Networking Notes
Networking Notes
It includes devices housed in a single room to millions of devices spread across the world.
Following are the popular types of Computer Network:-
•WAN (wide area network): As the name implies, a WAN connects computers over
a wide area, such as from region to region or even continent to continent. The internet
is the largest WAN, connecting billions of computers worldwide. You will typically see
collective or distributed ownership models for WAN management.
•MAN (metropolitan area network): MANs are typically larger than LANs but
smaller than WANs. Cities and government entities typically own and manage MANs.
•PAN (personal area network): A PAN serves one person. For example, if you have
an iPhone and a Mac, it’s very likely you’ve set up a PAN that shares and syncs
content—text messages, emails, photos, and more—across both devices.
PAN
•SAN (storage area network): A SAN is a specialized network that provides access to block-
level storage—shared network or cloud storage that, to the user, looks and works like a
storage drive that’s physically attached to a computer.
•CAN (campus area network): A CAN is also known as a corporate area network. A CAN is
larger than a LAN but smaller than a WAN. CANs serve sites such as colleges, universities,
and business campuses.
•VPN (virtual private network): A VPN is a secure, point-to-point connection between two
network end points (see ‘Nodes’ below). A VPN establishes an encrypted channel that keeps
a user’s identity and access credentials, as well as any data transferred, inaccessible to
hackers.
Important terms and concepts
The following are some common terms to know when discussing computer networking:
•IP address: An IP address is a unique number assigned to every device connected to a
network that uses the Internet Protocol for communication. Each IP address identifies
the device’s host network and the location of the device on the host network. When
one device sends data to another, the data includes a ‘header’ that includes the IP
address of the sending device and the IP address of the destination device.
•Nodes: A node is a connection point inside a network that can receive, send, create, or
store data. Each node requires you to provide some form of identification to receive
access, like an IP address. A few examples of nodes include computers, printers,
modems, bridges, and switches. A node is essentially any network device that can
recognize, process, and transmit information to any other network node.
•Routers: A router is a physical or virtual device that sends information contained in data packets
between networks. Routers analyze data within the packets to determine the best way for the
information to reach its ultimate destination. Routers forward data packets until they reach their
destination node.
•Switches: A switch is a device that connects other devices and manages node-to-node
communication within a network, ensuring data packets reach their ultimate destination. While a
router sends information between networks, a switch sends information between nodes in a
single network. When discussing computer networks, ‘switching’ refers to how data is transferred
between devices in a network. The three main types of switching are as follows:
• Circuit switching, which establishes a dedicated communication path between nodes in a
network. This dedicated path assures the full bandwidth is available during the
transmission, meaning no other traffic can travel along that path.
• Packet switching involves breaking down data into independent components called packets
which, because of their small size, make fewer demands on the network. The packets travel
through the network to their end destination.
• Message switching sends a message in its entirety from the source node, traveling from
switch to switch until it reaches its destination node.
Hubs:
Hubs are networking devices operating at a physical layer of the OSI model that are used to
connect multiple devices in a network. They are generally used to connect computers in a LAN.
A hub has many ports in it. A computer which intends to be connected to the network is
plugged in to one of these ports. When a data frame arrives at a port, it is broadcast to every
other port, without considering whether it is destined for a particular destination device or not.
Gateway:
A gateway is a network node that forms a
passage between two networks operating with
different transmission protocols. The most
common type of gateways, the network
gateway operates at layer 3, i.e. network layer
of the OSI (open systems interconnection)
model. However, depending upon the
functionality, a gateway can operate at any of
the seven layers of OSI model.
Addresses in IPv4 are 32-bits long. This allows for a maximum of 4,294,967,296 (232) unique addresses.
Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2128) unique addresses. An IP address is, as
such, generally shown as 4 octets of numbers from 0-255 represented in decimal form instead of binary
form.
For example, the address 168.212.226.204 represents the 32-bit binary number
10101000.11010100.11100010.11001100
The binary number is important because that will determine which class of network the IP address
belongs to.
An IPv4 address is typically expressed in dotted-decimal notation, with every eight bits (octet)
represented by a number from one to 255, each separated by a dot. An example IPv4 address would look
like this:
192.168.17.43
IPv4 addresses are composed of two parts. The first numbers in the address specify the network, while
the latter numbers specify the specific host. A subnet mask specifies which part of an address is the
network part, and which part addresses the specific host.
Private Addresses
Within the address space, certain networks are reserved for private networks. Packets from these networks are
not routed across the public internet. This provides a way for private networks to use internal IP addresses
without interfering with other networks. The private networks are:-
10.0.0.1 - 10.255.255.255
172.16.0.0 - 172.31.255.255
224.0.0.0 IP Multicast
The IPv6 has a theoretical limit of 3.4 x 1038 addresses. That’s over 340 undecillion addresses,
which is reportedly enough addresses to assign one to every single atom on the surface of the
earth.
IPv6 addresses are represented by eight sets of four hexadecimal digits, and each set of numbers
is separated by a colon. An example IPv6 address would look like this:
2DAB:FFFF:0000:3EAE:01AA:00FF:DD72:2C4A
TCP – Transmission Control Protocol
TCP stands for Transmission Control Protocol. It is a transport layer protocol that
facilitates the transmission of packets from source to destination. It is a connection-
oriented protocol that means it establishes the connection prior to the communication
that occurs between the computing devices in a network. This protocol is used with an IP
protocol, so together, they are referred to as a TCP/IP.
TCP initially set-up a three-way handshake process between the source and destination
and then it splits the data into small chunks known as segments, and includes a header
into every segment and then forwards it to Internet layer.
TCP Header format -20 Bytes
•Options
It provides additional options. The
optional field is represented in 32-
bits. If this field contains the data
less than 32-bit, then padding is
required to obtain the remaining
bits.
UDP
•UDP stands for User Datagram Protocol.
•UDP is a simple protocol and it provides non sequenced transport functionality.
•UDP is a connectionless protocol.
•This type of protocol is used when reliability and security are less important than speed
and size.
•UDP is an end-to-end transport level protocol that adds transport-level addresses,
checksum error control, and length information to the data from the upper layer.
•The packet produced by the UDP protocol is known as a user datagram.
UDP Header-8 Bytes
Differences b/w TCP & UDP
4.DHCP –
DHCP stands for Dynamic Host Configuration Protocol. It provides IP addresses to hosts.
Whenever a host tries to register for an IP address with the DHCP server, DHCP server
provides lots of information to the corresponding host. DHCP uses port numbers 67 and 68.
5.FTP –
FTP stands for File Transfer Protocol. This protocol helps to transfer different files from one
device to another. FTP promotes sharing of files via remote computer devices with reliable,
efficient data transfer. FTP uses port number 20 for data access and port number 21 for
data control.
6.SMTP –
SMTP stands for Simple Mail Transfer Protocol. It is used to transfer electronic mail from
one user to another user. SMTP is used by end users to send emails with ease. SMTP uses
port numbers 25 and 587.
7.HTTP –
HTTP stands for Hyper Text Transfer Protocol. It is the foundation of the World Wide Web
(WWW). HTTP works on the client server model. This protocol is used for transmitting
hypermedia documents like HTML. This protocol was designed particularly for the
communications between the web browsers and web servers, but this protocol can also
be used for several other purposes. HTTP uses port number 80.
Port Number Application Transport
Port Number
Protocol Protocol
A port number is a way to identify
a specific process to which an HTTP TCP 80
internet or other network HTTPS TCP 443
message is to be forwarded when
it arrives at a server. FTP(control) TCP 21
Each port number have a distinct FTP(data) TCP 20
service, and for each host can SSH TCP 22
have 65535 ports per IP
address. Internet Assigned Telnet TCP 23
Numbers Authority (IANA) is DNS TCP, UDP 53
responsible for managing the uses
SMTP TCP 25
of these ports.
Post Office TCP 110
Protocol(POP3)
Network Time UDP 123
Protocol(NTP)
Network Security refers to the measures taken by any enterprise or organisation to secure
its computer network and data using both hardware and software systems. This aims at
securing the confidentiality and accessibility of the data and network. Every company or
organisation that handles large amount of data, has a degree of solutions against
many cyber threats.
Secure Socket Layer (SSL) provides security to the data that is transferred between web
browser and server. SSL encrypts the link between a web server and a browser which
ensures that all data passed between them remain private and free from attack.