Computer Networks Exclusive Notes 1694016574
Computer Networks Exclusive Notes 1694016574
Network Topology:
Network topology refers to the arrangement or layout of a computer network, showing how devices and cables are
interconnected.
1) Star Topology:
In a star topology, all nodes are connected to a central device. This central device acts as a hub, and each node
communicates directly with it.
https://telegram.me/PrepTrain 1
Join PrepTrain Community for latest Internship and Job Updates.
2) Ring Topology:
Ring topology is a type of network configuration where each node is precisely connected to two or more
neighboring nodes, creating a continuous circular path for data transmission.
3) Bus Topology:
Bus topology is a network configuration where all nodes are connected to a single cable, referred to as the
central cable or bus.
How it Works:
https://telegram.me/PrepTrain 2
Join PrepTrain Community for latest Internship and Job Updates.
In bus topology, the central cable acts as a shared communication medium. When a device needs to send data
to other devices, it transmits the data over the bus, which then distributes the data to all connected devices.
Suitability:
Bus topology is suitable for small networks with a limited number of devices.
Disadvantage:
One significant drawback of bus topology is that if the central bus is damaged or experiences a failure, the
entire network will be affected, resulting in network failure.
4) Mesh Topology:
Mesh topology is a network configuration where each node is directly connected to every other node in the
network.
https://telegram.me/PrepTrain 3
Join PrepTrain Community for latest Internship and Job Updates.
5) Tree Topology:
Tree topology is a network configuration that combines aspects of both the star and bus topologies, often
referred to as the "expanded star."
How it Works:
In tree topology, multiple star networks are interconnected by a single bus, creating a hierarchical structure.
Ethernet Protocol:
The Ethernet protocol is commonly used in tree topology networks to facilitate communication.
Vulnerability:
However, tree topology heavily relies on the "main bus" connecting all the segments. If this main bus
experiences a failure or breaks down, the entire network will be affected. This vulnerability is a crucial
consideration when designing a tree topology network.
6) Hybrid Topology:
Hybrid topology is a network configuration that combines multiple different topologies to create a unique and
flexible network structure.
https://telegram.me/PrepTrain 4
Join PrepTrain Community for latest Internship and Job Updates.
Combining Topologies:
When two or more star topologies are connected, the resulting configuration remains a star topology. However,
if a star topology is connected with a different topology, it transforms into a hybrid topology.
Different Types of Networks : (Imp) - Networks can be divided on the basis of area of distribution. For
example:
● PAN (Personal Area Network): Its range limit is up to 10 meters. It is created for personal use. Generally,
personal devices are connected to this network. For example computers, telephones, fax, printers, etc.
● LAN (Local Area Network): It is used for a small geographical location like office, hospital, school, etc.
● HAN (House Area Network): It is actually a LAN that is used within a house and used to connect homely
devices like personal computers, phones, printers, etc.
● CAN (Campus Area Network): It is a connection of devices within a campus area which links to other
departments of the organization within the same campus.
● MAN (Metropolitan Area Network): It is used to connect the devices which span to large cities like
metropolitan cities over a wide geographical area.
● WAN (Wide Area Network): It is used over a wide geographical location that may range to connect cities
and countries.
● GAN (Global Area Network): It uses satellites to connect devices over the global area.
● VPN (Virtual Private Network) : VPN or the Virtual Private Network is a private WAN
(Wide Area Network) built on the internet. It allows the creation of a secured tunnel (protected network)
between different networks using the internet (public network). By using the VPN, a client can connect to
the organization’s network remotely.
● Advantages of VPN :
1. VPN is used to connect offices in different geographical locations remotely and is cheaper when
compared to WAN connections.
https://telegram.me/PrepTrain 5
Join PrepTrain Community for latest Internship and Job Updates.
2. VPN is used for secure transactions and confidential data transfer between multiple offices located
in different geographical locations.
3. VPN keeps an organization’s information secured against any potential threats or intrusions by
using virtualization.
4. VPN encrypts the internet traffic and disguises the online identity.
Types of VPN
1. Access VPN:
Access VPN is designed to provide connectivity to remote mobile users and telecommuters. It serves as a
cost-effective alternative to traditional dial-up or ISDN connections, offering a broad range of connectivity
options.
2. Site-to-Site VPN:
Site-to-Site VPN, also known as Router-to-Router VPN, is commonly employed by large companies with
multiple branches in different locations. It enables the connection of one office's network to another office in a
separate geographical area. This type of VPN has two sub-categories:
a. Intranet VPN:
Intranet VPN facilitates the connection of remote offices located in different geographical areas through a
shared infrastructure, such as internet connectivity and servers. It allows these offices to have the same
accessibility policies as a private WAN (wide area network).
b. Extranet VPN:
Extranet VPN utilizes shared infrastructure over an intranet to connect suppliers, customers, partners, and
other external entities using dedicated connections. It enables secure communication and collaboration
between these external parties and the organization's internal network.
IPv4 Address : An IP address is a 32-bit dynamic address of a node in the network. An IPv4 address has 4
octets of 8-bit each with each number with a value up to 255. IPv4 classes are differentiated based on the
number of hosts it supports on the network. There are five types of IPv4 classes and are based on the first
octet of IP addresses which are classified as Class A, B, C, D, or E.
https://telegram.me/PrepTrain 6
Join PrepTrain Community for latest Internship and Job Updates.
OSI (Open Systems Interconnection) Model (Important):
The OSI model is a network architecture model based on ISO (International Organization for Standardization)
standards. Its name, Open Systems Interconnection, reflects its purpose of facilitating communication between
systems that are open for interaction with other systems. The OSI model is organized into seven layers.
The OSI model serves as a conceptual framework that aids in understanding the various processes involved in
data communication across networks, making it a fundamental tool in network architecture and design.
https://telegram.me/PrepTrain 7
Join PrepTrain Community for latest Internship and Job Updates.
The OSI model consists of seven layers, each serving a specific purpose in data communication:
1. Physical Layer:
The Physical layer is the lowest layer and deals with the physical transmission of raw bit streams over the
network medium. It manages the physical connection between devices, utilizing cables or wireless media like
twisted-pair cables or fiber optics.
3. Network Layer:
The Network layer is involved in routing, where it determines the best route for data packets to travel from the
source to the destination. It converts logical addresses into physical addresses and performs packetizing to
segment data into packets. The Network layer also facilitates internetworking by connecting different networks
to form a larger network.
4. Transport Layer:
The Transport layer is responsible for delivering messages through the network and ensures error checking to
prevent data errors during transmission. It provides two types of services: connection-oriented transmission,
where acknowledgments are sent to confirm successful data delivery, and connectionless transmission, where
acknowledgments are not sent.
5. Session Layer:
The Session layer manages the establishment, maintenance, and termination of communication between
devices. It reports errors from upper layers and establishes sessions between users for effective
communication.
6. Presentation Layer:
The Presentation layer, also called the Translation layer, translates data from one format to another format. It
handles character code translation, data conversion, data compression, and data encryption. At the sender's
https://telegram.me/PrepTrain 8
Join PrepTrain Community for latest Internship and Job Updates.
end, it translates data from the application layer format to a common format, and at the receiver's end, it
translates the common format back to the application layer format.
The TCP/IP reference model is a simplified version of the OSI model, consisting of four layers. It was
developed by the US Department of Defense (DoD) in the 1960s. The name is derived from two key protocols
used in the model: TCP (Transmission Control Protocol) and IP (Internet Protocol).
1. Link Layer:
The Link layer determines the physical links, such as serial lines or classic Ethernet, to be used to fulfill the
requirements of the connectionless internet layer. Protocols like SONET and Ethernet operate at this layer.
2. Internet Layer:
The Internet layer is crucial in holding the entire architecture together. It is responsible for delivering IP packets
to their intended destinations. IP (Internet Protocol) and ICMP (Internet Control Message Protocol) are
examples of protocols used in the Internet layer.
3. Transport Layer:
The Transport layer serves a function similar to the OSI Transport layer. It enables peer entities on the network
to establish and maintain communication. TCP (Transmission Control Protocol) and UDP (User Datagram
Protocol) are examples of protocols operating at this layer.
4. Application Layer:
The Application layer contains higher-level protocols that facilitate user-level communication. Protocols like
HTTP, SMTP, RTP, and DNS operate in this layer.
- HTTP (HyperText Transfer Protocol) defines the rules and standards for transmitting information on the World
Wide Web (WWW). It facilitates communication between web browsers and web servers. It is a stateless
https://telegram.me/PrepTrain 9
Join PrepTrain Community for latest Internship and Job Updates.
protocol, where each command is independent of previous commands. HTTP operates at the application layer,
built upon TCP, and typically uses port 80 for communication.
- HTTPS (HyperText Transfer Protocol Secure) is a secure and advanced version of HTTP. It uses SSL/TLS
protocols on top of HTTP to provide security and encrypt communication. It enables secure transactions and
uses port 443 by default.
DNS is a naming system used to identify resources over the internet, including physical nodes and
applications. It translates domain names into their associated IP addresses, making it easier to locate
resources on the network. Without DNS, users would have to know the IP address of the websites they want to
access. DNS was introduced in 1983 by Paul Mockapetris and Jon Postel.
DNS works by translating human-readable domain names (like "www.shaurya.com") into machine-readable IP
addresses (like "192.168.1.1"). DNS forwarders are used when a DNS server receives queries that it cannot
resolve quickly; it forwards those requests to external DNS servers for resolution.
SMTP Protocol:
SMTP (Simple Mail Transfer Protocol) is responsible for communication between email servers and setting
rules for email transmission over the internet. It supports both End-to-End and Store-and-Forward methods
and listens on port 25.
- TCP (Transmission Control Protocol) is connection-oriented, while UDP (User Datagram Protocol) is
connectionless.
- TCP is comparatively slower than UDP, but it provides extensive error checking mechanisms, flow control,
and acknowledgment of data, making it more reliable.
https://telegram.me/PrepTrain 10
Join PrepTrain Community for latest Internship and Job Updates.
- UDP is faster, simpler, and more efficient, but it lacks error correction mechanisms. It is commonly used in
scenarios where real-time data transfer is essential, and occasional data loss is acceptable (e.g., video
streaming, online gaming).
Important Protocols:
https://telegram.me/PrepTrain 11
Join PrepTrain Community for latest Internship and Job Updates.
MAC Address (Media Access Control) and IP Address both uniquely identify devices on the internet. The MAC
Address is assigned by the NIC (Network Interface Card) manufacturer and is used to identify devices on a
network at the physical level. On the other hand, IP Addresses are provided by Internet Service Providers
(ISPs) and are used to uniquely identify the connection of a device to a network.
- Ipconfig (Internet Protocol Configuration): It is a command used in Microsoft operating systems to view and
configure network interfaces.
- Ifconfig (Interface Configuration): It is a command used in MAC, Linux, and UNIX operating systems to view
and configure network interfaces.
Firewall:
A firewall is a network security system that monitors incoming and outgoing network traffic and blocks
unauthorized or potentially harmful traffic based on predefined security policies. It acts as a barrier between
the public internet (external network) and the private network of networking devices, adding an extra layer of
security to the network. Firewalls can be implemented as hardware devices, software programs, or a
combination of both. They play a critical role in safeguarding networks from potential threats and attacks.
1. What happens when you enter google.com in the web browser? (Most Imp)
- The browser checks the cache for the content and displays it if available.
- If not in cache, it checks the IP of the URL in the cache and OS.
- If not in cache, the browser requests the OS to perform a DNS lookup to get the IP address from the DNS
server using UDP.
- A new TCP connection is established between the browser and server.
- An HTTP request is sent to the server via the TCP connection.
https://telegram.me/PrepTrain 12
Join PrepTrain Community for latest Internship and Job Updates.
- The web server handles the request and sends an HTTP response.
- The browser processes the response, renders the content, and may close or reuse the TCP connection.
- Cacheable responses are stored in the browser's cache.
3. Subnet:
- A subnet is a network within a network achieved through subnetting.
- It enhances routing efficiency and network security.
- Subnetting reduces the time to extract the host address from the routing table.
4. Reliability of a network is measured by downtime, failure frequency, and handling unexpected events like
catastrophes.
https://telegram.me/PrepTrain 13
Join PrepTrain Community for latest Internship and Job Updates.
8. NIC (Network Interface Card):
- NIC is a peripheral card attached to a PC to connect to a network.
- It has a unique MAC address that identifies the PC on the network.
12. Netstat:
- Netstat is a command-line utility that provides information about current TCP/IP settings of a connection.
13. Ping:
- Ping is a utility program that checks connectivity between network devices using IP address or name.
https://telegram.me/PrepTrain 14
Join PrepTrain Community for latest Internship and Job Updates.