Computer Networks
Page 1
Network Fundamentals
Network Topology: The physical and logical arrangement of devices in a network,
including:
Bus Topology: A single cable connects all devices in a linear sequence.
Star Topology: All devices connect to a central hub or switch.
Ring Topology: Devices connect in a circular configuration, and data
travels in one direction.
Mesh Topology: Each device connects to every other device, providing
multiple paths for data transmission.
Network Protocols: A set of rules and standards that govern data communication
over a network, including:
TCP/IP (Transmission Control Protocol/Internet Protocol): A suite of
protocols used for routing and addressing data packets over the internet.
HTTP (Hypertext Transfer Protocol): A protocol used for transferring data
over the web, including web pages and files.
FTP (File Transfer Protocol): A protocol used for transferring files over a
network.
Network Devices: Hardware components that facilitate communication over a
network, including:
Routers: Devices that connect multiple networks and route data packets
between them.
Switches: Devices that connect multiple devices within a network and
forward data packets between them.
Firewalls: Devices or software that monitor and control incoming and
outgoing network traffic based on security rules.
Network Layers
Physical Layer (Layer 1): Defines the physical means of data transmission,
including cable specifications, wireless transmission, and network topology.
Data Link Layer (Layer 2): Provides error-free transfer of data frames between
two devices on the same network, including flow control and error detection.
Network Layer (Layer 3): Routes data packets between networks, including
addressing, routing, and congestion control.
Transport Layer (Layer 4): Provides reliable data transfer between devices,
including segmentation, acknowledgment, and reassembly.
Session Layer (Layer 5): Establishes, manages, and terminates connections
between applications, including dialogue control and synchronization.
Presentation Layer (Layer 6): Converts data into a format that can be
understood by the receiving device, including data compression and encryption.
Application Layer (Layer 7): Provides services and interfaces for applications
to communicate with each other, including email, file transfer, and web browsing.
Page 2
Network Security
Threats: Malicious activities or entities that can compromise network security,
including:
Viruses: Malicious software that replicates itself and spreads to other
devices.
Worms: Self-replicating malware that spreads without human interaction.
Trojans: Malicious software that disguises itself as legitimate software.
Spyware: Malware that monitors and collects user data without consent.
Security Measures: Techniques and technologies used to protect networks from
threats, including:
Firewalls: Network devices or software that monitor and control incoming
and outgoing network traffic based on security rules.
Antivirus Software: Programs that detect and remove malware from devices.
Encryption: The process of converting plaintext data into unreadable
ciphertext to protect it from unauthorized access.
Authentication: The process of verifying the identity of users, devices, or
systems before granting access to network resources.