Professional Documents
Culture Documents
Application:
Connection o The application layer is the layer that the users and user-
connection refers to pieces of related information that are applications most often interact with. Network
transferred through a network. This generally infers that a communication is discussed in terms of availability of
connection is built before the data transfer (by following the resources, partners to communicate with, and data
procedures laid out in a protocol) and then is deconstructed at the synchronization.
at the end of the data transfer. Presentation:
Packet o The presentation layer is responsible for mapping resources
A packet is, generally speaking, the most basic unit that is and creating context. It is used to translate lower level
transferred over a network. When communicating over a network, networking data into data that applications expect to see.
packets are the envelopes that carry your data (in pieces) from one Session:
end point to the other. o The session layer is a connection handler. It creates,
Packets have a header portion that contains information about the maintains, and destroys connections between nodes in a
packet including the source and destination, timestamps, network persistent way.
hops, etc. The main portion of a packet contains the actual data Transport:
being transferred. It is sometimes called the body or the payload. o The transport layer is responsible for handing the layers above
Network Interface it a reliable connection. In this context, reliable refers to the
A network interface can refer to any kind of software interface to ability to verify that a piece of data was received intact at the
networking hardware. For instance, if you have two network cards other end of the connection.
in your computer, you can control and configure each network Network:
interface associated with them individually. o The network layer is used to route data between different
LAN: nodes on the network. It uses addresses to be able to tell
LAN stands for "local area network". It refers to a network or a which computer to send information to. This layer can also
portion of a network that is not publicly accessible to the greater break apart larger messages into smaller chunks to be
internet. A home or office network is an example of a LAN. reassembled on the opposite end.
WAN: Data Link:
WAN stands for "wide area network". It means a network that is o This layer is implemented as a method of establishing and
much more extensive than a LAN. While WAN is the relevant term maintaining reliable links between different nodes or devices
to use to describe large, dispersed networks in general, it is usually on a network using existing physical connections.
meant to mean the internet, as a whole. Physical:
Protocol o The physical layer is responsible for handling the actual
A protocol is a set of rules and standards that basically define a physical devices that are used to make a connection. This layer
language that devices can use to communicate. There are a great involves the bare software that manages physical connections
number of protocols in use extensively in networking, and they are as well as the hardware itself (like Ethernet).
often implemented in different layers. TCP/IP Model
Port o The TCP/IP model, more commonly known as the Internet
A port is an address on a single machine that can be tied to a protocol suite, is another layering model that is simpler and
specific piece of software. It is not a physical interface or location, has been widely adopted. It defines the four separate layers,
but it allows your server to be able to communicate using more some of which overlap with the OSI model:
than one application. - Application
Firewall - Transport
A firewall is a program that decides whether traffic coming into a - Internet
server or going out should be allowed. A firewall usually works by - Link
creating rules for which type of traffic is acceptable on which ports.
Generally, firewalls block ports that are not used by a specific Application:
application on a server. o In this model, the application layer is responsible for creating
NAT and transmitting user data between applications. The
NAT stands for network address translation. It is a way to translate applications can be on remote systems, and should appear to
requests that are incoming into a routing server to the relevant operate as if locally to the end user.
devices or servers that it knows about in the LAN. This is usually
implemented in physical LANs as a way to route requests through Transport:
one IP address to the necessary backend servers. o The transport layer is responsible for communication between
VPN processes. This level of networking utilizes ports to address
VPN stands for virtual private network. It is a means of connecting different services. It can build up unreliable or reliable
separate LANs through the internet, while maintaining privacy. This connections depending on the type of protocol used.
is used as a means of connecting remote systems as if they were on
a local network, often for security reasons. Internet:
OSI Model o The internet layer is used to transport data from node to node in a
Historically, one method of talking about the different layers of network. This layer is aware of the endpoints of the connections,
network communication is the OSI model. OSI stands for Open but does not worry about the actual connection needed to get
Systems Interconnect. from one place to another. IP addresses are defined in this layer as
This model defines seven separate layers. The layers in this model a way of reaching remote systems in an addressable manner.
are:
- Application Link:
- Presentation o The link layer implements the actual topology of the local network
- Session that allows the internet layer to present an addressable interface.
- Transport It establishes connections between neighboring nodes to send
- Network data.
- Data Link
Interfaces • Session
o Interfaces are networking communication points for your • Transport
computer. Each interface is associated with a physical or virtual • Network
networking device. • Data Link
o Typically, your server will have one configurable network interface • Physical
for each Ethernet or wireless internet card you have.
o In addition, it will define a virtual network interface called the APPLICATION LAYER
"loopback" or local host interface. This is used as an interface to The application layer is the layer that the users and user-applications most
connect applications and processes on a single computer to other often interact with. Network communication is discussed in terms of
applications and processes. You can see this referenced as the "lo" availability of resources, partners to communicate with, and data
interface in many tools. synchronization. This layer contains a variety of commonly needed functions:
Media Access Control • Resource sharing and device redirection
o Media access control is a communications protocol that is used to • Remote printer access
distinguish specific devices. Each device is supposed to get a unique • Network management
MAC address during the manufacturing process that differentiates • Electronic messaging (such as mail)
it from every other device on the internet. • Remote file access
o Addressing hardware by the MAC address allows you to reference a • Inter-process communication
device by a unique value even when the software on top may • Directory services
change the name for that specific device during operation. • Network virtual terminals
o Media access control is one of the only protocols from the link
layer that you are likely to interact with on a regular basis. PRESENTATION LAYER
The presentation layer formats the data to be presented to the application
IP layer. This layer may translate data from a format used by the application
o The IP protocol is one of the fundamental protocols that allow the layer into a common format at the sending station, then translate the
internet to work. IP addresses are unique on each network and common format to a format known to the application layer at the receiving
they allow machines to address each other across a network. It is station.
implemented on the internet layer in the IP/TCP model. The presentation layer provides:
o Networks can be linked together, but traffic must be routed when • Character code translation: for example, ASCII to EBCDIC.
crossing network boundaries. This protocol assumes an unreliable • Data conversion: bit order, CR-CR/LF, integer-floating point, and so
network and multiple paths to the same destination that it can on.
dynamically change between. • Data compression: reduces the number of bits that need to be
transmitted on the network.
ICMP • Data encryption: encrypt data for security purposes. For example,
o ICMP stands for internet control message protocol. It is used to password encryption.
send messages between devices to indicate the availability or error
conditions. These packets are used in a variety of network SESSION LAYER
diagnostic tools, such as ping and trace route. The session layer is a connection handler. It creates, maintains, and destroys
HTTP connections between nodes in a persistent way. It provides:
o HTTP stands for hypertext transfer protocol. It is a protocol defined • Session establishment, maintenance and termination: allows two
in the application layer that forms the basis for communication on application processes on different machines to establish, use and
the web. terminate a connection, called a session.
HTTP defines a number of functions that tell the remote system what you are • Session support: performs the functions that allow these processes
requesting. For instance, GET, POST, and DELETE all interact with the to communicate over the network, performing security, name
requested data in a different way. recognition, logging, and so on.
Bus Topology
Tree Topology
A bus network is a network topology in which nodes are directly
connected to a common linear (or branched) half-duplex link called
This is a "hybrid" topology that combines characteristics of linear
a bus.
bus and star topologies. In a tree network, groups of star-
Main Advantage: It's easy to connect a computer or device and
configured networks are connected to a linear bus backbone
typically it requires less cable than a star topology.
cable.
Main Disadvantage: The entire network shuts down if there is a
Main Advantage: A Tree topology is a good choice for large
break in the main wire and it can be difficult to identify the
computer networks as the tree topology "divides" the whole
problem if the network shuts down.
network into parts that are more easily manageable.
Main Disadvantage: The entire network depends on a central hub
and a failure of the central hub can cripple the whole network.
Mesh Topology
NETWORK HARDWARE
In a mesh network, devices are connected with many redundant • also known as network equipment or computer networking
interconnections between network nodes. In a true mesh topology devices, are physical devices which are required for
every node has a connection to every other node in the network. communication and interaction between devices on a computer
network.
Routers
A device that connects any number of LANs.
Uses standardized protocols to move packets efficiently to their
destination.
A router is a network device which is responsible for routing traffic
from one to another network.
Hubs
An unintelligent network device that sends one signal to all of the
stations connected to it.
Star Topology Hubs are used for star topology networks, but they are often used
with other configurations to make it easy to add and remove
In a star network devices are connected to a central computer, computers without bringing down the network.
called a hub. Nodes communicate across the network by passing Switch
data through the hub. is a device that connects a number of computers together to make
Main Advantage: In a star network, one malfunctioning node a LAN.
doesn't affect the rest of the network. Split large networks into small segments, decreasing the number of
Main Disadvantage: If the central computer fails, the entire users sharing the same network resources and bandwidth.
network becomes unusable. The typical use of a switch is at the centre of a star network (or as
part of a hybrid network) - the switch has cables plugged into it
from each computer.
Bridge
• Ha single input and single output port
• Is a network device that typically links together two different parts
of a LAN.
Repeater
• Connectivity devices that regenerate and amplify an analog or
digital signal
• Can not connect different network architecture.
• Is an electronic device that amplifies the signal it receives.
Modem Peer-to-peer
• A modem stands for (Modulator and Demodulator).
• it modulates and demodulates the signal between the digital data o network operating systems allow users to share
of a computer and the analogue signal of a telephone line. resources and files located on their computers and to
Firewall access shared resources found on other computers. In a
• Is a device, or a piece of software that is placed between your peer-to-peer network, all computers are considered
computer and the rest of the network. equal; they all have the same privileges to use the
• a piece of hardware or software put on the network to prevent resources available on the network.
some communications forbidden by the network policy. o Peer-to-peer networks are designed primarily for small to
Proxy Server medium local area networks. Windows for Workgroups is
• computer network service which allows clients to make indirect an example of the program that can function as peer-to-
network connections to other network services. peer network operating
• Is a computer setup to share a resource, usually an Internet
connection.
Network Cable
• Cables are still used in most networks, rather than using only
wireless, because they can carry much more data per second, and
are more secure (less open to hacking).
Network Interface Card systems.
• Connectivity devices enabling a workstation, server, printer, or Client/server
other node to receive and transmit data over the network media o network operating systems allow the network to
centralize functions and applications in one or more
dedicated file servers. The file servers become the heart
Network Operating System of the system, providing access to resources and
providing security.
is an operating system that includes special functions for o The workstations (clients) have access to the resources
connecting computers and devices into a local-area network (LAN) available on the file servers. The network operating
or Inter-network. system allows multiple users to simultaneously share the
same resources irrespective of physical location. Novell
Netware and Windows 2000 Server are examples of
client/ server network operating systems.
Duplex
A duplex communication system is a point-to-point system
composed of two connected parties or devices that can
communicate with one another in both directions.
"Du" comes from "duo" that means "double", and "plex" that
means "structure" or "parts of“.
An operating system that provides the connectivity among a
Simplex
number of autonomous computers is called a network operating
The simplex transmission is the one that travels in only one
system. A typical configuration for a network operating system is a
direction
collection of personal computers along with a common printer,
There are Two types of Duplex Communication System:
server and file server for archival storage, all tied together by a
o Half Duplex
local network.
The half-duplex transmission is capable of
Short for network operating system, NOS is the software that
sending signal in both directions, but in only
allows multiple computers to communicate, share files and
one direction at a time. Some networks use
hardware devices with one another. Some examples of network
half-duplex transmission, but it is required to
operating systems include Novell NetWare, Microsoft Windows NT,
specify this requirement for all the nodes in the
Microsoft Windows 2000, Microsoft Windows XP, Sun Solaris,
network.
Linux, etc.
Example:
Features of Network Operating System
device is a walkie-talkie two-way
o Provide basic operating system features such as support for
radio that has a "push-to-talk"
processors, protocols, automatic hardware detection and support
button;
multi-processing of applications.
o Full-Duplex
o Provide security features such as authentication, logon
Full-duplex data transmission means that data
restrictions and access control.
can be transmitted in both directions on a
o Provide name and directory services.
signal carrier at the same time.
o Provide file, print, web services and back-up services.
It allows signal transmission in both directions
o Support Internetworking such as routing and WAN ports.
simultaneously.
o User management and support for logon and logoff, remote
Example:
access; system management, administration and auditing tools
a telephone is a full-duplex device
with graphical interfaces.
because both parties can talk at once.
o
The Difference between Half Duplex & Full Duplex
Peer-to-peer and Client / server.
Half-duplex is used to describe communication where only... one
Mainly there are two types of network operating systems named as
side can talk at a time.
peer-to-peer and client / server.
Full-duplex is used to describe communication where both sides
are able to send and receive data at the same time.
In depth tcp/ip networking information for every other gateway on the Internet, it
• Subnetting would be overtaxed. Instead, each handles only a
• Subnetting separates a network into multiple logically relatively small amount of addressing information, which
defined segments, or subnets. Networks are commonly it uses to forward data to another gateway that knows
subnetted according to geographic locations, more about the data’s destination. The gateways that
departmental boundaries, or technology types. make up the internet backbone are called core gateways.
• A network administrator might separate traffic to • Address Translation
accomplish the following… • An organizations default gateway can also be used to
• Enhance security “hide” the organizations internal IP addresses and keep
• Improve performance them from being recognized on a public network.
• Simplify troubleshooting • A public network is one that any user may access with
• The challenges of Classful Addressing in IPv4 (No subnetting) little or no restrictions.
• The simplest type of IPv4 is known as classful addressing • On private networks, hiding IP addresses allows network
(which was the Class A, Class B & Class C network managers more flexibility in assigning addresses. Clients
addresses). behind a gateway may use any IP addressing scheme,
• Classful addressing has the following limitations. regardless of whether it is recognized as legitimate by the
• Restriction in the number of usable IPv4 addresses (class Internet authorities but as soon as those devices need to
C would be limited to 254 addresses) go on the internet, they must have legitimate IP
• Difficult to separate traffic from various parts of a addresses to exchange data.
network • When a clients transmission reaches the default gateway,
• IPv4 Subnet Masks the gateway opens the IP datagram and replaces the
• Subnetting depends on the use of subnet masks to client’s private IP address with an Internet recognized IP
identify how a network is subdivided. A subnet mask address. This process is known as NAT (Network Address
indicates where network information is located in an IPv4 Translation).
address. • TCP/IP Mail Services
• The 1 in a subnet mask indicates that corresponding bits • All Internet mail services rely on the same principles of
in the IPv4 address contain network information (likewise mail delivery, storage, and pickup, though they may use
0 indicates the opposite) different types of software to accomplish these functions.
• Each network class is associated with a default subnet • Email servers and clients communicate through special
mask… TCP/IP application layer protocols. These protocols, all of
• Class A = 255.0.0.0 which operate on a variety of operating systems are
• Class B = 255.255.0.0 discussed below…
• Class C = 255.255.255.0 • MIME (Multipurpose Internet Mail Extensions)
• An example of calculating the network ID for a particular • The standard message format specified by SMTP allows
device with a subnet mask is shown below.. for lines that contain no more than 1000 ascii characters
• IP Address = 199.34.89.127 meaning if you relied solely on SMTP you would have
• Subnet Mask = 255.255.255.0 very short messages and nothing like pictures included in
• Resultant Network ID = 199.34.89.0 an email.
• IPv4 Subnetting Techniques • MIME us a standard for encoding and interpreting binary
• Subnetting breaks the rules of classful IPv4 addressing. files, images, video, and non-ascii character sets within
• CIDR (classless Interdomain Routing) an email message.
• CIDR is also known as classless routing or supernetting. • MIME identifies each element of a mail message
• In CIDR conventional network class distinctions do not according to content type.
exist, a subnet boundary can move to the left, therefore • MIME does not replace SMTP but works in conjunction
generating more usable IP addresses on your network. A with it.
subnet created by moving the subnet boundary to the • Most modern email clients and servers support MIME
left is known as a supernet. • POP (Post Office Protocol)
• With CIDR also came new shorthand for denoting the • POP is an application layer protocol used to retrieve
position of subnet boundaries known as CIDR notation or messages from a mail server
slash notation. CIDR notation takes the form of the • POP3 relies on TCP and operates over port 110
network ID followed by a forward slash (/) followed by • With POP3 mail is delivered and stored on a mail server
the number of bits that are used for the extended until it is downloaded by a user
network prefix. • Disadvantage of POP3 is that it typically does not allow
• To take advantage of classless routing, your networks users to save their messages on the server because of
routers must be able to interpret IP addresses that don;t this IMAP is sometimes used
adhere to conventional network class parameters. • IMAP (Internet Message Access Protocol)
Routers that rely on older routing protocols (i.e. RIP) are • IMAP is a retrieval protocol that was developed as a more
not capable of interpreting classless IP addresses. sophisticated alternative to POP3
• Internet Gateways • The single biggest advantage IMAP4 has over POP3 is that
• Gateways are a combination of software and hardware users can store messages on the mail server, rather than
that enable two different network segments to exchange having to continually download them
data. A gateway facilitates communication between • Users can retrieve all or only a portion of any mail
different networks or subnets. Because on device cannot message
send data directly to a device on another subnet, a • Users can review their messages and delete them while
gateway must intercede and hand off the information. the messages remain on the server
Every device on a TCP/IP based network has a default • Users can create sophisticated methods of organizing
gateway (a gateway that first interprets its outbound messages on the server
requests to other subnets, and then interprets its • Users can share a mailbox in a central location
inbound requests from other subnets). • Disadvantages of IMAP are typically related to the fact
• The internet contains a vast number of routers and that it requires more storage space on the server.
gateways. If each gateway had to track addressing •
• Additional TCP/IP Utilities security risks. It's called static because it doesn't change. It's the
• Nearly all TCP/IP utilities can be accessed from the exact opposite of a dynamic IP address, which does change.
command prompt on any type of server or client running Routers, phones, tablets, desktops, laptops, and any other device
TCP/IP. The syntaxt may differ depending on the OS of that can use an IP address can be configured to have a static IP
the client. address. This might be done through the device giving out IP
• Below is a list of additional TCP/IP utilities – research addresses (like the router) or by manually typing the IP address
their use on your own! into the device from the device itself. Static IP addresses are also
• Ipconfig (Windows) & Ifconfig (Linux) sometimes referred to as fixed IP addresses or dedicated IP
• Netstat addresses.
• Nbtstat Static IP address advantages include:
• Hostname, Host & Nslookup • Lower costs
• Dig (Linux) • Email server hosting capabilities
• Whois (Linux) • Easy maintenance
• Traceroute (Tracert) • Ideal for online gaming
• Mtr (my traceroute) Static IP address disadvantages include:
• Route • Devices that has static IP have to configure manually
Ifconfig • Poor security
• Some common operations include…
• -a – Applies the command to all interfaces on a Static vs Dynamic IP Addresses
device, can be used with other switches The opposite of a never-changing static IP address is an ever-
• down – Marks the interface as unavailable to changing dynamic IP address. A dynamic IP address is just a regular
the network address like a static IP is, but it's not permanently tied to any
• up – Reinitializes the interface after it has been particular device. Instead, they're used for a specific amount of
taken “down” so that it is once again available time and then returned to an address pool so that other devices
to the network can use them.
Dig This is one reason that dynamic IP addresses are so useful. If
Stands for domain information groper. an ISP were to use static IP addresses for all of their customers,
Dig allows you to query a DNS database and find the that would mean that there'd constantly be a limited supply of
host name associated with a specific IP address or addresses for new customers. Dynamic addresses provide a way for
vice versa. IP addresses to be reused when they're not in use elsewhere,
Dig is useful for helping network administrators providing internet access for many more devices than what would
diagnose DNS problems otherwise be possible.
Dig can provide more information than nslookup Static IP addresses limit downtime. When dynamic addresses
Dig is included with UNIX and Linux operating obtain a new IP address, any user that's connected to the existing
systems one will be kicked off from the connection and have to wait to find
Dynamic Host Configuration Protocol (DHCP) the new address. This wouldn't be a wise setup to have if the
• Dynamic Host Configuration Protocol (DHCP) is a client/server server is hosting a website, a file sharing service, or an online video
protocol that automatically provides an Internet Protocol (IP) host game, all of which normally require constantly active connections.
with its IP address and other related configuration information The public IP address assigned to the routers of most home and
such as the subnet mask and default gateway. business users is a dynamic IP address. Larger companies usually do
• There are more than one billion computers in the world, and each not connect to the internet via dynamic IP addresses; instead, they
individual computer needs its own IP address whenever it's online. have static IP addresses assigned to them which do not change.
The TCP/IP protocols (our computers' built-in, internal networking
software) include a DHCP protocol. It automatically assigns and Static and DHCP Addressing
keeps tabs of IP addresses and any "subnetworks" that require Most IP networks use dynamic addressing via DHCP (Dynamic Host
them. Nearly all IP addresses are dynamic, as opposed to "static" IP Configuration Protocol) rather than static IP assignment, because
addresses that never change. dynamic IP addresses are the most efficient for the service
• DHCP is a part of the "application layer," which is just one of the provider. Dynamic addressing is convenient because it's easy for
several TCP/IP protocols. All of the processing and figuring out of administrators to set up. DHCP works automatically with minimal
what to send to whom happens virtually instantly. intervention needed, allowing mobile devices to easily move
• The key word in DHCP is "dynamic." Because instead of having just between different networks.
one fixed and specific IP address, most computers will be assigned
one that is available from a subnet or "pool" that is assigned to the However, static IP addressing offers some advantages to some users:
network. The Internet isn't one big computer in one big location. • A static IP address best supports name resolution across wide area
It's an interconnected network of networks, all created to make networks (WANs), enabling devices to be reliably reached by their
one-on-one connections between any two clients that want to assigned host names. Web and FTP servers often use fixed
exchange information. addressing for this reason.
• One of the features of DHCP is that it provides IP addresses that • Using static IP addresses on home networks provides slightly better
"expire." When DHCP assigns an IP address, it actually leases that protection against network security problems than does DHCP
connection identifier to the user's computer for a specific amount address assignment.
of time. The default lease is five days. • Download and upload speeds are often faster with static IPs than
Static Ip Address with dynamic IP
A static Internet Protocol (IP) address (static IP address) is a
permanent number assigned to a computer by an Internet service
provider (ISP). It is an IP address that was manually configured for a
device, versus one that was assigned via a DHCP server. Static IP
addresses are useful for gaming, website hosting or Voice over
Internet Protocol (VoIP) services. Speed and reliability are key
advantages. Because a static address is constant, systems with
static IP addresses are vulnerable to data mining and increased