View on GitHub

Notes

reference notes

1.2 Network components

Host

All computers that are connected to a network and participate directly in network communication are classified as hosts. some are called end devices, and also clients.

Internet Protocol (IP) address is the number that identifies a host on a network.

Peer to peer

Peer to peer (P2P) is when a computer functions as both a client and a server.

Advantages Disadvantages
Easy to set up No centralized administration
Less complex Not as secure
Lower cost Not scalable
Used for simple tasks: transferring files and sharing printers Slower performance

End devices

An end device is either the source or destination of a message transmitted over the network. each end device on a network has an address that is used to identify it.

Intermediary Network Devices

Intermediary network devices are used to connect individual end devices to the network. They are also used to connect networks together to form an internetwork.

Their job is to provide connectivity and ensure data flow across the network.

They use the end device destination address in conjunction with info about the network interconnections to determine the path the message should take.

Other roles include:

Network Media

Network media is the physical medium that carries the data signals from one device to another. e.g copper wire, fiber optic cable, radio waves, etc.

Media Types Description
Metal wires within cables Uses electrical impulses
Glass or plastic fibers within cables (fiber-optic cable) Uses pulses of light.
Wireless transmission Uses modulation of specific frequencies of electromagnetic waves.(bluetooth, WiFi, infrared…. )

1.3 Network Representations and Topologies

Network Representation

Network diagrams, often called topology diagrams, use symbols to represent devices within the network.

Specialized terminology used to describe how each of these devices and media connect to each other:

Topology Diagrams

They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.

1.4 Common Types of Networks

Networks of Many Sizes

Size Description
Small Home Networks connect a few computers to each other and the Internet
Small Office/Home Office enables computer within a home or remote office to connect to a corporate network
Medium to Large Networks many locations with hundreds or thousands of interconnected computers
World Wide Networks connects hundreds of millions of computers worldwide – such as the internet

LANs and WANs

Network infrastructures vary greatly in terms of:

LANs and WANs

The Internet

The internet is a worldwide collection of interconnected LANs and WANs (basicly just collection of interconnected networks).

Internet is not owned by any single entity. There are organizations that were developed to help maintain the structure and standardization of internet protocols and processes. e.g. Internet Engineering Task Force (IETF), Internet Corporation for Assigned Names and Numbers (ICANN), Internet Architecture Board (IAB), etc.

Intranet and Extranet

Intranet, Intranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization.

Extranet, Extranet is a term often used to refer to a private connection of LANs and WANs that belongs to an organization but is shared with other organizations. so basically it’s a private network that is connects more than one organization together.

1.5 Internet Connections

Internet Access Technologies

Home and Small Office Internet Connections

Connection Description
Cable high bandwidth, always on, internet offered by cable television service providers.
DSL high bandwidth, always on, internet connection that runs over a telephone line.
Cellular uses a cell phone network to connect to the internet.
Satellite major benefit to rural areas without Internet Service Providers.
Dial-up telephone an inexpensive, low bandwidth option using a modem.

Businesses Internet Connections

Businesses may require higher bandwidth, dedicated bandwidth, and managed services.

Connection Description
Dedicated Leased Line These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Ethernet WAN This extends LAN access technology into the WAN.
DSL Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL).
Satellite This can provide a connection when a wired solution is not available.

The Converging Network

Traditional Separate Networks Converging Networks
Each network uses different technologies to carry the communication signal Capable of delivering data, voice, and video between many different types of devices over the same network infrastructure
Each network had its own set of rules and standards Uses the same set of rules, agreements, and implementation standards
Multiple services ran on multiple networks. Multiple services run on a single network.

1.6 Reliable Networks

Network Architecture

In this context, network architecture refers to the technologies used to build the network. It is the foundation of the network and is the most important factor in determining the reliability of the network. to meet user expectations, the network must address the following: Fault Tolerance, Scalability, Quality of Service (QoS), Security

Fault Tolerance

Fault tolerance network limits the number of devices affected during a failure.

it does that by having multiple paths between the source and destination devices. this is called Redundancy.

Packet switching networks are inherently fault tolerant because they use multiple paths to send data. it breaks down a single message into smaller packets and sends them along different paths. that way the UX is not affected if one of the paths fails.

Scalability

When a network is scalable, it means it can quickly expand to support new users and applications without affecting(degrading) the performance of the network.

These networks are scalable because the designers follow accepted standards and protocols.

Quality of Service (QoS)

Network congestion, occurs when the demand for network bandwidth exceeds its availability.

Network bandwidth is measured in the number of bits that can be transmitted in a single second, or bits per second (bps).

Devices will hold the packets in memory until resources become available to transmit them.

This is handled by having a QoS policy that prioritizes certain types of traffic over others. The type of traffic is important not the content of the traffic.

Security

Tow types of security:

Three goals of network security:

1.7 Network Trends

Bring Your Own Device (BYOD)

Allows users to use their own devices giving them more opportunities and greater flexibility. BYOD means any device, with any ownership, used anywhere.

Online Collaboration

Online collaboration is the ability to work together on a project in real time, regardless of geographic location.

Collaboration is a very high priority for businesses and in education.

Video Communication

Cloud Computing

It is mad possible by data centers that are located in different parts of the world: smaller companies that can’t afford to build their own data centers can lease server and storage services from large data center organizations.

Four types of Clouds:

  1. Public Clouds: Available to the general public through a pay-per-use model or for free.
  2. Private Clouds: Intended for a specific organization or entity such as the government.
  3. Hybrid Clouds: Made up of two or more Cloud types – for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture.
  4. Custom Clouds: Built to meet the needs of a specific industry, such as healthcare or media. Can be private or public.

Smart home technology is a growing trend that allows technology to be integrated into every-day appliances which allows them to interconnect with other devices. e.g. Nest thermostat, Amazon Echo, etc.

Powerline Networking

Using the same electrical wiring in your home to connect devices to the network.

Powerline networking can allow devices to connect to a LAN where data network cables or wireless communications are not a viable option by Using a standard powerline adapter

Wireless Broadband

1.8 Network Security

Security Threats

External Threats:

Internal Threats:

Security Solutions

Network security components for home or small office network:

Larger networks have additional security requirements: