N+ Lessons
N+ Lessons
MODULE 1
The Internet is the connectivity of Global Networks cooperating with each other to exchange data using common
standards. The Network of Networks.
1. LAN: Local Area Network – A collection of devices connected together in a single limited location (a
building, office, home
Like all Networks, uses Hosts, Peripherals, Network Media and Network Intermediary for deployment but not
connected to the internet. Alao uses MAC address to communicate with a NIC (Network Interface Card)
installed on each device.
Medium to Large Networks: Many Locations with hundreds or thousands of hosts/devices., BANKS,
SCHOOLS, HOSPITALS having headquarters and Branches connecting together.
2. WAN: Wide Area Network - spanning beyond a single building or large campus but includes multiple
locations spread across a specific Geographical area or the World. Some WAN/MAN connects many LANs
together. Usually combines multiple infrastructures operated by several providers.
4. PAN: Personal Area Network – Connects devices within a user immediate area e.g. Bluetooth connection to
smartphone, infra-red connection, home routers connection etc.
5. CAN: Campus Area Network – interconnects multiple LANs within an educational organization or corporate
campus
END DEVICES:
Mobile Phones * Smart CCTVs * Medical Devices (Pacemakers, Insulin Pumps
etc.)
Smart Watches * Smart Watches * Radio Frequency Identification (RFID) Tag
Smart TVs etc. * Smart Home Appliances etc.
THE BIT
Computers and network only work with binary digits. Data is measured in Bit i.e. Binary using 1s (Ones) and 0s
(Zeros). Each character we make use of is represented by 8 digit bits e.g. letter A = 01000001, Number 9 = 00111001
etc.
ASCII- America Standard Code for Information Interchange
BANDWIDTH:
This is the capacity of a medium/cable to carry data over a network using size. Digital Bandwidth measures the
amount of data that can flow through a medium. Data Size is measured in bytes, Kilobytes, Megabytes, Gigabytes,
Terabytes.
THROUGHPUT
Measure the amount of data being sent across network or data base using time as measure in consideration of
Latency (the amount of time including delays for data to travel from one [point to another)
1. Electrical Pulse: Converts data into electrical pulses and transmitted via media/ cables
2. Wireless: Uses Radio Waves, infrared, Microwaves to transmit data e.g. Routers, Satellites etc.
3. Light Pulse Data is converted into light pulses and transmitted over a network usually long distance
transmissions.
NETWROK INFRASTRUCTURES/CONPONENTS
1. END DEVICES/HOSTS: Phones, Smart TVs. Computers, Teleconferencing, Security Cameras etc.
2. INTERMEDIARY DEVICES: Acts as the connector between the end devices and the network e.g. Router,
Switches,
3. NETWROK MEDIA: This entails the medium of transmission like Cables, Wireless and Optical
4. PERIPHERALS: This doesn’t operate on its own but depends on the Host to function e.g. Printers.
MODULE 2
WIRELESS NETWORKS
1. Hosts: This is the generic name for most end users like personal computers, network attached printers etc.
2. Peripherals: This device depend on their hosts to communicate to the network e.g. cameras, scanner etc.
3. Network Devices: This device connects their hosts to the server serving as an intermediary e.g. Switches,
Routers, Hubs etc.
4. Network Media: Provides connection between host and network devices and can be wired or wireless media.
IP ADDRESS: (Device Number) This identifies the Host/ end device on the network as it comes pre-installed on all
devices.
SUBNET MASK: (Network Number) This identifies the network on which the host is connected.
DEFAULT GATEWAY: (NETWORKING DEVICE NUMBER) This identifies the Networking Device that the Host is using
to connect to access the internet or another remote Network such Switches, Routers etc.
Note: IP address and default gateway address usually look alike. (192.168.1.2 etc.) while subnet mask is static on
all devices (255.255.255.1)
DYNAMIC HOST CONFIGUIRATION PROTOCOL (DHCP): This is the configuration of end devices to receive network
configuration dynamically. The DHCP Server assigns an address to all connected devices within the network.
SSH: Secured Shell, connecting to a Switch on Remote Router via a command Line Interface in encrypted secured text
VPN: Remote private connection on a public network, messages are encrypted form public.
DNS: Domain Name Systems: converts domain names to IP address and back
* Every device has an ARP cache table
* For a device to communicate on a LAN, it must have both the MAC and IP address
* Default gateway is necessary for devices to communicate across networks (Internet) but not necessary for LAN
ROUTING TABLE
Both MAC Address and IP Address are used to uniquely define a device on the internet. NIC Card’s Manufacturer
provides the MAC Address, on the other hand, the Internet Service Provider provides the IP Address. In this article,
we will learn about MAC Addresses, IP Addresses, and their differences.
What is an IP Address?
IP Address, or Internet Protocol Address is a unique identifier for every system that has internet connectivity. The
major difference between MAC address & IP address is that IP address has a global network, whereas MAC address
operates only in a local network. It is used to establish a communication between networks & systems of several
networks. The IP address can be used for broadcasting or multicasting.
A device attached with MAC Address can retrieve A device attached with IP Address can retrieve by RARP
by ARP protocol. protocol.
MAC Address operates in the data link layer. IP Address operates in the network layer.
It is a 48-bit address that contains 6 groups of 2 IPv4 uses 32-bit addresses in dotted notations, whereas
hexadecimal digits, separated by either hyphens (-) IPv6 uses 128-bit addresses in hexadecimal notations.
or colons(.). Example:
Example: IPv4: 192.168.1.1
00:FF:FF:AB:BB:AA IPv6: FFFF:F200:3204:0B00
or
MAC Address IP Address
00-FF-FF-AB-BB-AA
No classes are used for MAC addressing. IPv4 uses A, B, C, D, and E classes for IP addressing.
MAC address help to solve IP address issue. IP addresses never able to solve MAC address issues.
While communication, Switch needs MAC address While communication, Router need IP address to
to forward data. forward data.
Conclusion
Both MAC address & IP address are unique identifiers that connect to those systems which have an internet
connectivity. They differ in the aspect that MAC address is a local area network address, whereas IP address is a
global area network. There are many differences too in terms of their configurations, format which once read in
the tabular format shown above would help us to understand the differences and benefits clearly.
NETWORK TOPOLOGY
This refers to how Network connectivity is done and arrange especially in a large network infrastructure scenario
which could be Physical Topology or Logical Topology.
NETWORK DOCUMENTATION
Assigning names and addresses (I.P, Subnet and Default Gateway addresses)
MODULE 3
MODULE 4
1. Media or Cable Transmission: Metal Wires within Cable, Data is encoded into electrical pulses.
A.) TWISTED PAIR CABLES
*Shielded Twisted Pair (STP) commonly used in Europe, STP cables are immune to EMI, RFIs
interference and expensive to deploy because of the shielding, also not flexible.
*Unshielded Twisted Pair (UTP) commonly used in North America Areas. Versatile for ethernet
connections to connect work stations, hosts and network devices. Its also comes in two standards.
T568A and T568B.
It is imperative whatever type of the cable that is used for ethernet Local Networking should be
used all through the Network without mix another type i.e. if T568A is used at the initial stage of a
networking operation, same type should be used all through the operation.
2. Fiber Optic Transmission: Glass or Plastic Fibers within Cables: Data is encoded into Light pulses.
Parts/Layers of the Fiber Optic Cable includes:
* Jacket: The outer layer, a PVC jacket that protects the cable against moisture, abrasion and
contamination.
* Strengthening Material: Prevents the Cable from being stretched when pulled.
* Buffer: Shields the Core and Cladding from damage
* Cladding: Acts more like a mirror
* Core: This is the part that carries/ transmits data.
3. Wireless Transmission: Data is encoded via modulation of specific frequencies of electro-magnetic waves.
MODULE 5
Message Format: Using a specific format or structure to send message e.g. exe.txt. jpg editable or not editable
format.
Message Size: It follows the same structure across network a and longer messages could be broken into fractions
depending on the types e.g. text /sms messages above 160 words would be broken if longer.
Timing: Instant or delayed. Timing determines the speed at which a message can deliver or be sent
Encoding: Messages can be encoded using encryptions and deciphered by the receiver.
Encapsulation: This is the enveloping of a message with a Header, Message size
Message Pattern: Messages across networks often requires acknowledgement of receiver’s availability before the
message is sent.
THE NETWROK & INTERNET STANDARD
This standard governs how messages are transmitted across networks using the same standard and protocols.
IEEE
IANA
IETF
ICAN
ITU
TIA
HTTP: Hyper Text Transmission Protocol - This Protocol governs how a web server and a web client interacts.
TCP: Transmission Control Protocol – Manages the individual Communication Protocol…our WhatsApp and E-mail
communication goes to the specific individuals we want to communicate with specifically without jamming into
other messages.
IP: Internet Protocol – Responsible for delivering messages from the sender to the receiver and back if necessary,
using the individual address (IP address). This protocol ensures that the message for Computer A is not delivered to
Computer B, c, or D.
ETHERNET: This is a method of communication amongst devices on the same network using Network Interface Card
(NIC) using cables.
TCP: Uses 3-way handshake to establish connection/communication protocol Sends sync first, the other device sends
back ack/sync and ack by the requesting device.
TCP makes use of acknowledgement. Manages individual communication using port numbers to manage flow of
communications.
APPLICATION –
HTTP: Hypertext Transmission Protocol – It is the foundation of any web-based data exchange. It connects the web
server to the browser providing information in a readable format.it operates by Client-Server protocol.
HTTPS: Hypertext Transfer protocol Secure – Its an extension of the HTTP but more secured by encrypting data sent
from web server to the web pages.
DNS: Domain Name System – translate domain name into an Internet Protocol address (IP address).
SSH: Secure Shell Protocol – uses encryption to secure the connect between a Client and a Server within a network.
TRANSPORT:
Transport Control Protocol (3 Way handshake and reliable but quite slow, segments packets and gives them
numbers. Makes use of acknowledgment &
UDP- User Datagram Protocol, fast but unreliable. for live streaming, Voice over IP
INTERNET: Determines the best path through the Network. Routers, Satellites etc.
THE OSI MODEL (Please Do Not Throw This Sweet Pizza Away)
1. PHYSICAL -
2. DATA LINK -
3. NETWORK –
4. TRANSPORT
5. SESSION -
6. PRESENTATION -
7. APPLICATION –
NOTE: In a real-life scenario Network troubleshooting and issue addressing is done in reference to the layers.
Every layer of the model has specific function and can be rectified without affection the other layers
1. BUS NETWROK TOPOLOGY: CSMA (Career Sense Multiple action)/ CD (Collision Detection) OR CA ( Collision
Access)uses ½ duplex
3. TOKEN RING: Communication is allowed until token gets to a system within a network before communication
can be established
4. STAR: Multiple system connecting to one intermediary to establish communication within a Network. Also
uses ½ duplex as only one device can communicate per time.
5. MESH
6. HYBRID
Internet Protocol (IP) is a method that is useful for sending data from one device to another from all over the
internet. It is a set of rules governing how data is sent and received over the internet. It is responsible for addressing
and routing packets of data so they can travel from the sender to the correct destination across multiple networks.
Every device contains a unique IP Address that helps it communicate and exchange data across other devices present
on the internet.
1. Physical Layer: This layer is responsible for the physical transmission of data over network devices. It includes
the hardware and all the cabling, connectors, and electronics involved in data transfer.
2. Data Link Layer: This layer is where data packets are encoded and decoded into bits. It provides node-to-
node data transfer—a link between two directly connected nodes. It also handles error correction from the
physical layer.
3. Internet Layer: Also known as the Network Layer, this layer is responsible for moving packets across different
networks. It uses the Internet Protocol (IP) to route packets from the source to the destination by their IP
addresses. Protocols like IP, Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP)
operate at this layer.
4. Transport Layer: This layer provides host-to-host communication services for applications. It utilizes protocols
like Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) to ensure data is transferred
reliably and without errors.
5. Application Layer: The topmost layer of the TCP/IP model, the Application Layer, is where end-user protocols
such as HTTP, SMTP, FTP, and DNS operate. It provides services directly to user applications.
How the TCP/IP Model Works
The TCP/IP model works by dividing data into packets (segments) at the sender's end and then reassembling these
packets at the receiver's end. This process helps maintain the integrity and accuracy of the data. Each layer in the
model has a specific function, and data passes through these layers in a predefined order. For instance, when you
send an email, the data goes through the Application Layer down to the Physical Layer at the sender's end, and then
in reverse order at the receiver's end.
Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in the
exchange of messages between different devices over a network. The Internet Protocol (IP), which establishes the
technique for sending data packets between computers, works with TCP.
The position of TCP is at the transport layer of the OSI model. TCP also helps in ensuring that information is
transmitted accurately by establishing a virtual connection between the sender and receiver.
The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems
communicate over a network. OSI Model was developed by the International Organization for Standardization
(ISO). The OSI Model consists of 7 layers and each layer has specific functions and responsibilities.
This layered approach makes it easier for different devices and technologies to work together. OSI Model provides a
clear structure for data transmission and managing network issues. The OSI Model is widely used as a reference to
understand how network systems function.
In this article, we will discuss the OSI Model and each layer of the OSI Model in detail. We will also discuss the flow of
data in the OSI Model and how the OSI Model is different from the TCP/IP Model.
Layers of the OSI Model
There are 7 layers in the OSI Model and each layer has its specific role in handling data. All the layers are mentioned
below:
Physical Layer
Data Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Physical Layer
Bit Rate Control: The Physical layer also defines the transmission rate i.e. the number of bits sent per second.
Physical Topologies: Physical layer specifies how the different, devices/nodes are arranged in a network
i.e. bus topology, star topology, or mesh topology.
Transmission Mode: Physical layer also defines how the data flows between the two connected devices. The
various transmission modes possible are Simplex, half-duplex and full-duplex.
The packet received from the Network layer is further divided into frames depending on the frame size of the NIC
(Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.
The Receiver’s MAC address is obtained by placing an ARP (Address Resolution Protocol) request onto the wire
asking “Who has that IP address?” and the destination host will reply with its MAC address.
Physical Addressing: After creating frames, the Data link layer adds physical addresses (MAC addresses) of
the sender and/or receiver in the header of each frame.
Error Control: The data link layer provides the mechanism of error control in which it detects and retransmits
damaged or lost frames.
Flow Control: The data rate must be constant on both sides else the data may get corrupted thus, flow
control coordinates the amount of data that can be sent before receiving an acknowledgment.
Access Control: When a single communication channel is shared by multiple devices, the MAC sub-layer of
the data link layer helps to determine which device has control over the channel at a given time.
Layer 3 – Network Layer
The network layer works for the transmission of data from one host to the other located in different networks. It also
takes care of packet routing i.e. selection of the shortest path to transmit the packet, from the number of routes
available. The sender and receiver’s IP address are placed in the header by the network layer. Segment in the
Network layer is referred to as Packet. Network layer is implemented by networking devices such as routers and
switches.
Logical Addressing: To identify each device inter-network uniquely, the network layer defines an addressing
scheme. The sender and receiver’s IP addresses are placed in the header by the network layer. Such an
address distinguishes each device uniquely and universally.
The transport layer also provides the acknowledgment of the successful data transmission and re-transmits the data
if an error is found. Protocols used in Transport Layer are TCP, UDP NetBIOS, PPTP.
At the sender’s side, the transport layer receives the formatted data from the upper layers, performs Segmentation,
and also implements Flow and error control to ensure proper data transmission. It also adds Source and
Destination port number in its header and forwards the segmented data to the Network Layer.
Generally, this destination port number is configured, either by default or manually. For example, when a
web application requests a web server, it typically uses port number 80, because this is the default port
assigned to web applications. Many applications have default ports assigned.
At the Receiver’s side, Transport Layer reads the port number from its header and forwards the Data which it has
received to the respective application. It also performs sequencing and reassembling of the segmented data.
Service Point Addressing: To deliver the message to the correct process, the transport layer header includes a
type of address called service point address or port address. Thus by specifying this address, the transport
layer makes sure that the message is delivered to the correct process.
Synchronization: This layer allows a process to add checkpoints that are considered synchronization points in
the data. These synchronization points help to identify the error so that the data is re-synchronized properly,
and ends of the messages are not cut prematurely and data loss is avoided.
Dialog Controller: The session layer allows two systems to start communication with each other in half-
duplex or full-duplex.
Example
Let us consider a scenario where a user wants to send a message through some Messenger application running in
their browser. The “Messenger” here acts as the application layer which provides the user with an interface to create
the data. This message or so-called Data is compressed, optionally encrypted (if the data is sensitive), and converted
into bits (0’s and 1’s) so that it can be transmitted.
Encryption/ Decryption: Data encryption translates the data into another form or code. The encrypted data is
known as the ciphertext and the decrypted data is known as plain text. A key value is used for encrypting as
well as decrypting data.
Compression: Reduces the number of bits that need to be transmitted on the network.
File Transfer Access and Management(FTAM): This application allows a user to access files in a remote host,
retrieve files in a remote host, and manage or control files from a remote computer.
Directory Services: This application provides distributed database sources and access for global information
about various objects and services.
Sending: ENCAPSULATION
Receiving: DE-ENCAPSULATION
Each layer adds specific information to ensure the data reaches its destination correctly, and these steps are reversed
upon arrival.
We can understand how data flows through OSI Model with the help of an example mentioned below.
Let us suppose, Person A sends an e-mail to his friend Person B.
Step 1: Person A interacts with e-mail application like Gmail, outlook, etc. Writes his email to send. (This happens
at Application Layer).
Step 2: At Presentation Layer, Mail application prepares for data transmission like encrypting data and formatting it
for transmission.
Step 3: At Session Layer, There is a connection established between the sender and receiver on the internet.
Step 4: At Transport Layer, Email data is broken into smaller segments. It adds sequence number and error-checking
information to maintain the reliability of the information.
Step 5: At Network Layer, Addressing of packets is done in order to find the best route for transfer.
Step 6: At Data Link Layer, data packets are encapsulated into frames, then MAC address is added for local devices
and then it checks for error using error detection.
Step 7: At Physical Layer, Frames are transmitted in the form of electrical/ optical signals over a physical network
medium like ethernet cable or WiFi.
After the email reaches the receiver i.e. Person B, the process will reverse and decrypt the e-mail content. At last, the
email will be shown on Person B email client.
Protocols Used in the OSI Layers
Layer Working Protocol Data Unit Protocols
2 – Data Link
Node to Node Delivery of Message. Frames Ethernet, PPP, etc.
Layer
4 – Transport Take Service from Network Layer and Segments (for TCP) TCP, UDP, SCTP, etc.
Layer Working Protocol Data Unit Protocols
or Datagrams (for
Layer provide it to the Application Layer.
UDP)
7 – Application Helps in identifying the client and FTP, SMTP, DNS, DHCP,
Data
Layer synchronizing communication. etc.
Package delivery is guaranteed in OSI Model. Package delivery is not guaranteed in the TCP/IP Model.
In the OSI model, Only layers 1,2 and 3 are necessary All layers of the TCP/IP model are needed for data
for data transmission. transmission.
Protocols at each layer is independent of the other Layers are integrated, some layers are required by other
layer. layers of TCP/IP model.
OSI Model is a conceptual framework, less used in Widely used in actual networks like Internet and
practical applications. Communication Systems.
ENCAPSULATION
Encapsulation is the process of adding additional information when data is traveling in an OSI or TCP/IP model. The
information has been added on the sender’s side, from the Application layer to the Physical layer.
OSI Model and Working of Encapsulation
No additional information will be added to the user’s data in the Application layer in the TCP/IP model or the
Application, Presentation, or Session layers in the OSI model.
In the Transport layer, the data is broken up into different pieces. It adds the header in each of the broken
data, which contains information like source port, destination port, sequence number, etc. Now, everything is
combined into a new form.
The encapsulated data in the Transport layer is called Segments or Datagrams. If the transmission uses TCP,
then it is called Segments, or UDP is called Datagrams.
Now, the data will travel down and reach the Network layer. Here, layer 3 header is added. That contains
information like source IP, destination IP, and so on. This information combines into a new form. The
encapsulated data in the network layer is called Packets.
Now, the network layer sends the packet to the Data Link layer When it enters into the data link layer, a new
header (Layer 2) is added. Also, a trailer is added. It contains information like source MAC address,
destination MAC address, and so on. The trailer is used for error checking. The encapsulated data in the data
link layer is called Frames.
The physical layer takes frames from Data Link layer. The encapsulated data in the physical layer is called
Bits.
De-Encapsulation
De-encapsulation is the exact reverse process of encapsulation. The additional information added on the sender’s
side(during encapsulation) gets removed when it travels on the receiver’s side from the Physical layer to the
Application layer.
Communication across a Wireless Network uses IP addresses for both sender and receiver while it uses Mac Address
on an ethernet wired Local Area Network.
IP NETWROK
Messages are encapsulated in a Packet
The header of a message shows detail of the content of the message like Address (IP address, Traffic Class, Payload
Limit, Hop Limit, Version and Flow Label)
ETHERNET NETWORK
Messages are encapsulated in a Frame
Messages are put into a frame or a 2 layers Protocol Data Units
The header of a message includes Preamble/SFD, Source & Destination MAC address, Type &Length of the
message, Data, FCS.
Because of the above limitations of the Flat Network Design, a Hierarchical Network Design Model was introduced.
In a Hierarchical model, the network is divided into distinct layers. These layers (also known as Tiers) are connected
with one another in the form of a hierarchy which enables the network to be divided into more manageable blocks
and these blocks limit the local traffic to remain local even if it is broadcast traffic. A hierarchical Model can be
applied for both LAN and WAN Network design.
Access Layer:
This layer consists of end devices (end-users, local servers, etc.) that have local access to the network.
The Access Layer (commonly referred to as the network edge) is where the end-user devices connect to the
network.
It provides high-bandwidth connectivity.
It provides Layer 2 Switching capabilities.
Services like Port Security, Quality of Service (QoS), ARP Inspection are used in this layer.
Discovery and Configuration Services like CDP, LLDP also run in the Access Layer.
This layer plays a big role in protecting the network and malicious attacks because of its connection with the
endpoints of the network.
Distribution Layer:
This layer basically provides policy-based connectivity and acts as a boundary between the Access Layer and the Core
Layer. Data Filtering and Routing take place in this layer.
The Distribution Layer is mainly responsible for collecting/aggregating data from the Switches of the Access
Layer and distributing it to the rest of the network.
It acts as a border as well as a connector to both the Access Layer and the Core Layer.
It provides policy-based security by using Access Control Lists (ACLs) and filtering.
The use of routing services (like EIGRP, OSPF. Etc.) also takes place in this layer.
It provides Redundancy and Load Balancing.
Core Layer:
This layer is often considered to be the Backbone of the network which provides fast transport between the switches
present in the Distribution Layer of the network. The Core Layer is considered to be the Backbone of the network and
acts as an aggregation point for multiple networks.
It consists of high-speed network devices responsible for switching packets as fast as possible.
It provides interconnectivity between the Distribution Layer devices.
It provides reliability and fault tolerance to maximize performance.
It also plays a crucial role in avoiding CPU-intensive packet manipulation caused by security services
(restrictive ACLs), Quality of Service (QoS) classification, inspection, etc.
BROADCAST DOMAIN
This is the containment in which broadcast message can travel in a network.
Each Local Ethernet Network in a large LAN and WAN is the broadcast domain.
Routers running OSPF protocol have to establish neighbor relationships before exchanging routes. Because
OSPF is a link-state routing protocol, neighbors don’t exchange routing tables. Instead, they exchange
information about network topology. Each OSPF router then runs SPF or Dijkstra algorithm to calculate the
best routes and adds those to the routing table. Because each router knows the entire topology of a network,
the chance for a routing loop to occur is minimal.
Each OSPF router stores routing and topology information in three tables:
Neighbor table – stores information about OSPF neighbors
Topology table – stores the topology structure of a network
Routing table – stores the best routes
Internal BGP: It is used to interchange routing information between the routers in the same autonomous
system, it is also known as iBGP (Internal Border Gateway Protocol). Internal routers also ensure consistency
among routers for sharing routing information. The below image shows how iBGP interchange routing
information.
The sending host sets the initial TTL value as an eight-binary digit field in the packet header.
The datagram’s TTL field is set by the sender and reduced by each router along the path to its destination.
The router reduces the TTL value by at least one while forwarding IP packets.
When the packet TTL value hits 0, the router discards it and sends an ICMP message back to the originating host.
This system ensures that a packet moving via the network is dropped after a set amount of time, rather than looping
indefinitely.
In IPv6, it is known as hop limit and in IPv4, it is known as TTL. The Hop field is same as the TTL field in IPv4
Example of TTL
In the scenario below, Host A wishes to interact with Host B using a ping packet. Host A uses a TTL of 255 in the ping
and transmits it to Router A, its gateway. When Router A notices that the packet is going for a layer 3 i.e. Network
layer, it hops to Router B, reduces the TTL by 255 – 1 = 254, and delivers it to Router B. Router B and Router C
decrement the TTL in the same way. Router B decrements TTL in a packet from 254 to 253 and Router C decrements
the TTL from 253 to 252. The ping packet TTL is decreased to 252 when it reaches Host B.
** Error checking technics in ethernet frame and IP frame
MODULE 7
*Routers uses Network portion of an IP address to send message to the switch, it doesn’t see the
connected hosts directly. The switch then identifies the Host address (The last digits in the IP address) and
MAC address to send the message directly.
No device can communicate with another device without a MAC address except on a router/internet
network.
** Routing table contains information for how to reach Local and Remote network
** Router sends messages using destination IP address in comparison to the network address to determine the
interface to send the packet out of.
DEFAULT GATEWAY
The default gateway is the node that forwards the packet from the source to other networks when there is no
routing information about the destination i.e. host (or router) does not know where the destination is
present.
A default gateway is a route to which information is passed when the device does not know where the
destination is present.
It is used when there is no routing information available about the destination.
It is a node that allows the communication of computers on different networks.
‘Default’ here means the default route which is to be taken when the host does not know where the
destination is.
It is most commonly used for webpage access.
This is an important part of networking for routing the data and finding the corresponding destination which
is in another network.
1. ARP Cache: After resolving the MAC address, the ARP sends it to the source where it is stored in a table for
future reference. The subsequent communications can use the MAC address from the table.
2. ARP Cache Timeout: It indicates the time for which the MAC address in the ARP cache can reside.
3. ARP request: This is nothing but broadcasting a packet over the network to validate whether we came across
the destination MAC address or not.
The physical address of the sender.
The IP address of the sender.
The physical address of the receiver is FF:FF:FF:FF:FF: FF or 1’s.
The IP address of the receiver.
4. ARP response/reply: It is the MAC address response that the source receives from the destination which aids
in further communication of the data.
The goal is to find out the MAC address of where we want to talk to. That’s where ARP comes in handy. It helps by
turning the IP address into the physical MAC address, so we can chat with other devices on the network
Most computer programs/applications use logical addresses (IP Addresses) to send/receive messages. However, the
actual communication happens over the Physical Address (MAC Address) from layer 2 of the OSI model. So our
mission is to get the destination MAC Address which helps communicate with other devices. This is where ARP comes
into the picture; its functionality is to translate IP addresses into physical addresses.
In conclusion, ARP helps computers find each other’s physical addresses on a network so they can communicate
effectively. ARP (Address Resolution Protocol) is like a translator for computers on a network. When one computer
wants to talk to another, it needs to know the other computer’s physical address (MAC address). But all it has is the
other computer’s IP address (like its home address). So, ARP steps in and asks, “Hey, who has this IP address?” The
computer with that IP address responds with its MAC address, and then they can chat.
Note: ARP finds the hardware address, also known as the Media Access Control (MAC) address, of a host from its
known IP address.
Structure of a URL
A URL starts with a protocol followed by the name of the resource that has to be accessed. URL uses the protocols as
the primary access medium to access the domain or subdomain specified after that wherever the resource is located.
It uses multiple protocols like HTTP (Hypertext Transfer Protocol), HTTPS Protocol (Secured HTTP), mailto for
emails, FTP (File Transfer Protocol) for files, and TELNET to access remote computers. Mostly the protocol names
are specified using the colons and the double forward slashes, but the mailto protocol is specified using the colons
only.
NEED FOR ROUTING:
1. Broadcast containment: Broadcast messages stop at the Router level (Distribution Layer) in a multi network
thus reducing density of messages that could slow down the network.
2. Security: Routing provides better security measures by limiting and checkmating the accessibility of messages
in a network, also has the ability to protect the IP addresses of some devices as it has the ability to separate
some devices at Distribution layer.
3. Locations: Interconnect networks at various locations. (One Organization multiple Branches but same
network)
4. Logical Grouping: Routers in the distribution can be used to group departments in the same organization
together.
The First 3 Portion of an IP address is for the network while the last portion is for the host or devices.
THE ROUTING TABLE
If a packet is destined for a network that is not in the routing table and no default route exists, the packet will be
dropped
‘Default’ here means the default route which is to be taken when the host does not know where the destination
is.
It is most commonly used for webpage access.
This is an important part of networking for routing the data and finding the corresponding destination which is in
another network.
PC IPv4 Address Subnet Mask Default
Gateway
MODULE 8
IPv4 ADDRESS
IPv4 is a logical and unique network address that identifies a particular host in a network.
It is required by networking devices to ensure packets are sent to a specific machine and any reply are sent to the
appropriate source.
The Ipv4 address structure also have Classes for various specific deployment and operations:
CLASS A consists of 8 bits having a subnet mask of 255.0.0.0 is deployed for extremely large networks 0.0.0.0/8 to
127.0.0.0/8
*This implies that implies that Class A uses 8 bits for network and 24 bits for hosts
CLASS B consists of 16 bits with a subnet mask of 255.255.0.0 used for medium to large networks and ranges from
128.0.0.0/16 to 191.255.0.0/16 and uses 16 Network bits and 16 Hosts bits
CLASS C consists of 24 bits with a subnet mask of 255.255.255.0 is designed to support small network with large
number of Hosts and ranges from 192.0.0.0/24 to 223.55.255.0/24
Other parts:
Subnet Number: This is the non-obligatory part of IPv4. Local networks that have massive numbers of hosts
are divided into subnets and subnet numbers are appointed to that.
IPv4 address: contains the network address and host. It is Globally routed by Internet Service Providers
Default Gateway: This is the common address of all Hosts within a network and similar to the IP address
Subnet mask: The subnet Mask identifies which IPv4 address belongs to Host and which belongs to the Network e.g
255.255.255.0 means the first 3 decimals of 192.168.1.1 belongs to the Network. If it comes like 255.255.0.0, it
implies the first two decimals of the IP belongs to the Network depending on the class of address.
THE IPv4 ADDRESS COMES IN TWO MODES – PRIVATE AND PUBLIC IP ADDRESS
Private IP Addressing
Private IP Addresses are those addresses that work within the local network. These addresses are non-routable on
the Internet. The address is basically assigned by the network router to your particular device. The unique private IP
address is provided to every device which is on the same network. In this way, devices communicate with one
another on the same network without connecting to the entire Internet. In this way, Private IP addresses are able to
provide more security within a particular network. The private IP address cannot be seen on the Internet, unlike
the public IP address. Only devices within the local network are able to see the address of one another.
Private IP address exists within the specific ranges as reserved by the Internet Assigned Numbers Authority (IANA).
Following are the address ranges of private IP addresses:
The range except assigned to Private IP Address is used to assign Public IP Address on a network as public IP
addresses are unique for each device on the Internet. Therefore, private networks can use these address ranges for
allocating private IP addresses in a specific network. Private IP addresses can be reused on another network which is
not possible with Public IP addresses.
3. Virtual Private Networks (VPNs): VPNs create encrypted connections over public networks, allowing
customers to get access to private networks remotely.
4. Cloud Computing: Many cloud provider offer virtual personal clouds (VPCs) where clients can deploy
resources which includes virtual machines, databases, and containers. Private IP addresses are used within
VPCs to facilitate communication between these resources at the same time as separating them from
different clients’ environments.
** Private IPv4 are not routable on the internet (can’t be used outside the local network)
** Network Address Translation (NAT) translates the private the private IPv4 address to a public IPv4 to be able
communicate across networks
** Network Address Translation takes place on the Router automatically Home Routers
An IPv4 address is a series of 32 bits divided into 4 octets of 8 binary each. Each octet is contained in a decimal
portion.
192 . 165 . 56 .1
(8 binary) (8 binary) (8 binary) (8 binary)
1 2 4 8 16 32 64 128
• The rightmost bit in an octet has a value of 1 and the values of the remaining bits, from
right to left, are 2, 4, 8, 16, 32, 64, and 128.
You can determine the value of the octet by adding the values of positions wherever there is a
binary 1 present:
• 255.0.0.0 (8-bits)
• 255.255.0.0 (16 bits)
• 255.255.255.0 (24 bits)
A subnet mask of 255.255.255.0 (decimal) or
11111111.11111111.1111111.00000000 (binary) uses 24 network bits and 8 host bits.
• To determine how many hosts can be on that network, take the number 2 to
the power of the number of host bits (2 8 = 256).
• Subtract 2 (256-2) for numbers that cannot be used
• Broadcast address of all 1s in the host portion
• Network ID of all 0s
• Another method - Add all values of the available host bits
(128+64+32+16+8+4+2+1 = 255).
• Subtract 1 (255-1 = 254), because the host bits cannot be all 1s.
CLASSFUL ADDRESS
An IP address is an address that has information about how to reach a specific host, especially outside the LAN. An
IP address is a 32-bit unique address.
Classful IP addressing is a way of organizing and managing IP addresses, which are used to identify devices on a
network. Think of IP addresses like street addresses for houses; each device on a network needs its unique address to
communicate with other devices.
**IP addresses are globally managed by Internet Assigned Numbers Authority (IANA) and Regional Internet
Registries (RIR).
Class D
IP address belonging to class D is reserved for multi-casting. The higher-order bits of the first octet of IP addresses
belonging to class D is always set to 1110. The remaining bits are for the address that interested hosts recognize.
Class D does not possess any subnet mask. IP addresses belonging to class D range from 224.0.0.0 –
239.255.255.255.
Class E
IP addresses belonging to class E are reserved for experimental and research purposes. IP addresses of class E
range from 240.0.0.0 – 255.255.255.255. This class doesn’t have any subnet mask. The higher-order bits of the
first octet of class E are always set to 1111.
CLASSLES ADDRESS
SUBNETING
** Routers only need to know how to reach the network while the switch delivers directly to the host in the
network.
NAT
** NETWORK ADDRESS TRANSLATION is used to convert Private IPv4 address to public IPv4 address which is usually
done on the Router that connects the Local Network to the Internet Service Provider. Private IP can’t be used via the
internet for security reasons, the NAT system automatically issues a public IP address for public communication via
the Router.
**One public IP address can be used by Hosts but differentiated by their Port Numbers.
Generally, the border router is configured for NAT i.e. the router which has one interface in the local (inside) network
and one interface in the global (outside) network. When a packet traverse outside the local (inside) network, then
NAT converts that local (private) IP address to a global (public) IP address. When a packet enters the local network,
the global (public) IP address is converted to a local (private) IP address.
If NAT runs out of addresses, i.e., no address is left in the pool configured then the packets will be dropped and an
Internet Control Message Protocol (ICMP) host unreachable packet to the destination is sent.
Inside local address – An IP address that is assigned to a host on the Inside (local) network. The address is
probably not an IP address assigned by the service provider i.e., these are private IP addresses. This is the
inside host seen from the inside network.
Inside global address – IP address that represents one or more inside local IP addresses to the outside world.
This is the inside host as seen from the outside network.
Outside local address – This is the actual IP address of the destination host in the local network after
translation.
Outside global address – This is the outside host as seen from the outside network. It is the IP address of the
outside destination host before translation.
Static NAT
In this, a single unregistered (Private) IP address is mapped with a legally registered (Public) IP address i.e one-to-one
mapping between local and global addresses. This is generally used for Web hosting. These are not used in
organizations as there are many devices that will need Internet access and to provide Internet access, a public IP
address is needed.
Suppose, if there are 3000 devices that need access to the Internet, the organization has to buy 3000 public
addresses that will be very costly.
Dynamic NAT
In this type of NAT, an unregistered IP address is translated into a registered (Public) IP address from a pool of public
IP addresses. If the IP address of the pool is not free, then the packet will be dropped as only a fixed number of
private IP addresses can be translated to public addresses.
Suppose, if there is a pool of 2 public IP addresses then only 2 private IP addresses can be translated at a given time.
If 3rd private IP address wants to access the Internet then the packet will be dropped therefore many private IP
addresses are mapped to a pool of public IP addresses. NAT is used when the number of users who want to access
the Internet is fixed. This is also very costly as the organization has to buy many global IP addresses to make a pool.
** Provides basic security by hiding internal IP from the rest of the network.
** Reduces the chance of direct attacks on internal network’s IPs by camouflaging the real Private IP with
a virtual public IP
UNICAST TRANSMISSION
It’s a Host-to-Host communication in a normal Client/Server or peer-to-peer communication. It uses the address of
the receiving Host as the destination address and can be Routed through a Network e.g. WhatsApp Messaging, SMS
etc.
This type of information transfer is useful when there is a participation of a single sender and a single recipient. So, in
short, you can term it a one-to-one transmission. For example, if a device having IP address 10.1.2.0 in a network
wants to send the traffic stream (data packets) to the device with IP address 20.12.4.2 in the other network, then
unicast comes into the picture. This is the most common form of data transfer over networks.
** An ARP request is broadcast, and an ARP response is a Unicast.
BROADCAST TRANSMISSION
“Also known as 1 to All”, Broadcast Packets are sent to all Hosts in a Network regardless of their individual
addresses. The broadcast is limited to LAN Network as Routers does not forward Broadcast messages and can be
used for Broadcast containment by subdividing the Local Network.
** Routers does not send Broadcast data, It can be used for broadcast containment.
MULTICAST TRANSMISSION
In multicasting, one/more senders and one/more recipients participate in data transfer traffic. In this method traffic
recline between the boundaries of unicast (one-to-one) and broadcast (one-to-all). Multicast lets servers direct single
copies of data streams that are then simulated and routed to hosts that request it. IP multicast requires the support
of some other protocols like IGMP (Internet Group Management Protocol), Multicast routing for its work. Also in
Classful IP addressing Class D is reserved for multicast groups.
Allows the sending of a Packet to a selected number of specified Hosts in a large Network. The Hosts that receive
multicast packets are called “Multicast Clients”
** The Hosts within a LAN having an IPv4 address will be able to communicate directly to each other but not
without a Router to communicate outside their Network.
** Every packet sent across a source and destination IPv4 address (Sender and Receiver’s address)
** Routers that provides access to the internet must also have an IPv4 address.
MODULE 9
IPv4 ADDRESSING
Assigning IPv4 address to Hosts in a Network can be done DYNAMICALLY (Automatically) or STATICALLY (Manually)
Static addressing are assigned to devices that need to retain a fixed IP address to provide services over time such as
Printers, Servers, Routers and other Networking Devices.
All addresses (IPv4, Subnet Mask, Default Gateway and DNS has to be done/assigned manually on each of the Hosts
in the Network. Addresses are also assigned to Printers, Network Devices and other peripherals connected in the
Network.
Remote Access: Some of the devices that require a remote connection like the CCTV cameras or a VPN are
preferable to be as static as possible.
Hosting Servers: Game or email servers that are in constant use also need a static IP so that the services
running in the background remain undisturbed.
Secure Communications: Some devices that participate in secure communications might require static IPs to
make the link stable and reliable.
A Dynamic IP address is an IP address which changes from time to time. In contrast to the static IP, an IPv6 address
is obtained by DHCP server – (Dynamic Host Configuration Protocol) automatically. In the DHCP, a host receives an
available IP address from the DHCP server for some period of time referred to as the lease time and the IP address
given to the host may change. Dynamic IPs are more common for home and commercial appliances and other
electronic devices for which it is not necessary to have a constantly changing IP address.
SLAAC
The Router does what is known as RA (Router Advertisement) which is sent across to every device on the network.
When
a new device is connected, the device sends what is called RS Router Solicitation then the Router send the prefix
DAD- Duplicate Address Detection, which uses NS (Neighbor solicitation) & NA (Neighbor Advertisement) is used to
check if no other device has the same address on the same network.
MODULE 10
NETWORK BOUNDARIES
Routers as Gateways
NAT: Network Address Translation – Private IP can’t be used via the internet for security reasons, the NAT system
automatically issues a public IP address for public communication via the Router.
Network Address Translation (NAT) is a process in which one or more local IP addresses are translated into one or
more Global IP addresses and vice versa to provide Internet access to the local hosts. It also does the translation of
port numbers, i.e., masks the port number of the host with another port number in the packet that will be routed to
the destination. It then makes the corresponding entries of IP address and port number in the NAT table. NAT
generally operates on a router or firewall.
Generally, the border router is configured for NAT i.e. the router which has one interface in the local (inside) network
and one interface in the global (outside) network. When a packet traverse outside the local (inside) network, then
NAT converts that local (private) IP address to a global (public) IP address. When a packet enters the local network,
the global (public) IP address is converted to a local (private) IP address.
If NAT runs out of addresses, i.e., no address is left in the pool configured then the packets will be dropped and an
Internet Control Message Protocol (ICMP) host unreachable packet to the destination is sent.
** NAT is used to convert Private IP address used by a Company or Organization to a public IP address that can be
routed on the internet.
** One public IP address can be shared by many Private IP addresses using Port numbers to differentiate them
STATIC: Mapping a particular private IP address to the public address, all devices have their own public IP address.
DYNAMIC: First come first serve method of apportioning IP addresses to the host, issuing the same set of public
addresses to the devices. A set of device gets first and re-issues to other devices when done
PAT: Sharing of one public IP address but communicates via different ports.
DUAL STACK:
This is an IP address transition method. With the dual-stack solution, every networking device, server, switch, router,
and firewall in an ISP’s network will be configured with both IPv4 and IPv6 connectivity capabilities. Most
importantly, dual-stack technology allows ISPs to process IPv4 and IPv6 data traffic simultaneously.
This allows both IPv4 and IPv6 to coexist on the same network segment. The dual stack devices runs both Ipv4 and
IPv6 addresses simultaneously.
TUNNELING
This is the process of transporting and IPv6 packet over an IPv4 network. The Ipv6 packet is encapsulated in an IPv4
packet.
SLAAC
Stateless Address Auto-Configuration, allows a Host to create its own IPv6 address by using Router Solicitation to
request for an address from the Router and the router respond with Router Advertisement sending prefix (network
address), prefix length (subnet mask) and default gateway information. The Host then use the information from the
Router to generate its own IPv6 (Global Unicast Address-GUA) address.
MODULE 11
TRANSPORT LAYER SERVICES
Servers: Similarly, when we talk about the word Servers, It means a person or medium that serves
something. Similarly in this digital world, a Server is a remote computer that provides information (data) or
access to particular services.
So, it is the Client requesting something and the Server serving it as long as it is in the database.
For those new to networking concepts, the System Design Course provides a comprehensive overview of the client-
server model and its applications in modern computing.
Client Server Model
There is no specific device called a Server until a Web Server application/Client is installed in such device.
Same goes with e-mail and file server.
A Server is a Host running a server software application or providing server services to other hosts in a
network.
• Protocol/scheme - HTTPS or other protocols such as FTP, SFTP, mailto, and NNTP
• Hostname - www.example.com
• Path and file name - /author/book.html
• Fragment - #page155
URI – UNIFORM RESOURCE IDENTIFIER
Similar to URL, URI (Uniform Resource Identifier) is also a string of characters that identifies a resource on the
web either by using location, name or both. It allows uniform identification of the resources.
A URI is additionally grouped as a locator, a name or both which suggests it can describe a URL, URN or
both. The term identifier within the URI refers to the prominence of the resources, despite the technique
used.
The former category in URI is URL, during which a protocol is employed to specify the accessing method of
the resource and resource name is additionally laid out in the URL. A URL may be a non-persistent sort of the
URI. A URN is required to exist globally unique and features a global scope.
A string identifier that points to an online resource is called a URI, or uniform resource identifier. Any resource
on the internet can be identified by this string of characters by either its name, its location, or both. Scheme,
authority, path, query, and fragment are all contained in a URI. The most widely used URI systems
include ftp, Idap, telnet, HTTPs, HTTP (Hypertext Transfer Protocol), etc.
Syntax of URI
Scheme: A scheme is the initial part of a Uniform Resource Locator (URI). It consists of a string of characters,
which can be any combination of a letter, number, plus sign, or hyphen (_), and is followed by a colon (:). The
most widely used protocols are irc, file, ftp, data, and http. It is necessary to register the schemes with IANA.
Authority: Two slashes (//) come before the optional authority component. There are three smaller parts to
it:
o user details: It might have a colon (:) between the username and an optional password.
o host: It has an IP address or a registered name on it. The IP address has to be put in square brackets []
around it.
o Path: Optional
Port: A series of path segments divided by a slash (/) make up this path. It is always supplied by the URI;
however, the path may be null or empty.
Query: It is an optional element that comes before the question mark (?). It has a non-hierarchical query
string with data in it.
Fragment: It is an optional element that comes before the hash (#) symbol. It is made up of a fragment
identification that points the way to a backup resource.
To locate a resource on the internet, use a Uniform Resource Locator or URL. It serves as both a resource
reference and an access point. A unique resource—which could be an image, an HTML page, a CSS document,
or anything else—is always displayed by a URL.
The protocol is described within the URL which is employed to retrieve the resource and resource name. The
URL contains http/https at the start of the resource may be a web-type resource. Similarly, it begins with ftp
FTP If the resource may be a file and mailto if the resource is an email address. The syntax of a URL is shown
below where the primary part is employed for protocol and the remainder of the part is employed for the
resource which consists of a website name or program name.
https://www.geeksforgeeks.org/minimum-cost-graph
Here, the domain name describes the server (web service) and program name (path to the directory and file
on the server).
Syntax of URL
Every HTTP URL adheres to its generic URI’s syntax. As a result, the syntax of the URL and the URI are
comparable. It is provided below:
Scheme: A scheme is the initial part of a URL; it is a protocol that a browser must employ in order to seek a
resource. HTTP and HTTPS are the protocols that are most often used for websites.
Authority: The domain name and port, two sub-components of the authority, are separated by a colon. The
resource’s registered name, such as javatpoint.com, can be used as the domain name, and the port on a web
server serves as the technical entry point to the resource. For HTTP, port 80 is used, and for HTTPS, port 443.
Path: The path on the web server shows the full route to the resource. A possible format is
/software/htp/index.html.
Query String: The string containing the name and value pair is known as the query string. When it appears in
a URL, the information is provided by following the path component. “?key1=value1&key2=value2” is one
example.
Fragment: It is an optional element that comes before the hash (#) symbol. It is made up of a fragment
identification that points the way to a backup resource.
For Ex: https://www.geeksforgeeks.org/difference-between-url-and-uri/
TCP (Transmission Control Protocol) is a vital component of internet communication, ensuring that data is
transmitted reliably and accurately between devices. Its ability to manage data packet transmission, error
correction, and proper sequencing underpins the smooth and efficient exchange of information that we rely on every
day.
TCP is responsible for organizing and sorting data by breaking data into packets while IP is responsible for sending
and receiving.
TCP is the underlying protocol for many applications such as Web Browsing, Email, File and Data Transfer. Also for
P2P sharing. It’s an Internet based protocol.
TCP (Transmission Control Protocol) is one of the main protocols of the TCP/IP suite. It lies between the
Application and Network Layers which are used in providing reliable delivery services. Transmission Control
Protocol (TCP) ensures reliable and efficient data transmission over the internet. TCP plays a crucial role in
managing the flow of data between computers, guaranteeing that information is delivered accurately and in the
correct sequence.
Transmission Control Protocol (TCP) is a connection-oriented protocol for communications that helps in the
exchange of messages between different devices over a network. The Internet Protocol (IP), which establishes the
technique for sending data packets between computers, works with TCP.
The position of TCP is at the transport layer of the OSI model. TCP also helps in ensuring that information is
transmitted accurately by establishing a virtual connection between the sender and receiver.
Transmission Control Protocol (TCP) model breaks down the data into small bundles and afterward reassembles the
bundles into the original message on the opposite end (recipient) to make sure that each message reaches its target
location intact. Sending the information in little bundles of information makes it simpler to maintain efficiency as
opposed to sending everything in one go.
After a particular message is broken down into bundles, these bundles may travel along multiple routes if one route
is jammed but the destination remains the same.
Applications of TCP
World Wide Web (WWW) : When you browse websites, TCP ensures reliable data transfer between your
browser and web servers.
Email : TCP is used for sending and receiving emails. Protocols like SMTP (Simple Mail Transfer Protocol)
handle email delivery across servers.
File Transfer Protocol (FTP) : FTP relies on TCP to transfer large files securely. Whether you’re uploading or
downloading files, TCP ensures data integrity.
Secure Shell (SSH) : SSH sessions, commonly used for remote administration, rely on TCP for encrypted
communication between client and server.
Streaming Media : Services like Netflix, YouTube, and Spotify use TCP to stream videos and music. It ensures
smooth playback by managing data segments and retransmissions.
Whenever we want to send something over the internet using the TCP/IP Model, the TCP/IP Model divides the data
into packets at the sender’s end and the same packets have to be recombined at the receiver’s end to form the same
data, and this thing happens to maintain the accuracy of the data. TCP/IP model divides the data into a 4-layer
procedure, where the data first go into this layer in one order and again in reverse order to get organized in the
same way at the receiver’s end.
FEATURES of TCP/IP
Some of the most prominent features of Transmission control protocol are mentioned below.
Segment Numbering System: TCP keeps track of the segments being transmitted or received by assigning
numbers to each and every single one of them. A specific Byte Number is assigned to data bytes that are to
be transferred while segments are assigned sequence numbers. Acknowledgment Numbers are assigned to
received segments.
Connection Oriented: It means sender and receiver are connected to each other till the completion of the
process. The order of the data is maintained i.e. order remains same before and after transmission.
Full Duplex: In TCP data can be transmitted from receiver to the sender or vice – versa at the same time. It
increases efficiency of data flow between sender and receiver.
Flow Control: Flow control limits the rate at which a sender transfers data. This is done to ensure reliable
delivery. The receiver continually hints to the sender on how much data can be received (using a sliding
window).
Error Control: TCP implements an error control mechanism for reliable data transfer. Error control is byte-
oriented. Segments are checked for error detection. Error Control includes – Corrupted Segment & Lost
Segment Management, Out-of-order segments, Duplicate segments, etc.
Congestion Control: TCP takes into account the level of congestion in the network. Congestion level is
determined by the amount of data sent by a sender.
User Datagram Protocol (UDP) is one of the core communication protocols of the Internet protocol suite used to
send messages (transported as datagrams in packets) to other hosts on an Internet Protocol (IP) network. Within
an IP network.
UDP does not require prior communication to set up communication channels or data paths i.e. no need for 3-Way
handshake as it is in TCP. It is a connectionless protocol meaning that messages are sent without negotiating a
connection and that UDP doesn't keep track of what it has sent.
UDP provides checksums (error checking) for data integrity, and port numbers for addressing different functions at
the source and destination of the datagram. It has no handshaking dialogues and thus exposes the user's program
to any unreliability of the underlying network; there is no guarantee of delivery, ordering, or duplicate protection. If
error-correction facilities are needed at the network interface level, an application may instead use Transmission
Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP) which are designed for this purpose.
UDP is suitable for purposes where error checking and correction are either not necessary or are performed in the
application; It avoids the overhead of such processing in the protocol stack. Time-sensitive applications often use
UDP because dropping packets is preferable to waiting for packets delayed due to retransmission, which may not be
an option in a real-time system.
The protocol was designed by David P. Reed in 1980 and formally defined in RFC 768.
UDP is a simple message-oriented transport layer protocol that is documented in RFC 768. Although UDP provides
integrity verification (via checksum) of the header and payload, it provides no guarantees to the upper layer
protocol for message delivery and the UDP layer retains no state of UDP messages once sent. For this reason, UDP
sometimes is referred to as Unreliable Datagram Protocol. If transmission reliability is desired, it must be
implemented in the user's application.
A number of UDP's attributes make it especially suited for certain applications.
It is transaction-oriented, suitable for simple query-response protocols such as the Domain Name System or
the Network Time Protocol.
It provides datagrams, suitable for modeling other protocols such as IP tunneling or remote procedure
call and the Network File System.
It is simple, suitable for bootstrapping or other purposes without a full protocol stack, such as
the DHCP and Trivial File Transfer Protocol.
It is stateless, suitable for very large numbers of clients, such as in streaming media applications like Netflix,
Showmax.
The lack of retransmission delays makes it suitable for real-time applications such as Voice over IP, online
games, and many protocols using Real Time Streaming Protocol.
Because it supports multicast, it is suitable for broadcast information such as in many kinds of service
discovery and shared information such as Precision Time Protocol and Routing Information Protocol.
Application of UDP
Real-Time Multimedia Streaming: UDP is ideal for streaming audio and video content. Its low-latency nature
ensures smooth playback, even if occasional data loss occurs.
Online Gaming: Many online games rely on UDP for fast communication between players.
DNS (Domain Name System) Queries : When your device looks up domain names (like converting
“www.example.com” to an IP address), UDP handles these requests efficiently .
Network Monitoring: Tools that monitor network performance often use UDP for lightweight, rapid data
exchange.
Multicasting: UDP supports packet switching, making it suitable for multicasting scenarios where data needs
to be sent to multiple recipients simultaneously.
Routing Update Protocol: Some routing protocols, like RIP (Routing Information Protocol), utilize UDP for
exchanging routing information among routers.
DIFFERENCES BETWEEN TRANSMISSION CONTROL PROTOCOL (TCP) AND USER DAYAGRAM PROTOCOL (UDP)
Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) both are protocols of the Transport Layer
Protocols. TCP is a connection-oriented protocol whereas UDP is a part of the Internet Protocol suite, referred to as
the UDP/IP suite. Unlike TCP, it is an unreliable and connectionless protocol. In this article, we will discuss the
differences between TCP and UDP
TCP is reliable as it guarantees the delivery of The delivery of data to the destination
Reliability
data to the destination router. cannot be guaranteed in UDP.
Stream Type The TCP connection is a byte stream. UDP connection is a message stream.
Example: Suppose there are two houses, H1 and H2, and a letter has to be sent from H1 to H2. But there is a river in
between those two houses. Now how can we send the letter?
Solution 1: Make a bridge over the river and then it can be delivered.
Solution 2: Get it delivered by a pigeon.
Consider the first solution as TCP . A connection has to be made (bridge) to get the data (letter)
delivered. The data is reliable because it will directly reach another end without loss of data or error.
The second solution is UDP . No connection is required for sending the data. The process is fast as compared
to TCP, where we need to set up a connection(bridge). But the data is not reliable: we don’t know whether
the pigeon will go in the right direction, will drop the letter on the way, or some issue is encountered mid-
travel.
Conclusion
To summarize, TCP and UDP are both important Transport Layer protocols with distinct properties and uses. TCP
offers dependable, orderly, and error-free data transmission, making it ideal for operations that require precision,
such as file transfers and web browsing. UDP, on the other hand, provides quicker, connectionless communication
that is excellent for real-time applications such as gaming and video streaming, when speed is critical and minor
data loss is acceptable. The exact requirements of the task at hand determine whether TCP or UDP should be used.
CHECKSUM
A checksum is a small-sized block of data derived from another block of digital data to detect errors that may have
been introduced during its transmission or storage1. It is used to verify data integrity but not data authenticity.
STATELESS
A stateless protocol is a type of communication that doesn’t depend on previous communications between
computers as it in UDP
SIMPLE DUPLEX
In simplex mode, Sender can send the data but the sender is unable receive the data. It’s a one way communication
in which communication happens in only one direction. Example of this kind of mode is Keyboard, Traditional
Monitors, etc.
HALF DUPLEX
In half-duplex mode, Sender can send the data and also receive the data one sequentially. It is a bidirectional
communication but limited to only one at a time. An example of this is the Walkie-Talkie, in which information is sent
one at a time but in bi-directions.
FULL DUPLEX
In Full-duplex mode, Sender can send the data and also can receive the data simultaneously. It is dual way
communication that is both way of communication happens at a same time. Example of this kind of transmission is
Telephone Network, where communication happens parallel.
High-Speed Communication: Data transfer is quicker because there is no delaying for the channel to clear
before sending or receiving data.
Reduced Latency: Since communication is parallel, time lag is minimized, which is critical for real-time
applications like web conferencing.
Better Utilization of Bandwidth: The available transmission capacity is used more efficient because both
directions of communication can occur at once.
PORTS
Port (Number) is a logical address that is allotted to every application on the computer that uses the internet to send
or receive data.
Whenever any application in one computer sends data to another application of a different computer then it sends
using IP Address and MAC Address but how does our computer know that this data is for a specific application and
this data is sent by any specific application? There comes the concept of Port.
For instance, imagine your MAC Address or IP Address as the PIN code of the nearest Post Office and your house
address as a Port. Whenever any parcel is sent to you it gets received by the nearest post office and then it is
identified by your address where to deliver that parcel. Similarly in a computer data is first received using their IP or
MAC address then it is delivered to the application whose port number is with the data packets.
Ports are assigned by computer i.e. operating system to different applications. Ports help computer to differentiate
between incoming and outgoing traffic. Since the port is a 16-bit unsigned number it ranges from 0 to 65535.
** some IP address comes with specified port number like 192.168.55.2.80 (the 80 is the port number) which
specifies the kind of data/message being sent across the network to the device which could be HTTP, FTP, IPP etc.
1. WELL KNOWN PORTS: Between 0 and 1023 (used by Operating System for Network Services)
These are port numbers between 0 and 1023. These Ports are used by Default Applications, Operating
Systems, Network Admins and Services. The Internet Assigned Numbers Authority (IANA) manages these
Ports.
vii. TELNET uses Port 23 to remotely access a Network Device or Computer.Its an old protocol that is still
commonly used for remote access to a Command Line Interface but it communicates in clear/plain (no
encryption)
viii. Simple Mail Transfer Protocol (SMTP) uses Port25 as the default port for sending emails.
ix. Domain Name System (DNS) uses Port 53 - This is the system that translates human readable domain
names into IP addresses. A critical component of internet Infrastructure.
23 TCP Telnet
2. REGISTERED PORT: between 1024 and 49151 (also known as user ports) (for Network users)
Used for specific application or protocol. Most of the Ports have an official usage though are less likely to be
used by average user’s devices.
3. DYNAMIC PORTS
SOURCE PORT
This identifies the kind of communication automatically generated by the sending device (Sender)
DESTINATION PORT
This determines the kind of service being requested.
SOCKETS (PAIRS)
The combination of the IP address and the Port number
MODULE 12
NETWORK APPLICATION SERVICES (APPLICATION LAYER SERVICES)
The use of internet services depends which includes Videos Streaming, Web Interactions, File Downs and Views etc.
requires Network Applications to make our connectivity and communication works.
Each of our services/interactions in a network requires some protocols from the TCP/IP suites to work and this forms
a reliable connectivity between the Client and the Server.
The translation of a domain name into IP address for web interaction since computer algorithms executes only 0s
and 1s (Zeros and Ones). The Server stores and interact with the IP addresses in relations to the domain name. They
way store Phone numbers on our phones in relative to their respective numbers.
There is Non-Authoritative and Authoritative DNS Server.
** DNS uses port 53
** HTTP uses Port 80
** HTTPS uses Port 443
The DNS server sits in the space between humans and computers to help facilitate their communication.
It's much easier to remember a domain or hostname like lifewire.com than the site's IP address of 151.101.2.114. So
when you access a website like Lifewire, all you have to type is the URL https://www.lifewire.com.
However, computers and network devices don't work well with domain names when trying to locate each other on
the internet. Using an IP address, the numerical representation of the server on which the website resides on the
network (internet) is far more efficient and precise.
The process described above happens the first time you visit a site. If you revisit the same site before the cache on
your web browser is cleared, there's no need to go through all these steps. Instead, the web browser will pull the
information from the cache. This translates to faster web browsing. Because of this, clearing the browser cache can
temporarily increase the time it takes to access your favorite websites, although this is usually too minor of a
difference to notice.
The recursive DNS server is responsible for handling DNS queries on behalf of the user and tries to resolve the domain
name.
** Non-Authoritative DNS Server - The usually visited sites is stored inn relative to the IP address as Non-
Authoritative
** Authoritative DNS Server - The newly visited sites is stored as Authoritative because the computer sees it as a
fresh demand
** Also know as name server
In essence, SSH acts as a secure conduit, establishing a confidential channel for communication in scenarios
where the network may pose security risks. This technology is instrumental for professionals seeking a reliable and
secure method of managing servers and transferring sensitive data across computers in a controlled and protected
manner.
SSH is a protocol for securely exchanging data between two computers over an untrusted network. SSH protects the
privacy and integrity of the transferred identities, data, and files. It runs in most computers and in practically every
server. It ships standard on UNIX, Linux, and macOS machines and it is used in over 90% of all data centers in the
world.
EMAIL SERVER
An email or mail server is a computer system with a mail transfer agent (MTA). Its main function is to send and
receive emails.
Email servers work pretty much like other kinds of servers. They are responsible for routing specific information, in
this case – emails, across a network like the internet.
Email servers rely on the IP addresses attached to emails and the DNS system to ensure that each message is routed
directly across the internet to the correct recipient, regardless of the domain.
MAIL CLIENT
While mail servers are the hardware responsible for sending and receiving emails, email clients are the software.
An email client is also notably not the same as mail server software. The latter processes incoming and outgoing mail
for many users in mail servers. And it allows a system administrator to manage accounts. On the other hand, an
email client simply sends, receives, and organizes mail for one specific user at a time.
Clients tend to work slightly differently when receiving emails, depending on which protocol is in use. If POP is at
work, the client downloads emails from the server to your local computer for you to access them. If SMTP or IMAP
are at work, the client synchronizes with the mail server to allow you to access your mail directly.
Ultimately, most email clients use SMTP to send emails.
As the user-facing aspect of emails that connect users to servers and allow them to access their important emails,
most folks on the internet tend to be familiar with email clients. If you’ve ever used Microsoft Outlook, Gmail, Apple
Mail, Mozilla Thunderbird, iOS Mail, Outlook or Yahoo Mail, then you are familiar with at least one email client.
DHCP SERVER (Dynamic Host Configuration Protocol)
A DHCP Server is a network server that holds IP addresses and other information for Client connectivity and
automatically provides and assign the IP addresses, default gateways and other network parameters to client
devices. It relies on the standard protocol known as Dynamic Host Configuration Protocol or DHCP to respond to
broadcast queries by clients.
A DHCP server automatically sends the required network parameters for clients to properly communicate on the
network. Without it, the network administrator has to manually set up every client that joins the network, which can
be cumbersome, especially in large networks. DHCP servers usually assign each client with a unique dynamic IP
address, which changes when the client’s lease for that IP address has expired.
WEB SERVER
A web server is a software application that runs on a hardware device that stores, processes, and serves web content
to users over the internet. It plays a critical role in the client-server model of the World Wide Web, where clients
(typically web browsers) request web pages and resources, and servers respond to these requests by delivering the
requested content.
Web servers operate on the Hypertext Transfer Protocol (HTTP), which is the foundation of data communication on
the World Wide Web. When you enter a website’s URL into your browser, it sends an HTTP request to the web server
hosting that website, which then sends back the web page you requested, allowing you to view it in your browser.
File transfer protocol server (commonly known as FTP Server) is computer software that facilitates the secure
exchange of files over a TCP/IP network. It runs the file transfer protocol (FTP), a standard communication protocol
that operates at the network level, to establish a secure connection between the devices in a client-server
architecture and efficiently transmit data over the internet.
** FTP Servera provides an easy method to transfer files from one Computer to another
** FTP Servers uses 2 different Ports to communicate
Port 21 for connecting to server
Port 20 for sending files after establishing connections
FTP servers are the software solutions used for transferring files across the internet. They are primarily used for two
essential functions, “Put” and “Get.” It allows uploading (Put) files to the server from the client device and
downloading (Get) files from the server on the client device. FTP server helps to accommodate the following
functions.
o Exchange Large Size Files: Organizations usually struggle to share large files over email. Businesses dealing
with vast amounts of data often face interruptions during their file sharing process due to large files. The FTP
server allows organizations to share large files without hassles.
o Enhance Security: The most significant purpose of employing FTP servers is to ensure a high level of security
while sending sensitive data across the network. FTP servers also support other types of secure file transfer
protocols such as SSH File Transfer Protocol (SFTP) and FTP Secure (FTPS) to add another layer of security.
These protocols ensure effective end-to-end encryption to secure files while in transit.
o Optimize Workflows: FTP servers help enterprises streamline the file sharing process to overcome
productivity challenges. With the right software application in place, users can share large volumes of data
instead of sharing a single file at a time. Centrally storing files minimizes the time required to locate a file,
and scheduled transfers help avoid any delays or interruptions across workflows.
o Improve Control: FTP servers empower businesses to exercise greater control over their data by providing
smart access controls. Since every user requires different permissions to access various files, administrators
can easily determine who can edit, upload, download, or share files based on permissions.
o Reliable Disaster Recovery: An effective FTP server ensures organizational data and files aren’t compromised
or lost in the wake of a disaster. Continuous and automatic backup helps in proactively storing data at other
locations for easy restoration when needed.
TELEPHONY
When the IP phone software has been installed, the user selects a unique name.
• A unique name allows calls to be received from other users.
• Calls are made to other users of the same service by selecting the username from a list.
A call to a regular telephone (landline or cell phone) requires using a gateway to access the Public Switched
Telephone Network (PSTN) and depending on the service, there may be charges associated with this type of call.
TEXT MESSAGING
• Enables users to communicate or chat over the
internet in real-time
• May also be called instant messages, direct
messages, private messages, and chat messages.
• Text messaging software is built into many
online applications, smart phone apps, and social
media sites.
Text messaging services on a computer are usually
accessed through a web-based client that is integrated into a social media or information sharing site.
There are also a number of standalone text message clients such as Cisco Webex Teams, Microsoft Teams,
WhatsApp, Facebook Messenger, and many others that support the transfer of documents, video, music, and audio
files.
TELNET
MODULE 13
Wireless technologies including Bluetooth is between 2.4GHz and 5Ghz frequency ranges
ETHERNET CABLE CATEGORY
Ethernet cables are grouped into sequentially numbered categories ("cat") based on different specifications; sometimes the
category is updated with further clarification or testing standards (e.g. 5e, 6a). These categories are how we can easily know
what type of cable we need for a specific application. Manufacturers are required to adhere to the standards, which makes our
lives easier.
Coaxial Cable
Ethernet Cable
IEEE is the organization responsible for the creation of the wireless technical standards.
WIRELESS SETTINGS
Network mode - Determines the type of technology that must be supported. For example, 802.11b, 802.11g, 802.11n or Mixed
Mode.
Network Name (SSID) - Used to identify the WLAN. All devices that wish to participate in the WLAN must have the same SSID.
Standard Channel - Specifies the channel over which communication will occur. By default, this is set to Auto to allow the AP to
determine the optimum channel to use.
SSID Broadcast - Determines if the SSID will be broadcast to all devices within range. By default, set to Enabled.
WIRELESS CHANNEL
Wireless Channels are created by dividing up the available RF spectrum. Each channel is capable of carrying a different
conversation.
Multiple APs can function in close proximity as long as they use different channels for communication.
As the category number gets higher, so does the speed and Mhz of the wire. This is not a coincidence, because each category
brings more stringent testing for eliminating crosstalk (XT) and adding isolation between the wires.
There are different ways to shield an Ethernet cable, but typically it involves putting a shield around each pair of wire in the
cable. This protects the pairs from crosstalk internally. Manufactures can further protect cables from alien crosstalk but
screening UTP or STP cables. Technically the picture above shows a Screened STP cable (S/STP).
ACCESS POINTS
Controls the flow of “traffic” of communicating devices in a network and act as the expandable protocol when number of users
on home wireless router is exhausted.
CSMA/CD
Standard channel in wireless network settings
SSID BROADCAST
RTS/CTS PROTOCOL
CHAPTER 14
• An ISP may offer additional services to their customers, such as email accounts, network storage, website hosting, and
automated backup or security services.
• ISPs are critical to communications across the global internet. Each ISP connects to other ISPs to form a network of links
that interconnect users all over the world.
CONNECTIVITY OPTIONS
1. Cable – This is often deployed by Cable Television service provides who also provides Internet Services, make
use of Coaxial Cables to connect to the end device from the receiving device (Antennas etc.) A special modem is
deployed to separate the Internet signal from the other signals carried on the cable.
2. DSL (Digital Subscriber Line) – This ISP connectivity runs over Telephone lines to provide high bandwidth
capacity transmission which is always on connection to the internet. This line is splinted into 3 parts for
different operations over the internet (Voice, File Uploading and File Downloading)
3. Cellular - Cellular internet access uses a cell phone network to connect. Performance will be limited by the
capabilities of the phone and the cell tower to which it is connected.
4. Satellite - Satellite service is a good option for homes or offices that do not have access to DSL or cable.
Satellite dishes (see figure) require a clear line of sight to the satellite and so might be difficult in heavily
wooded areas or places with other overhead obstructions. For example Starlink Satellite Internet service uses
Dish for connection
5. Dial-up Telephone - An inexpensive option that uses any phone line and a modem. To connect to the ISP, a user
calls the ISP access phone number. The low bandwidth provided by a dial-up modem connection is usually not
sufficient for large data transfer.
Internet Service Providers (ISPs) also interconnect to form the backbone of the internet as we have it today.
CLOUD COMPUTING
Cloud computing refers to the on-demand availability of computing resources, such as data storage, servers, networking
capabilities, and software, over the internet. This model allows users to access and utilize these resources without the need for
direct active management or ownership of the physical infrastructure.
This entails storing and accessing the data and programs on remote servers that are hosted on the internet instead of the
computer’s hard drive or local server. Cloud computing is also referred to as Internet-based computing, it is a technology where
the resource is provided as a service through the Internet to the user. The data that is stored can be files, images, documents,
or any other storable document.
• Cloud computing is one of the ways that we access and store data.
• Cloud computing allows us to store personal files, even backup an entire drive on servers over the internet.
• Applications such as word processing and photo editing can be accessed using the cloud.
• Cloud computing is possible because of data centers.
Data centers house servers, storage devices, and other network infrastructure equipment
Infrastructure: Cloud computing depends on remote network servers hosted on internet to store, manage, and process
the data.
On-Demand Access: Users can access cloud services and resources based on-demand they can scale up or down the
without having to invest for physical hardware.
Types of Services: Cloud computing offers various benefits such as cost saving, scalability, reliability and accessibility it
reduces capital expenditures, improves efficiency.
4. Community clouds - A community cloud is created for exclusive use by a specific community. The functional needs have
been customized for the community. For example, healthcare organizations.
It provides an enhancement in protection and customization by cloud resource utilization as per particular specified
requirements. It is perfect for companies which looking for security and compliance needs.
CLOUD SERVICES
1. Infrastructure as a Service (IaaS)
Flexibility and Control: IaaS comes up with providing virtualized computing resources such as VMs, Storage, and
networks facilitating users with control over the Operating system and applications.
Reducing Expenses of Hardware: IaaS provides business cost savings with the elimination of physical infrastructure
investments making it cost-effective.
Scalability of Resources: The cloud provides in scaling of hardware resources up or down as per demand facilitating
optimal performance with cost efficiency.
1. Scalability: With Cloud hosting, it is easy to grow and shrink the number and size of servers based on the need. This is
done by either increasing or decreasing the resources in the cloud. This ability to alter plans due to fluctuations in
business size and needs is a superb benefit of cloud computing, especially when experiencing a sudden growth in
demand.
2. Save Money: An advantage of cloud computing is the reduction in hardware costs. Instead of purchasing in-house
equipment, hardware needs are left to the vendor. For companies that are growing rapidly, new hardware can be
large, expensive, and inconvenient. Cloud computing alleviates these issues because resources can be acquired quickly
and easily. Even better, the cost of repairing or replacing equipment is passed to the vendors. Along with purchase
costs, off-site hardware cuts internal power costs and saves space. Large data centers can take up precious office space
and produce a large amount of heat. Moving to cloud applications or storage can help maximize space and significantly
cut energy expenditures.
3. Reliability: Rather than being hosted on one single instance of a physical server, hosting is delivered on a virtual
partition that draws its resource, such as disk space, from an extensive network of underlying physical servers. If one
server goes offline it will have no effect on availability, as the virtual servers will continue to pull resources from the
remaining network of servers.
4. Physical Security: The underlying physical servers are still housed within data centers and so benefit from the security
measures that those facilities implement to prevent people from accessing or disrupting them on-site.
5. Outsource Management: When you are managing the business, Someone else manages your computing
infrastructure. You do not need to worry about management as well as degradation.
6. Reduces cost: The cost-cutting ability of businesses that utilize cloud computing over time is one of the main
advantages of this technology. On average 15% of the total cost can be saved by companies if they migrate to the
cloud. By the use of cloud servers businesses will save and reduce costs with no need to employ a staff of technical
support personnel to address server issues. There are many great business modules regarding the cost-cutting benefits
of cloud servers such as the Coca-Cola and Pinterest case studies.
7. More storage: For software and applications to execute as quickly and efficiently as possible, it provides more servers,
storage space, and computing power. Many tools are available for cloud storage such as Dropbox, Onedrive, Google
Drive, iCloud Drive, etc.
8. Employees Better Work Life Balance: Direct connections between cloud computing benefits, and the work and
personal lives of an enterprise’s workers can both improve because of cloud computing. Even on holidays, the
employees have to work with the server for its security, maintenance, and proper functionality. But with cloud storage
the thing is not the same, employees get ample of time for their personal life and the workload is even less
comparatively.
9. Automatic Maintenance and Updates: AWS Cloud takes care of the infrastructure management and keeping with the
latest software automatically making updates they is new versions. Through this, AWS guarantee the companies
always having access to the newest technologies to focus completely on business operations and innovation.
10. Collaboration and Accessibility: Cloud computing provides easy access to data and applications from anywhere over
the internet. This encourages collaborative team participation from different locations through shared documents and
projects in real-time resulting in quality and productive outputs.
.
DISADVANTAGES OF CLOUD COMPTING
1. Security Concerns: Storing of sensitive data on external servers raised more security concerns which is one of the main
drawbacks of cloud computing.
2. Downtime and Reliability: Even though cloud services are usually dependable, they may also have unexpected
interruptions and downtimes. These might be raised because of server problems, Network issues or maintenance
disruptions in Cloud providers which negative effect on business operations, creating issues for users accessing their
apps.
3. Dependency on Internet Connectivity: Cloud computing services heavily rely on Internet connectivity. For accessing the
cloud resources the users should have a stable and high-speed internet connection for accessing and using cloud
resources. In regions with limited internet connectivity, users may face challenges in accessing their data and
applications.
4. Cost Management Complexity: The main benefit of cloud services is their pricing model that coming with Pay as you
go but it also leads to cost management complexities. On without proper careful monitoring and utilization of
resources optimization, Organizations may end up with unexpected costs as per their use scale. Understanding and
Controlled usage of cloud services requires ongoing attention.
Data Encryption: Encryption is essential for securing data stored in the cloud. It ensures that data remains unreadable
to unauthorized users even if it is intercepted.
Access Control: Implementing strict access controls and authentication mechanisms helps ensure that only authorized
users can access sensitive data and resources in the cloud.
Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring users to provide multiple forms of
verification, such as passwords, biometrics, or security tokens, before gaining access to cloud services.
VIRTUALISATION
Virtualization is a technology that allows for the creation of multiple simulated environments or dedicated resources from a
single, physical hardware system. It uses software to create an abstraction layer over computer hardware, enabling the division
of a single computer's hardware components—such as processors, memory, and storage—into multiple virtual machines
(VMs). Each VM runs its own operating system (OS) and behaves like an independent computer, even though it is running on
just a portion of the actual underlying computer hardware.
Virtualization makes Cloud computing realistic over the internet, Oracle Virtual Box, Linux
Having Window OS and kali Linux in one machine (Computer) is made possible by Virtualization
Virtualization allows sharing of a single physical instance of a resource or an application among multiple customers and
organizations at one time. It does this by assigning a logical name to physical storage and providing a pointer to that physical
resource on demand.
Network Virtualization
• Virtualization separates the operating system (OS) from the hardware.
• Server virtualization takes advantage of idle resources and consolidates the number of required servers. It allows for
multiple operating systems to exist on a single hardware platform.
• Network virtualization combines traditional networking hardware and software network resources into a software-
based entity, a virtual network.
• Network virtualization combines traditional networking hardware and software network resources into a software-
based entity, which is a virtual network.
HYPERVISORS