Networking

Since the seventies, computer networking is growing exponentially and has become an indispensable part of everyone’s life owing to its applications in varied commercial sectors including private and government like schools, banks, hospitals, military organizations, and even homes. However, it is extremely confusing for a beginner due to a lack of consistency in networking standards and its terminology. Hence, to excel in networking, it is imperative to dig deeper and understand the five key aspects as such:


  1. Internet applications and network programming.
  2. Data communications.
  3. Packet Switching and networking technologies.
  4. Internetworking with TCP/IP.
  5. Additional networking concepts and technologies.
** ISP: Internet Service Provider.


I have created an Index to highlight the things I learned, while following various reference books.
1.     Understanding Network Programming/ Networking
2.     Network Hardware Components
o    Servers
o    Routers
o    Repeaters
o    Hubs
o    Switch
o    Bridge
o    Gateways
3.     Network Cables
o    Standard or Straight
o    Crossover
4.     Understanding Network Topologies
o    Point to Point
o    Bus
o    Ring
o    Star
o    Tree
o    Mesh
o    Hybrid
5.     Networking Protocols
o    TCP/IP and UDP
o    DNS
o    DHCP
o    HTTP
o    FTP
o    SMTP
o    VoIP
6.     Remote Network Access
o    Remote Node
o    Remote Control
o    VPN
7.     Network Security
o    Internal Security
o    External Threats
o    Virus and Other Malicious Softwares
8.     Network Designing
      I am explaining all the things one by one below:


Understanding Network Programming/ Networking:


The Internet offers distinct applications for the convenience of end-users offering well-defined protocols. Along with this, it also offers various network services like naming, configuring, filing, and printing servers. All internet applications work on a single transport layer that provides TCP and UDP and Network layer providing IP and port numbers ( System, User and Dynamic) to create a possible communication channel between them. There are two main paradigms for writing Internet applications that are client-server and Peer-to-Peer(P2P).






Network programming involves writing computer programs enabling communication between different devices connected across a computer network whether its connection-oriented or connection-less. Traditionally network planning includes seven different layers of the OSI/ISO model as below:




** TCP: Transmission Control Protocol: Connection-Oriented communication that allows reliable communication between two applications.

**UDP: User Data-gram Protocol: Connection-less Communication that allows transfer of packet data between two applications.

**IP: Internet Protocol: Label or address assigned to each device connected with the computer.

**OSI/ISO: Open Systems Interconnection: Model showing the communication of applications over a network.


Network Hardware Components: 

For planning, troubleshooting and maintenance of networks some devices are generally used like Servers, Routers, Repeaters, Hubs, Switches, Bridges, Gateways and many more.


S. No.
Hardware
Use Case
Illustration
1
Servers
Performs network functions for the computers and have several categories:
  • File and Print Servers
  • Application servers
  • E-Mail servers
  • Networking servers
  • Internet servers
  • Remote Access servers




2
Routers
A device that allows the transfer of data in the form of packets from one network to another. Basically, it is used to provide broadband internet connection either to a PC or LAN in an organization. They also contain RJ 45 Ports to connect other network devices using network cables.

3
Repeaters
Repeaters acts as a signal booster that re-generates signals and allows transmission of them at a longer distance.

                  
4
Hubs
Consists of Input and Output ports and can split the same network signals into all connected computers. It also acts as a multi-port repeater.
5
Switches
It is an advanced version of a hub and uses a physical address to send the signal only to the destination port instead of broadcasting it.

                         
6
Bridges
It connects two separate Ethernet network (following the same protocol) together and establishes a connection between them by forwarding packets from one port to the destination port.

                   
7
Gateways
It acts as a gate that allows the entrance of a signal in a network and can connect entirely different networks (following different protocols) together to allow the transfer of signals.



Network Cables:


Out of the various network cables available in the market, the most common used cable for LAN's is Category 5 (Cat-5) or Category 6 (Cat-6) which is a twisted pair cable and allows the network signal to travel through eight wires in total (four twisted pairs), and follows different arrangements and color coding to transfer different signals through Ethernet cables.

CAT5 Cable

1. Standard or Straight: Here both the ends of the cable follow same color-coding or wiring pattern as below:

RJ45 Pin#
Wire Color
10/100 Base-T Use
1
White/Orange
Transmit +
2
Orange
Transmit -
3
White/Green
Receive +
4
Blue
Unused
5
White/Blue
Unused
6
Green
Receive -
7
White/Brown
Unused
8
Brown
Unused


2. Crossover:  Here the arrangement of both the ends is different from each other as below:


RJ45Pin#(END1)
Wire Color(END1)
RJ45 Pin#(END2)
Wire Color(END2)
1
White/Orange
1
White/Green
2
Orange
2
Green
3
White/Green
3
White/Orange
4
Blue
4
White/Brown
5
White/Blue
5
Brown
6
Green
6
Orange
7
White/Brown
7
Blue
8
Brown
8
White/Blue












**LAN: Local Area Network: A computer network that allows communication between computers within a limited area.
**RJ45: Registered Jack 45: Standardized networking interface used for Ethernet cabling.

Understanding Network Topologies:

Network Topologies or Network Architecture refers to the shape of the network. To clarify, it means the logical arrangement in which all the points (nodes) of a network are connected together via network wires. The network follows various topologies like Point to Point, Bus, Star, Ring, Tree, Mesh, Hybrid, their overview is as below:





S. No.
Topology
Definition
Advantages
Disadvantages
1
Point to point
A direct link between two computers
Faster and Reliable
Used only for small areas where computers are in close proximity.
2
Bus
Uses one main cable to connect all the computers or nodes
Easy to connect and cost-effective
If one cable breaks the entire network can break down. Hence, it is difficult to troubleshoot.
3
Ring
Devices are connected in a circular form indicating a ring.
Easy to install and configure and detecting faults within a network.
It has unidirectional traffic and breaks in a a single ring can halt the entire network.
4
Star
Each computer is connected with a hub at the center using point to point connection.
Problem with one node does not affect   other nodes.
More expensive, because it requires more cables for connecting devices.
5
Tree
Elements are connected in an arrangement similar to branches of the tree.
Expansion of nodes is easy, and the network can be easily maintained, managed, and diagnosed in case of any error.
If the central hub is failed, then the whole network will stop working. Maintenance is also difficult because it is heavily cabled and hence, costly as well.
6
Mesh
All nodes cooperate with each other to distribute data.
Traffic can be easily managed, and failure of a the device does not affect data or network flow.
Cost, building and maintenance of a network is on high side.
7
Hybrid
Includes mixing of two or more     different network topologies.
Reliable having better fault tolerance. Offers flexibility, hence, most effective.
Extremely complex and expensive architecture, therefore, it needs expert designers.

Networking Protocols:


A network protocol is a set of rules followed to establish a communication network and completing desired network transactions. Some commonly used network protocols are TCP/IP and UDP, DNS, DHCP, HTTP, FTP, SMTP, VoIP and so on.

1. TCP/IP and UDP:  TCP/IP is basically two different protocols but generally used together in concert with each other. Here, the IP (Internet Protocol), not only defines the way to address network data from source to destination but also tells the correct sequence in which the data is re-assembled at the other end. It operates at the network layer in OSI model. Whereas, the TCP (Transmission control protocol) operates at Transport Layer. It mainly manages connections between computers.

However, the UDP (User Datagram Protocol) has almost similar roles as TCP but unlike TCP, it re-sends any un-received packet back and is faster and reliable for insignificant network communications.

2. DNS: Domain Name System: It is a naming system introduced for humans to access online information eliminating the need to remember complex IP addresses. Here, some domain names are assigned to various IP addresses to make it convenient for humans to access them.

3. DHCP: Dynamic Host Configuration Protocol: It basically deals with network management where the server assigns an IP address, default gateways and other network parameters to develop a communication between different networks.

4. HTTP: Hypertext Transfer Protocol: Protocol used by the World Wide Web (WWW) to access hypertext documents including hypertext links can easily be accessible by the user through various web browsers like Google Chrome, Mozilla Firefox, Microsoft Internet Explorer, and so on.

5. FTP: File Transfer Protocol: It is an application layer protocol primarily used for sending and receiving files between a client and a server where transfers are generally text-based and password protected.

6. SMTP: Simple Mail Transfer Protocol: It is an application layer protocol used for sending and receiving E-mail messages between servers and is decoded at the receiver end by using one of POP (Post Office Protocol) or IMAP (Internet Message Access Protocol).

7. VoIP: Voice Over IP: It is a process of transmitting voice calls or messages over IP networks and allows us to make free or very less priced telephone calls over the internet.

Remote Network Access:

It allows users to access the system or a network through a network connection even if the person is not physically present at the site. To establish remote access connections different technologies are used as such:

1. Remote Node: A process in which a terminal or a computer system located far away from the main network can access LAN connection via an Internet or dial-up connection.

2. Remote Control: A process in which a remote user can take control of another workstation directly connected with LAN via some software installed on both the PCs. This also uses a dial-up line or an Internet connection.


Remote Control Session

3.VPN: Virtual Private Networks: A link created between the remote user (Connected to ISP) and the company's LAN via the Internet over a public network. It uses encrypted layered tunneling protocol that makes it a secure private network and often requires authentications to gain its access.

Typical VPN Connection

Network Security:

It consists of a set of rules, regulations, and policies adopted to protect the integrity and prevent unauthorized access of a computer network peripherals either by hardware or software. Basically threats may be internal, external, or by viruses and other malicious software.


1. Internal Security: Refers to securing the network from internal threats like accessing unauthorized information by impersonating other users or deliberately introducing viruses to the network. Sometimes the users even sniff packets on the network to discover login in credentials of the company.

2. External Threats: Refers to securing the network from external threats like Front-Door Threats, Back door Threats and Denial of Service (DoS)

  • Front-Door Threats: It arises when an outsider cracks the password and accesses the network.
  • Back-Door Threats: It arises when the software or hardware bugs allow attackers to log in to the administrative account.
  • Denial of service(DoS): It arises when an intruder crashes servers or creates useless traffic to barren the access and denies service to the network.

3. Viruses and other Malicious Software: Unfortunately, some software and programs are specifically used or created with ill intention like:
  •  Viruses: It is a program that infects other files by creating a copy of itself.
  • Worms: It is a program that propagates by sending copies of itself to other computers and thereafter again to others without the knowledge of the user.
  • Trojan horses: It is a program that misleads the user by hiding its true intention and doing malicious activities in the background.
  • Logic Bombs: It is a program that is intentionally inserted into a software to take its advantage (Often with ill intention) when certain conditions are met.



Network Designing:

Network designing is not an exact science but an iterative process that aims to ensure that the user's and project's requirements are fulfilled. It acts as the backbone of any IT business because it creates a network and connects all the network devices together allowing information access throughout the industry. Before implementing any network design, it is planned to ensure its efficiency.

Any network design should show:
  1. A clear map of the network.
  2. Layout or wiring diagram of the cables.
  3. The location, quantity, and types of devices to be used.
  4. Following a particular structure of the IP Address.
  5. Deciding network security architecture and processes.

To ensure the designed network is best following things are taken into account:
  1. The actual design phase should be done diligently.
  2. Always plan while keeping the future in mind.
  3. Security should be embedded in the design.
  4. The network should be properly monitored.
  5. Network designing never finishes.

No comments:

Post a Comment