Networking Class Overview Notes
Networking Class Overview Notes
In both models, the Transport layer ensures reliable data transmission, utilizing protocols like TCP for reliable communication or UDP for faster, less reliable communication . The Network layer in both models is responsible for logical addressing and routing, ensuring data packets are transmitted from source to destination across different networks . However, the OSI model provides a more detailed, theoretical framework with distinct layers, whereas the TCP/IP model is more practical, combining some OSI layers for simplicity and effectiveness in real-world applications .
The OSI model is a comprehensive framework with seven layers that describe different network functions, including applications, data formatting, and physical transmission . The TCP/IP model, widely used in practical applications, is simpler with four layers, combining some OSI layers, such as merging Application, Presentation, and Session into one . While OSI is more descriptive and theoretical, TCP/IP is the backbone of internet communications and more practical for implementation purposes.
Different topologies have unique impacts on network efficiency and reliability. The star topology is reliable and easy to manage due to its central hub, but can become a single point of failure . Mesh topology provides high redundancy and fault tolerance by connecting each device to multiple others, which enhances reliability but increases complexity and costs . A bus topology is simple and cost-effective but vulnerable to cable breaks, affecting efficiency . Evaluating these factors is crucial in designing networks that balance cost, performance, and resilience.
IPv6 offers a vastly larger address space using 128-bit addresses compared to IPv4's 32-bit addresses, effectively eliminating the address exhaustion problem faced by IPv4 . IPv6 also provides features like improved hierarchical addressing and routing efficiency, better support for new IP features, and simplification of packet processing, which are limitations in IPv4 . These enhancements support the growing number of devices and applications connected to the internet.
Network security can be enhanced through various measures such as firewalls, IDS, VPNs, and encryption. Firewalls control and monitor inbound and outbound network traffic based on security rules, blocking unauthorized access . IDS detect and alert network administrators of suspicious activities, preventing potential breaches . VPNs create secure, encrypted tunnels over public networks, protecting data integrity and privacy . Encryption secures data by transforming it into an unreadable format for unauthorized users, ensuring confidentiality . These measures collectively safeguard against cyber threats while ensuring secure communication.
Switches, unlike hubs, connect devices within a LAN and forward data only to the intended recipient using MAC addresses, which improves network efficiency by reducing unnecessary data traffic . Hubs, conversely, broadcast data to all devices within the network regardless of the destination, making them less efficient and increasing the likelihood of collisions . This distinction makes switches more suitable for efficient network design.
The Physical layer defines the hardware and physical aspects of the network, including cables, connectors, and signal types, which are fundamental for data transmission across the network . Its proper implementation ensures reliable and fast data transfer, minimizing signal loss and interruptions . Effective design and maintenance of this layer are critical because physical issues can lead to significant network disruptions, impacting overall functionality.
TCP/IP provides the foundation for internet communication by ensuring reliable and ordered data delivery (TCP) and handling addressing and routing (IP). DNS translates human-readable domain names into IP addresses, allowing users to access websites using memorable names rather than complex numerical addresses . Together, these protocols enable seamless data exchange and accessibility across global networks.
Subnetting divides a large network into smaller, manageable subnetworks, reducing congestion by limiting broadcast domains, which enhances network performance . Additionally, it allows better control over traffic and access within different segments, thereby improving security by isolating specific network areas and limiting potential attack vectors . These benefits help optimize network resources and safeguard information flow.
Fault tolerance varies greatly across topologies. Mesh topology offers high fault tolerance due to its multiple redundant paths, allowing communication even if some connections fail . Star topology is fault-tolerant concerning individual link failures because each device is connected to a central hub; however, hub failure causes network-wide issues . Bus topology lacks fault tolerance as a single cable break disrupts the entire network . Evaluating these differences is essential for selecting the appropriate topology based on specific network requirements.