7.1 # NETWORK DEFINATION AND TERMOLOGY
Network Interface Card (NIC) provides the physical interface between computer and cabling. It prepares the data, sends and controls the flow of data. It can also receive and translate data into bytes for the CPU to understand.
The following factor should be taken into consideration when choosing a NIC: -
a) Preparing the data , Sending and controlling data , Configuration , Drivers, Compatibility and Performance. For two computers to send and receive data, the cards must agree on several things.
b) The maximum size of the data frames, the amount of data sent before giving confirmation, the time needed between transmissions, the amount of time needed to wait before sending confirmation, the amount of data a card can hold and the speed at which data transmits. In order to successfully send data on the network, you need to make sure the network cards are of the same type and they are connected to the same piece of cable.
REPEATER is an electronic and also network device that receives a signal and retransmits, it at a higher level and/or higher power. Classification: Used to regenerate or replicate a signal. Regenerate analog or digital signals distorted by transmission loss. It works at Layer one of OSI model. Analog repeaters only amplify the signal. Digital repeaters can reconstruct a signal to near its original quality.
ETHRNET HUB is a network device and to connect multiple Ethernet devices together, repeats all the information it receives and forward it to all PC terminals attach to it and this repetition of data results in unnecessary data traffic being sent to the network. The data is sent in bulk without the identification of its destination. A hub works at the physical layer one of the OSI model and also known as multiport repeater.
a) Active hub: A central connecting device in a network that regenerates signals on the output side to keep the signal strong. It always uses the electricity.
b) Passive hub: A passive hub serves simply as a conduit for the data, enabling it to go from one device to another and there is no need to use the electricity such as this type of hub.
c) Intelligent hub: Enables an administrator to monitor the traffic passing through the hub and enables an administrator to configure each port in the hub also known as manageable hubs.
NETWORK BRIDGE is used to connect multiple network segments to filter data traffic at the network boundary. It work based on MAC address at the data link layer of the OSI model. The main function of
Network Bridge is reducing the amount of traffic on the LAN by dividing it into two segments. Bridge inspects incoming traffic and decides whether to forward or discard it. An Ethernet bridge, for example, inspect each Ethernet frame including the source and destination MAC address in making individual forwarding decisions.
LAYER 2 SWITCH operates at the Data Link layer (Layer 2) of the OSI model. It is designed to forward frames based on MAC addresses. Uses MAC address tables to make forwarding decisions. It learns MAC addresses of devices connected to its ports and forwards frames only to the intended destination. All devices connected to a Layer 2 switch are in the same broadcast domain. Can support Virtual Local Area Networks (VLANs), allowing for logical segmentation of networks (Main purpose). Generally faster than Layer 3 switches for local traffic since it doesn't process IP addresses.
Types: There are four network switches: -
1) Store and forward:The switch buffers (store the errors in own buffers and check it.) and verifies each frame before forwarding it.
2) Cut through: The switch reads only up to the frame’s hardware address before starting to forward it and there is no error checking with this method.
3) Fragment free: The method that attempts to retain the benefits of both store, forward and cut through and it checks the first 64 bytes of the frame, where addressing information is stored.
4) Adaptive switching: A method of automatically selecting between the other three modes.
Working: An Ethernet switch to create a separate collision domain for each switch port.
Summary: L2 switches operate at Layer 2 (Data Link), while L3 switches operate at Layer 3 (Network). L2 switches use MAC addresses for switching; L3 switches use IP addresses for routing. L2 switches do not separate broadcast domains; L3 switches can route between different broadcast domains. L2 switches are primarily for local area networking, while L3 switches provide routing capabilities along with switching and routers, making them versatile for larger, more complex network environments.
LAYER 3 SWITCH operates at the Network layer (Layer 3) of the OSI model. It can perform both switching and routing, enabling traffic forwarding based on IP addresses. Can separate broadcast domains by routing traffic, allowing for more efficient network segmentation. Uses IP addresses to make forwarding decisions and can route traffic between different VLANs or subnets. It can separate broadcast domains by routing traffic, allowing for more efficient network segmentation. Supports features like static routing, dynamic routing protocols (like OSPF or EIGRP), and sometimes more advanced QoS and security features. May have slightly higher latency due to the additional processing of IP addresses, but it's optimized for high-speed routing.
Encapsulation the data: Data – Segment – Packets – Frame – Bits
NETWORK ROUTER operates at the Network layer (Layer 3) of the OSI model. It is designed to route packets between different networks based on IP addresses. L3 routers forward packets based on their destination IP addresses. They determine the best path for the data to travel through the network. They maintain routing tables that contain information about various networks, including the best next-hop addresses for reaching those networks. L3 routers can connect different broadcast domains, effectively managing and segmenting network traffic by multiple broadcast domains. In networks with VLANs, L3 routers can route traffic between different VLANs, allowing for communication between devices on separate networks.
Function:
a) Restrict broadcasts to the LAN: Broadcasts are transmissions to send all hosts. Network use broadcast communication at the PHYICAL, DATALINK and NETWORK layer. And network broadcast communication use to communicate certain kind of information such as ARP, RARP, DHCP, etc.
b) Act as the default gateway: In today’s network, people are connecting to the internet. When your computer wants to talk to computer on another network then send to the default gateway (your local computer). The router receives your data. Look for the remote address of that far-off computer makes a routing decision and forwards your data out interface that is closer to the remote computer. There could be several routers between you and the remoter computer, so several routes will take part in handing off the packet.
c) Move (route) data between networks: Router move data from one network to another network. Allows two networks managed by different organization to exchange data. Router can accept traffic from any kind of network it is attached to and forward it to any other network and allow networks that could not normally communicate with each other to exchange data
1. Directly connected way 2. Static way 3. Dynamic way.
NETWORK FIREWALL is a security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its main purpose is to establish a barrier between a trusted internal network and untrusted external networks, such as the internet. Here are some key aspects of network firewalls:
It an excellent entry model for small data centers and delivers a high-performance, high-capacity data center firewall. 10 GE ports and dramatic increases in VPN performance enable you to keep pace with your evolving network. Every firewall work on policy base routing (PBR) as line for check connectivity next hop to behind hop but SLA is present in ASA, Link monitoring is present in Fortinet and Path monitoring is present in Polo alto.
LOAD BALANCING (LB) is the method of distributing network traffic equally across a pool of resources that support an application. Modern applications must process millions of users simultaneously and return the correct text, videos, images, and other data to each user in a fast and reliable manner. To handle such high volumes of traffic, most applications have many resource servers with duplicate data between them. A load balancer is a device that sits between the user and the server group and acts as an invisible facilitator, ensuring that all resource servers are used equally. A Network Load Balancer functions at the fourth layer of the Open Systems Interconnection (OSI) model. It can handle millions of requests per second.
INTRUSION PREVENTION SYSTEM (IPS) is a network security device that continuously monitors a network for malicious activity and takes action to prevent it, including reporting, blocking, or dropping it, when it does occur. Its work on the layer 3 and IPS use a dynamically updated signature database to verify legitimate network traffic and block any detected network activity abnormalities.
BRROUTER is a networking device that combines the functionality of both a bridge and a router. It operates at both Layer 2 (Data Link layer) and Layer 3 (Network layer) of the OSI model, allowing it to forward data based on MAC addresses (like a bridge) as well as route data based on IP addresses (like a router).
POWER OVER ETHERNET (POE) allows both data and power to be sent across the same twisted-pair cable, eliminating the need to provide separate power connection. This is especially useful in areas where installing separate power might be expansive or different.
POE can be used to power in many devices including: VOIP phones, Security cameras, Wireless access points, Thin clients technology and etc. It can provide roughly 13W of power to devices; 802.3af further enhanced POE, supporting 25W or more power to a device.
BANDWIDTH is the gap between the highest and lowest frequency employed by network signals. It refers to the rate throughout capacity of a network protocol.
BASEBAND is the feature of network technology that uses only one carrier frequency. Ethernet is the best example for it.
TRANSMISSION through transmission the data gets transferred from source to destination (only one way). It is treated as the physical movement of data.
COMMUNICATION means the process of sending and receiving date between two media (data is transferred between source and destination in both ways.)
10 BASE T is the Ethernet specification of 10 Mbps baseband that uses two pair of twisted-pair category 3,4 or 5 cabling using one pair to send data their other to receive.
100 BASE T is the Fast-Ethernet specification of 100 Mbps baseband that uses UTP cabling. It sends link pulses over the network when no traffic is present.
100 BASE TX is the Fast-Ethernet specification of 100 Mbps baseband that uses two pair of UTP/STP cabling. The first pair of cable receives the data and second pair sends the data. It can’t be longer than 100 meters.
ADDRESS LERNING is used with transparent bridges to learn hardware address of all devices on the network.
ADDRESS RESOLUTION is a process for resolving difference between computer address schemes. It is define a method for tracing network layer address to data link layer address.
ADDRESS RESOLUTION PROTOCOL(ARP) is the protocol that traces IP address to MAC address is known as Address Resolution Protocol.
REVERSE ADDRESS RESOLUTION PROTOCOL(RARP) is the protocol within TCP/IP stack that maps MAC address to IP address is known as Reverse Address Resolution Protocol.
INVERSE ADDRESS RESOLUTION PROTOCOL (IARP) is the protocol by which dynamic mapping are constructed in a network is known as Inverse Address Resolution Protocol.
PROXY ADDRESS RESOLUTION PROTOCOL(PARP) is the variation of the ARP which an intermediate device such as router is known as Proxy Address Resolution Protocol.
APPLE-TALK ADDRESS RESOLUTION PROTOCOL(AARP) is the protocol in an Apple talk stack that maps data-link address to network address is known as Apple – talk Address Resolution Protocol.
APPLE-TLK is currently in two versions the group of communication protocol designed by Apple computer for use in Macintosh environment. The earlier Phase 1 protocol support on physical network number. The later Phase 2 protocol support more than logical network on a single physical network.
ACTIVE MONITOR is the mechanism used to manage a token ring. The network mode with the highest MAC address on the ring becomes the active monitor and is responsible for management tasks such as preventing loops and ensuring that tokens are not lost.
DIGITAL MEDIA RECEIVER is to connect a computer network to a home theater.
PROTOCOL CONVERTERIt is a hardware device that converts between two different types of transmission such as asynchronous and synchronous transmission.
Proxy is the computer network service which allows clients to make indirect network connections to other network services.
SIMPLE NETWORK MANAGEMENT PROTOCOL(SNMP) is a network protocol used for collecting organizing and exchanging information between network devices. SNMP is widely used in network management for configuring network devices like switches, hubs, routers, printers, servers.
PIGGYBACKING In data transmission, if the sender sends any data frame to the receiver then the receiver should send the acknowledgment to the sender. The receiver will temporarily delay (waits for the network layer to send the next data packet) the acknowledgment and hooks it to the next outgoing data frame, this process is called Piggybacking.
BEACONING If a network self-repairs its problem then it is termed as Beaconing. Mainly, it is used in the token ring and FDDI (Fiber Distributed Data Interface) networks. If a device in the network is facing any problem, then it notifies the other devices that they are not receiving any signal. Likewise, the problem gets repaired within the network.
CLASSFULL ROUTING is the routing protocol that doesn’t send subnet mask information when a route update is sent out. It doesn’t support VLSM.
CLASSLESS ROUTING is also the routing protocol that sends subnet mask information when a route updates. It supports VLSM.
BROADCAST ADDRESSES is a network address used to transmit to all devices connected to a multiple-access communications network. A message sent to a broadcast address may be received by all network-attached hosts but most people use the term broadcast as a generic terms and most of the time, we understand that four broadcast types that I’ d like to define for you:
a) Layer 2 broadcasts: These are sent to all nodes on the LAN.
b) Layer 3 broadcasts: These are sent to all nodes on the network.
c) Unicast: These are sent to a single destination host.
d) Multicast: These are packet sent from a single source and transmitted to many devices on different networks.
Be updated into yourself and improve lives through DIT
0 Comments