client downloads the emails, they are generally deleted from the servers.
Telnet
It is a protocol that allows the user to connect to a remote computer
program and to use it i.e., it is designed for remote
connectivity. Telnet creates a connection between a host machine and a
remote endpoint to enable a remote session.
3. Network Security
These protocols secure the data in passage over a network. These protocols
also determine how the network secures data from any unauthorized
attempts to extract or review data. These protocols make sure that no
unauthorized devices, users, or services can access the network data.
Primarily, these protocols depend on encryption to secure data.
It is a security protocol designed for data security and privacy over the
internet, its functionality is encryption, checking the integrity of data i.e.,
whether it has been tampered with or not, and authentication. It is
generally used for encrypted communication between servers and web
apps, like a web browser loading a website, it can also be used for
encryption of messages, emails, and VoIP.
Reference models
We have two reference models such as OSI model and TCP/IP reference
model, however, the OSI model is a hypothetical one but the TCP/IP is
absolutely practical model.
OSI Model
The OSI model consists of seven layers as shown in the following diagram.
Each layer has a specific function, however each layer provide services to
the layer above.
We’ll describe OSI layers “top down” from the application layer that directly
serves the end user, down to the physical layer.
7. Application Layer
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines
how two devices should encode, encrypt, and compress data so it is
received correctly on the other end. The presentation layer takes any data
transmitted by the application layer and prepares it for transmission over
the session layer.
5. Session Layer
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it
into “segments” on the transmitting end. It is responsible for reassembling
the segments on the receiving end, turning it back into data that can be
used by the session layer. The transport layer carries out flow control,
sending data at a rate that matches the connection speed of the receiving
device, and error control, checking if data was received incorrectly and if
not, requesting it again.
3. Network Layer
The network layer has two main functions. One is breaking up segments
into network packets, and reassembling the packets on the receiving end.
The other is routing packets by discovering the best path across a physical
network. The network layer uses network addresses (typically Internet
Protocol addresses) to route packets to a destination node.
The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames
and sends them from source to destination. This layer is composed of two
parts—Logical Link Control (LLC), which identifies network protocols,
performs error checking and synchronizes frames, and Media Access
Control (MAC) which uses MAC addresses to connect devices and define
permissions to transmit and receive data.
1. Physical Layer
TCP/IP Model
1. Host-to- Network Layer −It is the lowest layer that is concerned with the
physical transmission of data. TCP/IP does not specifically define any
protocol here but supports all the standard protocols.
2. Internet Layer −It defines the protocols for logical transmission of data over
the network. The main protocol in this layer is Internet Protocol (IP) and it is
supported by the protocols ICMP, IGMP, RARP, and ARP.
4. Application Layer − This is the topmost layer and defines the interface of
host programs with the transport layer services. This layer includes all high-
level protocols like Telnet, DNS, HTTP, FTP, SMTP, etc.
The following diagram shows the layers and the protocols in each of the
layers −
What is Standards?
Standards are the set of rules for data communication that are needed for
the exchange of information among devices. It is important to follow
Standards which are created by various Standard Organizations like IEEE,
ISO, ANSI, etc.
Types of Standards
De Jure Standard: The meaning of the word “De Jure” is “By Law” or “By
Regulations” Thus, these are the standards that have been approved by
officially recognized bodies like ANSI, ISO, IEEE, etc. These are the standards
that are important to follow if it is required or needed.
For example : All the data communication standard protocols like SMTP,
TCP, IP, UDP etc. are important to follow the same when we need them.
What Is Network Policy
https://www.cisco.com/c/en/us/solutions/enterprise-networks/what-is-
network-policy.html
This is why having usernames and passwords and setting up access rights
for routers and other connection devices are important. Access to secure
data on the network should also be controlled.
Authentication works to protect your personal information from unwanted
access. You can protect your computer by setting up a username and
password that you will need to enter each time you start it up.
You can also set up authentication for your smartphone and tablet. New
types of authentication, beyond usernames and passwords, have made it
possible for you to easily secure your devices and access them yourself.
New types of authentication include biometrics (fingerprint-unlock or face-
unlock) screen-lock patterns and PINs.
Since networks are used by a wide range of people, they must be used
responsibly and ethically. Anything negative that any user does on a
network can reflect negatively on the company, school or organisation
whose network they are using. This is why most organisations set
up acceptable use policies (AUPs) for those people who will be using their
networks, especially when it comes to what users can and cannot do on the
internet.
The chances are very high that your school has an AUP that you had to read
and then sign or acknowledge in some way. This section will look at the
basics of AUPs for schools and what guidelines they should contain. The
AUP is there to protect the users (and the organisation) when they use ICT
facilities and when they are online.
ACCEPTABLE USE POLICIES OF SCHOOLS
What may or may not be accessed online using the school’s ICT facilities.
This could include restricting access to social media websites
How much information users may download from the internet (for example,
no live streaming or downloads larger than a certain file size)
What to do if users find that they have become the victims of identity theft,
cyber-stalking and cyber-bullying, and what to do if their devices become
infected with viruses or malware
Clear descriptions of what will happen to a user who breaks the rules
outlined in the AUP
Each school will have its own AUP depending on the computing devices,
services and access they provide.