0% found this document useful (0 votes)
7 views14 pages

Networking and Communication

The document provides an overview of networking and communication, detailing various network types such as LAN, WAN, MAN, PAN, and VPN, along with their characteristics. It also covers network topologies, hardware components like NICs, routers, switches, and modems, as well as protocols such as TCP/IP, HTTP, and SMTP. Additionally, it discusses network addressing, security measures like firewalls and antivirus, and architecture models including client-server and peer-to-peer systems.

Uploaded by

abhay.kl9965
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views14 pages

Networking and Communication

The document provides an overview of networking and communication, detailing various network types such as LAN, WAN, MAN, PAN, and VPN, along with their characteristics. It also covers network topologies, hardware components like NICs, routers, switches, and modems, as well as protocols such as TCP/IP, HTTP, and SMTP. Additionally, it discusses network addressing, security measures like firewalls and antivirus, and architecture models including client-server and peer-to-peer systems.

Uploaded by

abhay.kl9965
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

# Networking and Communication: Detailed

Definitions

## Network Types

### Network
A network is a collection of computers,
servers, mainframes, peripherals, or other
devices connected to allow data sharing.
Networks enable communication between
devices and users, resource sharing, and
centralized software management.
### LAN (Local Area Network)
A network confined to a small geographical
area, typically within a single building or
campus. LANs feature high data transfer
rates, small geographical range, and are
usually privately owned. Examples include
office networks, home networks, and school
computer labs.
### WAN (Wide Area Network)
A network that spans a large geographical
area, often connecting multiple LANs across
cities, countries, or continents. WANs have
slower data speeds compared to LANs, use
telecommunication links, and may be
privately owned or use public carriers. The
Internet is the largest WAN.

### MAN (Metropolitan Area Network)


A network larger than a LAN but smaller
than a WAN, typically spanning a city or
large campus. MANs often use fiber optic
connections and can serve as a backbone to
connect multiple LANs or provide high-speed
internet access across a metropolitan
region.### PAN (Personal Area Network)
A network for interconnecting devices
centered around an individual person's
workspace. PANs typically have a range of a
few meters and connect devices like
smartphones, tablets, laptops, and
wearables. Bluetooth and NFC are common
PAN technologies.
### VPN (Virtual Private Network)
A technology that creates a secure,
encrypted connection over a less secure
network, such as the internet. VPNs provide
secure access to remote networks, maintain
privacy by masking the user's IP address,
and bypass geographical restrictions by
allowing users to appear as if they're
connecting from different locations.

## Network Topologies
### Bus Topology
All devices connect to a single central cable
(the bus). Data transmitted by any device
travels along the bus in both directions until
it reaches its destination. Advantages
include ease of installation and low cable
usage. Disadvantages include vulnerability
to cable failures and performance
degradation with heavy traffic.

### Star Topology


All devices connect directly to a central hub
or switch. Data travels from the source
device to the central hub, then to the
destination device. Advantages include
reliability (failure of one connection doesn't
affect others) and easy troubleshooting.
Disadvantages include dependence on the
central hub and higher cable requirements.
### Ring Topology
Devices are connected in a closed loop, with
each device connected to exactly two other
devices. Data travels in one direction around
the ring from device to device. Advantages
include equal access for all devices and
good performance under heavy load.
Disadvantages include vulnerability to single
cable failures and difficulty in adding new
devices.

### Mesh Topology


Every device is connected directly to every
other device. In a full mesh, all devices are
connected to each other; in a partial mesh,
only some devices are interconnected.
Advantages include high reliability and fault
tolerance. Disadvantages include
installation complexity and high cable
requirements.

### Tree Topology


A hierarchical structure combining multiple
star topologies connected to a linear bus
backbone. Data flows from the top of the
tree to the branches. Advantages include
scalability and ease of maintenance.
Disadvantages include dependence on the
backbone and increased complexity.

### Hybrid Topology


A combination of two or more different
topology types. Used when a single topology
cannot meet the network requirements.
Examples include star-bus, star-ring, and
mesh-ring hybrids. Advantages include
flexibility and optimized performance.
Disadvantages include increased complexity
in design and management.

## Network Hardware

### NIC (Network Interface Card)


A hardware component that connects a
computer to a network. NICs translate data
between the computer and the physical
network, contain a unique MAC address, and
can be integrated into the motherboard or
installed separately as expansion cards.
### Router
A device that forwards data packets
between computer networks, determining
the best path for data to travel. Routers
operate at the network layer (Layer 3) of the
OSI model, connect different networks (e.g.,
connecting a home network to the internet),
and often include additional features like
firewall protection, DHCP, and NAT.

### Switch
A device that connects multiple devices on a
local network and uses MAC addresses to
forward data to the correct destination.
Switches operate at the data link layer
(Layer 2) of the OSI model, create a
separate collision domain for each port, and
improve network efficiency by sending data
only to the intended recipient.

### Hub
A basic networking device that connects
multiple Ethernet devices together, making
them act as a single network segment. Hubs
operate at the physical layer (Layer 1) of the
OSI model, broadcast all incoming data to
every connected device, and are largely
obsolete, replaced by more efficient
switches.

### Modem
A device that modulates and demodulates
signals to enable data transmission over
communication lines like telephone or cable.
Cable modems convert digital signals from
computers to analog signals for transmission
over cable lines, while DSL modems use
telephone lines, and fiber modems handle
optical signals.

### Cables

#### Ethernet Cable


Copper-based cables with twisted pairs of
wires, commonly used in LANs. Categories
include Cat5e (up to 1 Gbps), Cat6 (up to 10
Gbps over shorter distances), and Cat8 (up
to 40 Gbps). Features include RJ45
connectors, maximum effective length of
100 meters, and varying levels of shielding
against interference.

#### Coaxial Cable


A cable with a central conductor surrounded
by insulation and a conducting shield. Used
for cable television and some legacy
network installations. Types include RG-6
(for cable TV and internet) and RG-59 (for
short-distance video applications). Features
include high bandwidth, good noise
immunity, and thicker profile than twisted
pair.

#### Fiber Optic Cable


Cables that use glass or plastic fibers to
transmit data as light pulses. Types include
single-mode (for long distances) and multi-
mode (for shorter distances). Features
include extremely high bandwidth (up to
terabits per second), immunity to
electromagnetic interference, long
transmission distances, and higher cost than
copper.
## Protocols

### TCP/IP (Transmission Control


Protocol/Internet Protocol)
The fundamental communication protocol
suite of the Internet. TCP provides reliable,
ordered delivery of data streams, while IP
handles addressing and routing. TCP/IP
operates through a four-layer model:
Network Interface, Internet, Transport, and
Application layers.

### HTTP (Hypertext Transfer Protocol)


An application layer protocol for transmitting
hypermedia documents on the World Wide
Web. Features include statelessness (each
request is independent), operation on port
80 by default, and support for various
methods (GET, POST, PUT, DELETE, etc.) for
interacting with web resources.

### HTTPS (Hypertext Transfer Protocol


Secure)
A secure version of HTTP that uses SSL/TLS
encryption for secure communication.
Features include operation on port 443 by
default, data encryption protecting against
eavesdropping and man-in-the-middle
attacks, and site authentication using digital
certificates.

### FTP (File Transfer Protocol)


A standard network protocol for transferring
files between computers over a TCP/IP
network. Features include operation on ports
20 (data) and 21 (control), support for
authentication, and separate connections for
commands and data transfer.

### SMTP (Simple Mail Transfer Protocol)


A protocol for sending email messages
between servers. Features include operation
on port 25 by default, handling outgoing
mail, and support for authentication
mechanisms to prevent unauthorized use for
sending spam.

### POP3 (Post Office Protocol version 3)


A protocol used by email clients to retrieve
email from a mail server. Features include
operation on port 110 by default,
downloading emails to the local device,
typically removing them from the server,
and simple authentication.

### IMAP (Internet Message Access


Protocol)
A protocol for retrieving email that keeps
messages on the server. Features include
operation on port 143 by default, support for
multiple folders and message flags,
synchronization across multiple devices, and
search capabilities within the server.

## Network Addressing

### IP Address (Internet Protocol Address)


A numerical label assigned to each device
connected to a computer network that uses
the Internet Protocol. IPv4 addresses are 32-
bit numbers expressed as four octets (e.g.,
192.168.1.1), while IPv6 addresses are 128-
bit expressed in hexadecimal notation. IP
addresses can be static (permanently
assigned) or dynamic (assigned temporarily
by DHCP).

### MAC Address (Media Access Control


Address)
A unique identifier assigned to a network
interface controller (NIC) for use as a
network address in communications within a
network segment. Also known as physical
address or hardware address. Features
include 48-bit length (typically displayed as
six pairs of hexadecimal digits),
manufacturer-assigned, and unchangeable
in most hardware.

## Network Security

### Firewalls
Security systems that monitor and control
incoming and outgoing network traffic based
on predetermined security rules. Types
include hardware firewalls (dedicated
devices), software firewalls (applications
running on computers), and cloud-based
firewalls. Firewall filtering methods include
packet filtering, stateful inspection, proxy
service, and next-generation features like
deep packet inspection.

### Antivirus
Software designed to detect, prevent, and
remove malicious software. Features include
real-time scanning, scheduled scans,
heuristic analysis to detect new threats,
virus signature database updates, and
behavior-based detection to identify
suspicious activity.

### Encryption
The process of encoding information to
prevent unauthorized access. Includes
symmetric encryption (same key for
encryption and decryption) and asymmetric
encryption (public key for encryption,
private key for decryption). Common
algorithms include AES, RSA, and ECC.
Applications include secure websites
(HTTPS), encrypted communications, VPNs,
and secure file storage.
## Network Architecture Models

### Client-Server Model


A distributed application structure that
partitions tasks between providers of
resources or services (servers) and service
requesters (clients). Servers provide
functions such as email exchange, web page
delivery, or database access. Features
include centralized control, easier security
implementation, and scalability for many
clients.

### Peer-to-Peer (P2P)


A decentralized networking model where
computers communicate directly with each
other without requiring a central server.
Applications include file sharing (BitTorrent),
cryptocurrency networks (Bitcoin), and
collaborative platforms. Features include
resource sharing among participants, no
need for dedicated server infrastructure,
and resilience through decentralization.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy