Computer Network Tutorial

Introduction of Computer Network Types of Computer Network Network Topology Computer Networking Architecture Transmission Modes (Data Flow) Basic Networking Devices Integrate Services Digital Network (ISDN)

Model

OSI Model TCP/IP Model

Physical Layer

Digital Transmission Analog Transmission Transmission Media Switching

Data Link Layer

Error detection and Error correction Data Link Control Multiple Access Aloha

Network Layer

Network Layer - Logical Address Address Mapping Unicast Routing Protocol

Transport Layer

Process to Process Delivery User Datagram Protocol Transmission Control Protocol Stream Control Transmission Protocol Session Layer and Presentation Layer

Application Layer

Domain Name System Application Protocol E-mail Cryptography

Misc

Classes of Routing Protocols Classification of Routing Algorithms Controlled Access Protocols in Computer Networks Differences between IPv4 and IPv6 Fixed and Flooding Routing Algorithms Advantages and Disadvantages of Fibre Optics Cable APIPA Difference between Active and Passive FTP Fiber Optics and its Types Method of Joining and Fusion of Fiber Optic Cable Define Framing in Computer Network Disadvantages of Computer Network Mesh Topology Diagram in Computer Network Ring Topology in Computer Network Star Topology in Computer Networks 4G Mobile Communication Technology Advantages and Disadvantages of LAN Advantages and Disadvantages of MAN Advantages and Disadvantages of WAN Application Layer in OSI Model Cyclic Redundancy Check Example Data link layer in OSI model Difference between Transport and Network Layer Hamming Code Example Network Layer in OSI Model Session Layer in OSI Model Transport Layer in OSI Model Two Port Network in Computer Networks Uses of Computer Networks What is Computer Network What is Framing in a Computer Network Advantages and Disadvantages of Bus Topology Difference between Star Topology and Bus Topology Subnetting in Computer Network Subnetting Questions and Answers What is Bus Topology What is Network Topology and Types in Computer Networks Access Control in Networking Basic Characteristics of Computer Network Benefits of SOCKS5 Proxy in Computer Networks Computer Network viva Questions Difference between BOOTP and RARP Difference Between Network Topologies and Network Protocols Difference between NFC and RFID Difference Between Point-to-Point Link and star Topology Network Differences Between MSS and MTU Differences Between Trunk Port and Access Port Different Modes of Communication in Computer Networks MIME Protocol in Computer Networks Modes of Communication in Computer Networks Network Attack in Computer Network Port Address in Networking Simplest Protocol in Computer Network Sliding Window Protocol in Computer Network Stop And Wait Protocol in Computer Networks TCP 3-Way Handshake Process in Computer Networks What is a Proxy Server What is APPN What is ICMP Protocol What is Point-to-Point Protocol What is Port Address in Networking What is the HDLC Protocol What is VRRP Protocol Difference Between Analog and Digital Signals Difference Between Hub and Repeater Difference between Repeater and Switch Difference Between Transparent Bridge and Source Routing Bridge Source Routing Bridge in Computer Networks Transparent Bridge in Computer Networks Transport Protocol in Computer Networks Types of CSMA in Computer Networks What is Wired and Wireless Networking Network Security in Computer Network Disadvantages of Extranet Difference Between TELNET and FTP Define Protocol in Computer Networks Guided Transmission Media in Computer Network What is a Gateway in a Computer Network IGMP in Computer Networks LAN Protocols in Computer Networks MAN Meaning in Computer Modulation Techniques in Computer Networks Switching in DCN TCP/IP Applications What is IGMP? What is Modem in Networking What is Non-Persistent CSMA Difference between Cell Splitting and Cell Sectoring Forouzen Computer Network Open Loop and Closed Loop Congestion Control Types of Cluster Computing WAP-Wireless Access Point What are the elements of the Transport Protocol Difference between Gateway and Switch Flow Control in Data Link Layer Body Area Network Flooding in Computer Network Token Ring in Computer Networks VoIP in Computer Networks What is Infrared Transmission Congestion Control Techniques Forward Error Correction (FEC) Switching Techniques What is Telnet in Computer Network What are the Types of IPv4 Addresses IEEE 802.6 (DQDB) IEEE 802.15.4 Technology What is HDLC (High-level Data Link Control)? What is SMS Hubbing in Telecom? Circuit Switching in Computer Networks Communication Satellites in Computer Networks Features of HTTP Protocol IMAP4 (Internet Message Access Protocol) Internet Services How to Set up a Wireless Router Internetwork Routing in Computer Networks Distributed Computing System Features of GSM The 802.11 MAC Sublayer Protocol What is IEEE 802.3? What are Hubs and Switches in Computer Networks? What is Modem in a Computer Network? What is multicasting in Computer Networks? GSM -The Mobile Station What is Network Server? Slotted Aloha in Computer Network What is Ethernet in Computer Networks What is Arpanet? Radio Access Network (RAN) TCP 3-Way Handshake Process PING SWEEP (ICMP SWEEP) Print Server Private IP Address Security Services in Computer Networks Protocol Data Unit (PDU) CSMA with Collision Avoidance (CSMA/CA) What is Gateway in Computer Network? Advantages of Networking Data Link Layer Design Issues DHCP in Computer Networks Internet Security Association and Key Management Protocol (ISAKMP) What is Switch Hub? Telnet Full form in Networking Multimedia Systems Quality of Service in Computer Networks What is Carrier Sense Multiple Access (CSMA)? What is Circuit Switching What is Duplex Network? What is Web Protocol Network LAN Technologies Classes in Computer Network Low-Density Parity Check (LDPC) Wireless Internet Service Providers(Wisps) What is Handshaking? Cache Server What Is WSN Network? Check Sum Error Detection Linear Bus Topology Functions of the Transport Layer Infrared Transmission in Computer Networks Digital Signal in Computer Network Digital Data Transmission in Computer Networks Define Checksum with Example Computer Network Security Requirements Brust Errors in Computer Network Back Side Bus (BSB) 2-Dimension Parity Check in Computer Network Router and Brouter Microwave Transmission in Computer Networks Magnetic Media in Computer Network A One-Bit Sliding Window Protocol CDMA-Near-Far Problem Reference Models in Computer Networks Uni-cast, Broadcast, and Multicast in Computer Networks Uses Of Bridges in Computer Networks What are Gateways in Computer Network? How to Set Up a Home Network – A 7-Step Guide GSM in Computer Networks Multicast Routing Protocols in Computer Networks Network Components Types of Ethernet in Computer Networks BGP vs.EIGRP-What's the difference? Green Cloud Computing and its Strategies Packet Switching Router in Computer Network Advantages and Disadvantages of Routers ATM Network Automatic Repeat ReQuest (ARQ) Static Routing Algorithms in Computer Network TDMA – Technology Data Link Layer services provided to the Network Layer Transmission Impairments in Computer Networks Types of Modems What are Elementary Data Link Layer Protocols What is an Ad-hoc Network? What is the IEEE 802.11 Wireless LAN Standards? What Is Tunneling in Computer Networks? What is Twisted Pair Cable Advantages of Unguided Media Ethernet Topology in Computer Network Optical Fiber Modes and Configurations Optical Sources in Optical Fiber Communication 4 Layers of TCP/IP Hierarchical Routing Algorithm in Computer Networks Meaning of Data Communication Metropolitan Area Network Responsibilities of Transport Layer The Functions of Hub in Networking Tree Topology in Computer Network Types of Connections in Computer Network Authentication in Computer Network Buffering in Computer Networks MAC Protocol and its Classification Difference between Circuit Switching and Packet Switching Difference between Session and Cookies Broadcasting in Computer Networks CDMA in Computer Networks CDMA-Technology Components of Computer Network CRC in Data Communication CSMA-CA Protocol in Computer Network Difference between LAN and VLAN DIFFERENCE BETWEEN PHYSICAL AND LOGICAL TOPOLOGY Difference between TDM and FDM Differences Between URL and IP Address Differentiate between Synchronous TDM and Asynchronous TDM in Computer Network Diffеrеntiate Bеtwееn Datagram Approach and Virtual Circuit in Computer Network FDDI in Computer Network Functions of Bridge IEEE 802.11 in Computer Networks Internetworking in Computer Networks MAC in Data Link Layer Mac Sub Layer in Computer Networks MAN Meaning in Computer Radio Wave Transmission Single Sign-On (SSO) Token Passing in Computer Network Types of Data Transmission Types of Transmission Media in Computer Networks Advantagеs and Disadvantagеs of Li-Fi Benefits of Client Server Computing Bus and its Types Characteristics of Analog Signals Characteristics of NOS Choke Packet in Congestion Control Congestion Control Policy CSMA/CA in Computer Network Data Communication and Transmission Techniques Data Compression in Computer Networks Diffеrеncе bеtwееn SSH and Tеlnеt Diffеrеncе bеtwееn Static IP Addrеss and Dynamic IP Addrеssa Fiber Distributed Data Interface Network Time Protocol(NTP) Routing in Adhoc Networks Working of DNS Time Division Multiplexing (TDM) Types of Packet Switching Types of Protocols Types of Transmission Technology Use of Bluetooth in Computer Networks What is BBS? What is Code Correction? IEEE 802.11 Wireless LAN What is Stateless Protocol? Advantages of Networking in Computers DHCP Protocol in Computer Networks Difference between UTP and STP Cable Explain FTP in Computer Network Explain Hierarchical Model Explain HTTP in Computer Network Explain Nested Structure with Example Open Systems Interconnection Model Parallel Database System SMTP in Computer Network Space Division Switching Transmission Control Protocol (TCP) Types of IP Address Types of Routing in Computer Networks What is Duplex Transmission Data Link Layer Protocols Network Layer Protocols Session Layer Protocols

Network Components

Introduction

Computer network components are the hardware and software required to set up computer networks at residences and places of business. The hardware consists of the transmission media, connecting devices, server, client, and peer.

Network Components

Software components include things like protocols and the operating system. A computer network is essentially a collection of multiple computers connected for the purpose of sharing resources and data. Wireless or cable-based media connect many PCs.

Functions of Network Devices

Following are the general functions of networking devices:

  • Increase network performance and optimize traffic flow.
  • Simplify network management and configuration.
  • Expand network coverage and get around signal limitations.
  • Facilitate data transmission and communication between devices.
  • Enable efficient and secure network connectivity.

Types of Network Devices

A network is created using a variety of network equipment. Some are boosters, while others are required for connections. The list of network equipment that can help your company transport information as safely as possible is provided below:

The first kinds of network devices were hubs, NICs, repeaters, modems (used for analogue phone lines), and bridges. In the 1990s, these devices were widely used. In the early years of the third millennium, DSL modems, leased line routers, WAPs, and firewalls were commonplace. Around 2010, VPN equipment became the norm, and IDS and IPS became stand-alone capabilities.

Switches

A switch is a multiport device that increases network efficiency. It enables connections to hubs and routers by maintaining restricted routing information about internal network nodes. They often read incoming packets' hardware addresses to send them to the right place.

Switches come in two main categories:

  • Modular switches: Systems can grow as needed or when network requirements change thanks to modular switches.
  • Constant configuration: The number of ports on switches is fixed and cannot be increased. They are less flexible, but they cost less.

You can manage or leave switches unmanaged. Users of managed switches can adjust parameters such as channel priority and LAN traffic. Unmanaged switches are for simple connections; users cannot adjust the parameters.

Due to their virtual circuit capability, switches outperform hubs and routers in terms of network efficiency. Consider a switch as a device that combines the advantages of hubs and routers.

Distributed denial of service (DDoS) assaults can take down switches; hostile traffic cannot stop the switch from happening because of flood guards. Switch port security is, therefore, essential, necessitating the protection of every switch. Use address resolution protocol (ARP), media access control (MAC) address filtering, dynamic host configuration protocol (DHCP) eavesdropping, and all unused ports to do this.

Bridges

Bridges transport frames using hardware MAC addresses. Using the MAC address of the connected devices for each segment, they can either forward or block data. Additionally, they can join two physical LANs to form a bigger logical LAN.

Two models can be used to set up bridges:

  • Remote bridging connects two connections via a wide area network (WAN)
  • Local bridging creates LAN connections using local wires.

Bridges and hubs are similar in many ways, such as how they link LAN components using the same protocols. Bridges, on the other hand, filter incoming frames data packets for addresses before forwarding them. Instead, the bridge uses a dynamic bridge table to filter and forward frames across the network. The addresses of each bridge interface that links the LAN to other LANs, as well as the LAN addresses of every machine in the LAN, are kept up to date by the bridge table, which is initially empty. Similar to hubs, bridges can have one or more ports.

In recent years, more useful switches have mostly replaced bridges. Because of their function, switches are also referred to as "multiport bridges."

Routers

A router's primary function is to direct traffic. Routers use various network topologies to map a route via networked devices and deliver messages to their intended locations. The majority of routers employs access control lists (ACLs) and function as firewalls that filter packets. These routers, often referred to as border routers, are located at the edge of your network and act as the external link between a LAN and a WAN.

Additionally, routers can be connected internally to other routers to create zones that function independently. They can also divide internal networks into two or more subnetworks. By keeping tables with information about destinations and local connections, routers facilitate communication. If the destination of a request is unknown, a router can provide information about the systems it is linked to as well as where to deliver the request.They must be set up to only pass traffic that network administrators have approved. The routers themselves have either a static or dynamic configuration:

Dynamic routers generate their routing tables using information about neighboring routers; static routers may only be configured manually and remain that way until altered.

Firewalls

A firewall controls what enters and exits a private network's internet traffic. They employ either whitelists or blacklists as programmed parameters to analyze and filter data packets. While blacklists reject all information that is within the parameters, whitelists only accept information that is inside a specific set of parameters. Private networks, particularly those handling sensitive data, must have firewalls. They are also used in corporate networks to prevent access between subgroups, like denying the sales department access to HR or IT files.

The kind of firewall that's best for you will depend on how you operate. There are several types of firewalls.

Among the most popular varieties of firewalls are:

  • Packet filtering: This process evaluates data packets based on their IP address, type, port number, or network protocols, serving as a network layer checkpoint.
  • State-driven inspection: It examines source IP, destination IP, source port, and destination port while analysing data at the network and transport layers.
  • Future-oriented: It checks for malware and identifies sophisticated threats by analysing the content of actual packets and all TCP handshake checks.

While there are benefits to all types of firewalls, packet filtering is the most basic type.  A stateful assessment strengthens defenses beyond recognition. The most extensive and safe firewall techniques are those of the next generation, which is why highly regulated sectors like healthcare and finance frequently employ them.

Repeaters

An electrical device known as a repeater amplifies a received signal by operating at the physical layer of the OSI model. After receiving a signal, it retransmits it with greater intensity or strength. Because of this, the signal can go farther with normal LAN cables up to 100 meters at times.

Repeaters can benefit anyone working in a large facility where Wi-Fi coverage may be patchy in the far corners of the room. They are useful in large office buildings, warehouses, laboratories, and campuses.

Gateways

To enable data transfer between destinations, gateways link networks using various protocols. Typically, these devices operate at the OSI model's Transport and Session layers. Gateways assist in handling the many protocols and standards from various vendors that are present at the Transport layer and above.

Networking technologies like Transmission Control Protocol/Internet Protocol (TCP/IP) and Open System Interconnection (OSI) are translated via gateways. As a result, gateways establish a connection between two or more independent networks, each of which has its own topology, routing algorithms, protocols, DNS, and network administration policies. They carry out every task a router does, plus more. Actually, a gateway is just a router with additional translation capabilities.

Hubs

Hubs operate exclusively on the Physical layer of the OSI to connect several computer networking devices. Hubs are not used for addressing or packet filtering. Rather, they distribute data packets to every linked device. In addition, a hub can serve as a repeater, boosting weak signals that have been transmitted over vast distances using connected connections. Since a hub links LAN components using the same protocols, it is the easiest device to attach to a network.

As long as the hub's configuration is set up to handle incoming data formats, it can handle both digital and analog data. For instance, the hub needs to transmit the incoming data in packets if it is in digital format. If the incoming data is analog, it transfers the data in the signal form.

There are two types of hubs:

  • Multiple-port hubs, some of which are extendable modularly, let users connect multiple devices.
  • A basic hub only has one port available for attaching a device to another network.

There are also active and passive hubs. Active hubs may strengthen the signal, much like a repeater, whereas passive hubs cannot. 

Modems

Network Components

Digital signals are transformed into analog signals at various frequencies by a modem (modulator-demodulator), which then sends the signals to another modem at the other end. A device connected to a modem, typically a computer, receives a digital output from the receiving modem, which also executes the reverse transformation. Typically, a serial line is used to send digital data to and from the modem using the RS-232 industry-standard interface.

Three primary categories of modems exist:

  • The slowest connection is a DSL modem, which uses telephone cables.
  • Cable modems send data over TV lines and are quicker than DSL.

Network Interface Cards (NICs)

An internal hardware component called a network interface card is what links a device to the internet. A device is connected to a network through the NIC at the TCP/IP layer. The NIC sends a signal to the network layer at the physical layer that carries data. After that, all data travels from the device to the server via the NIC and back again.

NICs come in two primary varieties:

  • A Wi-Fi NIC links to a wireless network.
  • An Ethernet NIC has an 8P8C socket to attach an Ethernet cable.

The majority of computers still contain an Ethernet chip. However, mobile devices only have a wireless NIC. Although they are more dependable, Ethernet ports restrict the user's movement when using the gadget.

Wireless Access Points (WAPs)

A transceiver, which is a device that combines a transmitter and a receiver, is what makes up a wireless access point. (WLAN). Separate network devices and WAPs come with an integrated transmitter, antenna, and adaptor. WAPs act as a connecting point between WLANs and wired Ethernet LANs using the wireless infrastructure network mode. Additionally, they feature many ports, which lets you grow the network and accommodate more users.

Depending on the network's size, one or more WAPs may be needed to offer complete coverage. The range of the wireless network is increased, and more wireless clients can access the network with additional WAPs. The farthest distance a client can be from a WAP and still receive a respectable signal and data processing speed is known as the WAP's transmission range. The wireless standard, obstacles, and surrounding circumstances between the client and the WAP all affect the distance. With their powerful antennae, higher-end WAPs are able to increase the wireless signal's range. In order to expand a network's capacity and provide firewall functionality and Dynamic Host Configuration Protocol (DHCP) service, WAPs may also offer a large number of ports. As a result, a WAP can function as a switch, router, firewall, or DHCP server.

To establish a connection to a wireless network, you need to know the name of the service set identifier (SSID). The SID is used to identify all systems that are part of the same network. The SSID of the WAP may be broadcast, making it visible to all nearby wireless clients. Nevertheless, APs can be set not to broadcast the SSID for security reasons, which means that an administrator must provide the SSID to client systems rather than relying on them to find it on their own. Default channels, passwords, usernames, security settings, and SSIDs are pre-installed on wireless devices. Since many websites provide the default settings used by manufacturers, it is strongly advised that these settings be changed as soon as possible for security reasons.

WAPs may be slender or obese. Fat APs, also known as autonomous FAPs, require human network and security configuration. Until they are unable to continue serving clients, they are left alone. With a controller, thin APs enable configuration from a distance. Thin clients are easily reconfigured and monitored because they are not manually configured.

Conclusion

The bottom line is that every element of a computer network hardware, software, and network protocols contributes significantly to the effective transfer of data. Software is the program that runs on hardware devices, such as NICs and hubs, while protocols are the set of rules that specify how data is received and delivered over internet networks. Hardware devices are the actual physical components of computer networks.