Since the seventies, computer
networking is growing exponentially and has become an indispensable part
of everyone’s life owing to its applications in varied commercial sectors
including private and government like schools, banks, hospitals,
military organizations, and even homes. However, it is extremely confusing
for a beginner due to a lack of consistency in networking standards and its
terminology. Hence, to excel in networking, it is imperative to dig deeper and
understand the five key aspects as such:
- Internet applications and network programming.
- Data communications.
- Packet Switching and networking technologies.
- Internetworking with TCP/IP.
- Additional networking concepts and technologies.
** ISP: Internet Service Provider.
I have created an Index to highlight
the things I learned, while following various reference books.
1. Understanding Network Programming/ Networking
2. Network Hardware Components
o Servers
o Routers
o Repeaters
o Hubs
o Switch
o Bridge
o Gateways
3. Network Cables
o Standard or Straight
o Crossover
4. Understanding Network Topologies
o Point to Point
o Bus
o Ring
o Star
o Tree
o Mesh
o Hybrid
5. Networking Protocols
o TCP/IP and UDP
o DNS
o DHCP
o HTTP
o FTP
o SMTP
o VoIP
6. Remote Network Access
o Remote Node
o Remote Control
o VPN
7. Network Security
o Internal Security
o External Threats
o Virus and Other Malicious Softwares
8. Network Designing
I am explaining all the things one by
one below:
Understanding Network Programming/ Networking:
The Internet offers distinct applications for the convenience of end-users offering well-defined protocols. Along with this, it also offers various network services like naming, configuring, filing, and printing servers. All internet applications work on a single transport layer that provides TCP and UDP and Network layer providing IP and port numbers ( System, User and Dynamic) to create a possible communication channel between them. There are two main paradigms for writing Internet applications that are client-server and Peer-to-Peer(P2P).
Network programming involves writing computer
programs enabling communication between different devices connected across a
computer network whether its connection-oriented or connection-less.
Traditionally network planning includes seven different layers of the OSI/ISO
model as below:
** TCP: Transmission Control Protocol:
Connection-Oriented communication that allows reliable communication between
two applications.
**UDP: User Data-gram Protocol: Connection-less Communication that allows transfer of packet data between two applications.
**IP: Internet Protocol: Label or address assigned to each device connected with the computer.
**OSI/ISO: Open Systems Interconnection: Model showing the communication of applications over a network.
**UDP: User Data-gram Protocol: Connection-less Communication that allows transfer of packet data between two applications.
**IP: Internet Protocol: Label or address assigned to each device connected with the computer.
**OSI/ISO: Open Systems Interconnection: Model showing the communication of applications over a network.
Network Hardware Components:
For planning, troubleshooting and
maintenance of networks some devices are generally used like Servers, Routers,
Repeaters, Hubs, Switches, Bridges, Gateways and many more.
Network Cables:
Out
of the various network cables available in the market, the most common used
cable for LAN's is Category 5 (Cat-5) or Category 6 (Cat-6) which is a twisted
pair cable and allows the network signal to travel through eight wires in total
(four twisted pairs), and follows different arrangements and color coding to
transfer different signals through Ethernet cables.
1. Standard
or Straight: Here both the ends of the cable follow same color-coding
or wiring pattern as below:
RJ45 Pin#
|
Wire Color
|
10/100 Base-T Use
|
1
|
White/Orange
|
Transmit +
|
2
|
Orange
|
Transmit -
|
3
|
White/Green
|
Receive +
|
4
|
Blue
|
Unused
|
5
|
White/Blue
|
Unused
|
6
|
Green
|
Receive -
|
7
|
White/Brown
|
Unused
|
8
|
Brown
|
Unused
|
2. Crossover: Here the arrangement of both the ends is different from each other as below:
RJ45Pin#(END1)
|
Wire Color(END1)
|
RJ45 Pin#(END2)
|
Wire Color(END2)
|
1
|
White/Orange
|
1
|
White/Green
|
2
|
Orange
|
2
|
Green
|
3
|
White/Green
|
3
|
White/Orange
|
4
|
Blue
|
4
|
White/Brown
|
5
|
White/Blue
|
5
|
Brown
|
6
|
Green
|
6
|
Orange
|
7
|
White/Brown
|
7
|
Blue
|
8
|
Brown
|
8
|
White/Blue
|
**LAN: Local Area Network: A computer network that allows communication between
computers within a limited area.
**RJ45: Registered Jack 45:
Standardized networking interface used for Ethernet cabling.
Understanding Network Topologies:
Network
Topologies or Network Architecture refers to the shape of the network. To
clarify, it means the logical arrangement in which all the points (nodes) of a
network are connected together via network wires. The network follows various
topologies like Point to Point, Bus, Star, Ring, Tree, Mesh, Hybrid, their
overview is as below:
S.
No.
|
Topology
|
Definition
|
Advantages
|
Disadvantages
|
1
|
Point to
point
|
A direct link between two computers
|
Faster and Reliable
|
Used only for small areas where computers are in
close proximity.
|
2
|
Bus
|
Uses one main cable to connect all the computers
or nodes
|
Easy to connect and cost-effective
|
If one cable breaks the entire network can break
down. Hence, it is difficult to troubleshoot.
|
3
|
Ring
|
Devices are connected in a circular form
indicating a ring.
|
Easy to install and configure and detecting
faults within a network.
|
It has unidirectional traffic and breaks in a a
single ring can halt the entire network.
|
4
|
Star
|
Each computer is connected with a hub at the
center using point to point connection.
|
Problem with one node does not affect other
nodes.
|
More expensive, because it requires more cables
for connecting devices.
|
5
|
Tree
|
Elements are connected in an arrangement similar
to branches of the tree.
|
Expansion of nodes is easy, and the network can
be easily maintained, managed, and diagnosed in case of any error.
|
If the central hub is failed, then the whole
network will stop working. Maintenance is also difficult because it is
heavily cabled and hence, costly as well.
|
6
|
Mesh
|
All nodes cooperate with each other to distribute
data.
|
Traffic can be easily managed, and failure of a
the device does not affect data or network flow.
|
Cost, building and maintenance of a network is on
high side.
|
7
|
Hybrid
|
Includes mixing of two or more different
network topologies.
|
Reliable having better fault tolerance. Offers
flexibility, hence, most effective.
|
Extremely complex and expensive architecture,
therefore, it needs expert designers.
|
Networking Protocols:
A network protocol is a set of rules
followed to establish a communication network and completing desired network
transactions. Some commonly used network protocols are TCP/IP and UDP, DNS,
DHCP, HTTP, FTP, SMTP, VoIP and so on.
1. TCP/IP and UDP: TCP/IP is basically two different protocols but generally used together in concert with each other. Here, the IP (Internet Protocol), not only defines the way to address network data from source to destination but also tells the correct sequence in which the data is re-assembled at the other end. It operates at the network layer in OSI model. Whereas, the TCP (Transmission control protocol) operates at Transport Layer. It mainly manages connections between computers.
However, the UDP (User Datagram Protocol) has almost similar roles as TCP but unlike TCP, it re-sends any un-received packet back and is faster and reliable for insignificant network communications.
2. DNS: Domain Name System: It is a naming system introduced for humans to access online information eliminating the need to remember complex IP addresses. Here, some domain names are assigned to various IP addresses to make it convenient for humans to access them.
3. DHCP: Dynamic Host Configuration Protocol: It basically deals with network management where the server assigns an IP address, default gateways and other network parameters to develop a communication between different networks.
4. HTTP: Hypertext Transfer Protocol: Protocol used by the World Wide Web (WWW) to access hypertext documents including hypertext links can easily be accessible by the user through various web browsers like Google Chrome, Mozilla Firefox, Microsoft Internet Explorer, and so on.
5. FTP: File Transfer Protocol: It is an application layer protocol primarily used for sending and receiving files between a client and a server where transfers are generally text-based and password protected.
6. SMTP: Simple Mail Transfer Protocol: It is an application layer protocol used for sending and receiving E-mail messages between servers and is decoded at the receiver end by using one of POP (Post Office Protocol) or IMAP (Internet Message Access Protocol).
7. VoIP: Voice Over IP: It is a process of transmitting voice calls or messages over IP networks and allows us to make free or very less priced telephone calls over the internet.
Remote Network Access:
1. TCP/IP and UDP: TCP/IP is basically two different protocols but generally used together in concert with each other. Here, the IP (Internet Protocol), not only defines the way to address network data from source to destination but also tells the correct sequence in which the data is re-assembled at the other end. It operates at the network layer in OSI model. Whereas, the TCP (Transmission control protocol) operates at Transport Layer. It mainly manages connections between computers.
However, the UDP (User Datagram Protocol) has almost similar roles as TCP but unlike TCP, it re-sends any un-received packet back and is faster and reliable for insignificant network communications.
2. DNS: Domain Name System: It is a naming system introduced for humans to access online information eliminating the need to remember complex IP addresses. Here, some domain names are assigned to various IP addresses to make it convenient for humans to access them.
3. DHCP: Dynamic Host Configuration Protocol: It basically deals with network management where the server assigns an IP address, default gateways and other network parameters to develop a communication between different networks.
4. HTTP: Hypertext Transfer Protocol: Protocol used by the World Wide Web (WWW) to access hypertext documents including hypertext links can easily be accessible by the user through various web browsers like Google Chrome, Mozilla Firefox, Microsoft Internet Explorer, and so on.
5. FTP: File Transfer Protocol: It is an application layer protocol primarily used for sending and receiving files between a client and a server where transfers are generally text-based and password protected.
6. SMTP: Simple Mail Transfer Protocol: It is an application layer protocol used for sending and receiving E-mail messages between servers and is decoded at the receiver end by using one of POP (Post Office Protocol) or IMAP (Internet Message Access Protocol).
7. VoIP: Voice Over IP: It is a process of transmitting voice calls or messages over IP networks and allows us to make free or very less priced telephone calls over the internet.
It
allows users to access the system or a network through a network connection
even if the person is not physically present at the site. To establish remote
access connections different technologies are used as such:
1. Remote Node: A process in which a terminal or a computer system located far away from the main network can access LAN connection via an Internet or dial-up connection.
2. Remote Control: A process in which a remote user can take control of another workstation directly connected with LAN via some software installed on both the PCs. This also uses a dial-up line or an Internet connection.
1. Remote Node: A process in which a terminal or a computer system located far away from the main network can access LAN connection via an Internet or dial-up connection.
2. Remote Control: A process in which a remote user can take control of another workstation directly connected with LAN via some software installed on both the PCs. This also uses a dial-up line or an Internet connection.
Remote
Control Session
|
3.VPN: Virtual Private Networks: A link created between
the remote user (Connected to ISP) and the company's LAN via the Internet over
a public network. It uses encrypted layered tunneling protocol that makes it a
secure private network and often requires authentications to gain its access.
Typical VPN
Connection
Network Security:
It consists of a set of rules, regulations, and
policies adopted to protect the integrity and prevent unauthorized access of a
computer network peripherals either by hardware or software. Basically threats
may be internal, external, or by viruses and other malicious software.
1. Internal Security: Refers to securing the network from internal threats like accessing
unauthorized information by impersonating other users or deliberately
introducing viruses to the network. Sometimes the users even sniff packets on
the network to discover login in credentials of the company.
2. External Threats: Refers to securing the network from external threats like Front-Door
Threats, Back door Threats and Denial of Service (DoS)
- Front-Door Threats: It
arises when an outsider cracks the password and accesses the network.
- Back-Door Threats: It
arises when the software or hardware bugs allow attackers to log in to the
administrative account.
- Denial of service(DoS): It
arises when an intruder crashes servers or creates useless traffic to
barren the access and denies service to the network.
3. Viruses and other Malicious Software: Unfortunately, some software and programs are specifically used or
created with ill intention like:
- Viruses: It is a program that infects other files by creating a copy of itself.
- Worms: It is a
program that propagates by sending copies of itself to other computers and
thereafter again to others without the knowledge of the user.
- Trojan horses: It is a program that misleads the user by
hiding its true intention and doing malicious activities in the
background.
- Logic Bombs: It is a program that is intentionally inserted
into a software to take its advantage (Often with ill intention) when
certain conditions are met.
Network Designing:
Network designing is not an exact
science but an iterative process that aims to ensure that the user's and
project's requirements are fulfilled. It acts as the backbone of any IT
business because it creates a network and connects all the network devices
together allowing information access throughout the industry. Before
implementing any network design, it is planned to ensure its efficiency.
Any network design should show:
- A clear map of the network.
- Layout or wiring diagram of the cables.
- The location, quantity, and types of devices to be used.
- Following a particular structure of the IP Address.
- Deciding network security architecture and processes.
To ensure the designed network is best
following things are taken into account:
- The actual design phase should be done diligently.
- Always plan while keeping the future in mind.
- Security should be embedded in the design.
- The network should be properly monitored.
- Network designing never finishes.
No comments:
Post a Comment