This document provides an easy-to-understand overview of Computer Networking, based on the provided class materials, tailored for competitive exam preparation.
A network is a collection of interconnected computing devices that can exchange data and share resources with each other.
ARPANET
(Advanced Research Projects Agency Network) was created by the US Department of Defense in 1969.
TCP/IP
protocols.
Networking Models define guidelines and standards for data transmission and reception over a network. They are also known as networking architectures.
Two Primary Models:
TCP/IP Model
(1970-1983)
OSI Model
(1984)
Networks are classified based on their geographical area, ownership, and purpose.
LAN
(Local Area Network):
802.3
(Ethernet - Wired LAN),
802.11
(Wi-Fi - Wireless LAN).
WLAN
(Wireless Local Area Network):
A LAN that uses wireless communication (Wi-Fi).
MAN
(Metropolitan Area Network):
802.6
.
WAN
(Wide Area Network):
PAN
(Personal Area Network):
802.15
(Wireless PANs), specifically
802.15.1
(Bluetooth) and
802.15.4
(Zigbee).
VPN
(Virtual Private Network):
A secure network connection over a public network.
SAN
(Storage Area Network):
Primarily used for cloud computing services like AWS, Microsoft Azure, Google Cloud Platform.
CAN
(Campus Area Network):
Network Types (by Access):
Topology refers to the physical or logical layout of a network.
CSMA/CD
(Carrier-sense multiple access with collision detection) and
CSMA/CA
(Carrier-sense multiple access with collision avoidance).
FDDI
(Fiber Distributed Data Interface) is an example.
n
devices in a fully connected mesh network,
n(n-1)/2
links are required.
Transmission media are the physical pathways over which data travels.
Data travels through a physical cable.
STP
(Shielded Twisted Pair): Used in factories.
UTP
(Unshielded Twisted Pair): Common for LAN connections.
RJ45
(Registered Jack-45).
BNC
(Bayonet Neill–Concelman).
SC
,
ST
,
LC
,
FC
.
Data travels through electromagnetic waves without a physical conductor.
Defines how data flows between two devices.
These models provide a framework for understanding how data is transmitted across networks.
ISO
(International Organization for Standardization) in 1984.
Each layer handles data in a specific format (PDU).
OSI Layer (7 Layers) | TCP/IP Layer (5-Layer View) | PDU (Data Unit) | Main Functions | Associated Devices | Address Type |
---|---|---|---|---|---|
7. Application Layer | Application Layer | Data |
User interface, network services (e.g., email, web browsing). Protocols:
HTTP
,
FTP
,
Telnet
,
DNS
,
SMTP
,
POP3
.
|
Gateway | (N/A) |
6. Presentation Layer | (Combined into Application) | Data | Data format translation, encryption, decryption, compression. | Gateway | (N/A) |
5. Session Layer | (Combined into Application) | Data | Establishes, maintains, and terminates connections (log on/off), synchronization, dialog control, token management. | Gateway | (N/A) |
4. Transport Layer | Transport Layer | Segments |
End-to-end
(host-to-host or process-to-process) reliable data delivery, segmentation/reassembly, flow control, acknowledgment. Heart of the OSI model. Protocols:
TCP
(connection-oriented),
UDP
(connectionless).
|
Gateway | Port Address |
3. Network Layer | Internet Layer | Packets | Logical addressing (IP), routing, forwarding packets across multiple network links, congestion control. Source-to-Destination delivery. | Router | IP Address (Logical Address) |
2. Data Link Layer | Data Link Layer | Frames |
Node-to-node (hop-to-hop) error-free data transfer, MAC addressing, framing, flow/error control,
CSMA/CA
. Sub-layers:
LLC
(Logical Link Control) and
MAC
(Media Access Control).
|
Switch, Bridge, Modem | MAC Address (Physical Address) |
1. Physical Layer | Physical Layer | Bits | Physical connection maintenance, topology formation, bit synchronization, bit rate control, voltage, wire speed, cables. Closest to the transmission medium. | Hub, Repeater, Modem, Cables | (N/A) |
Different types of addresses are used to identify devices and processes on a network.
255.0.0.0
255.255.0.0
255.255.255.0
10.0.0.0
to
10.255.255.255
(Class A)
172.16.0.0
to
172.31.255.255
(Class B)
192.168.0.0
to
192.168.255.255
(Class C)
100.64.0.0
to
100.127.255.255
127.0.0.1
(used for testing own system).
255.255.255.255
(sends message to all devices on local network).
DARPA
, IPv6 by
IETF
.
IANA
(Internet Assigned Numbers Authority); in India, by
APNIC
.
ipconfig
.
NIC
- Network Interface Card).
getmac
.
Common Port Numbers:
FTP
(File Transfer Protocol): 20 (Data Channel), 21 (Control Channel)
SFTP
(SSH File Transfer Protocol): 22
Telnet
: 23
SMTP
(Simple Mail Transfer Protocol): 25
DNS
(Domain Name System): 53
DHCP
(Dynamic Host Configuration Protocol): 67 (Server), 68 (Client)
HTTP
(Hypertext Transfer Protocol): 80
POP3
(Post Office Protocol v3): 110
IMAP
(Internet Message Access Protocol): 143
IRC
(Internet Relay Chat): 194
HTTPS
(HTTP Secure): 443
Subnetting is the process of dividing a larger network into smaller, logical sub-networks (subnets).
CIDR
- Classless Inter-Domain Routing).
192.168.10.0/30
)
Given an IP address
192.168.10.0/30
(a Class C network), let's find the subnet details.
The
/30
indicates that 30 bits are used for the network portion of the IP address. For IPv4 (32 bits total):
11111111.11111111.11111111.11111100
255.255.255.252
.
/24
(
255.255.255.0
). The "borrowed bits" for subnetting are
30 - 24 = 6
bits.
2
n
, where
n
is the number of borrowed bits.
2
6
= 64
networks can be created.
/30
, there are
32 - 30 = 2
host bits.
2
n
, where
n
is the number of host bits.
2
2
= 4
addresses per subnetwork.
2
n
- 2
, where
n
is the number of host bits.
2
2
- 2 = 4 - 2 = 2
usable hosts per subnetwork.
Note: Network ID is the first address in a subnet, used to identify the subnet itself. Broadcast ID is the last address, used to send data to all hosts in that subnet. Neither can be assigned to individual hosts.
Protocols are rules that govern data communication.
TCP
(Transmission Control Protocol):
UDP
(User Datagram Protocol):
IP
(Internet Protocol):
HTTP
(Hypertext Transfer Protocol):
Used for web browsing (distributing, searching, and retrieving documents over the Internet).
HTTPS
(HTTP Secure):
Uses
SSL/TLS
encryption to protect data confidentiality and integrity.
FTP
(File Transfer Protocol):
Primary purpose is transferring files between a client and a server.
SFTP
(SSH File Transfer Protocol):
Secure version of FTP using SSH.
Telnet
:
Used for remote terminal connection service (remote login).
SMTP
(Simple Mail Transfer Protocol):
Used to send and distribute outgoing emails.
POP3
(Post Office Protocol v3):
Allows users to download emails from the server to their local devices.
IMAP
(Internet Message Access Protocol):
Allows users to view and manipulate emails on the server without downloading them, enabling advanced email management and synchronization across devices.
DNS
(Domain Name System):
Translates human-readable domain names (e.g., google.com) into IP addresses.
DHCP
(Dynamic Host Configuration Protocol):
Automatically assigns IP addresses and network configuration settings to devices on a network.
ARP
(Address Resolution Protocol):
Translates IP addresses to MAC addresses.
RARP
(Reverse Address Resolution Protocol):
Translates MAC addresses to IP addresses (finds IP when only MAC is known).
ICMP
(Internet Control Message Protocol):
Used by network devices to send error messages and operational information. Also used for path
MTU
(Maximum Transmission Unit) discovery.
IRC
(Internet Relay Chat):
Used for real-time communication through text messaging.
RTP
(Real-time Transport Protocol):
Used for the transport of voice over IP (VoIP) communications.
SSL
(Secure Socket Layer) /
TLS
(Transport Layer Security):
Protocols providing secure communication over a computer network. SSL is generally considered deprecated, with TLS being its successor.
IEEE
Standards:
802.1
: LAN Protocol (Bridging)
802.2
: Logical Link Control
802.3
: Ethernet (Wired LAN)
802.11
: WLAN (Wi-Fi)
802.15
: Wireless PANs
802.15.1
: Bluetooth
802.15.4
: Zigbee (low energy consumption compared to Wi-Fi)
802.16
: WiMAX (Wireless MAN)
Hardware components that connect computers and other devices in a network.
MAC addresses
. A Layer-2 Switch is also called a Multiport Bridge.
LAN
and intelligently forwards data (frames) only to the intended destination
MAC address
.
IP addresses
.
Ensures reliable data transfer between nodes.
Techniques to identify errors introduced during data transmission.
Techniques to correct errors.
Manages the rate of data transmission between sender and receiver to prevent overwhelming the receiver.
ACK
) from the receiver before sending the next frame.
A combination of error detection, positive/negative acknowledgments, and retransmission for reliable data transfer.
NACK
(Negative Acknowledgment), and the sender retransmits all frames starting from the damaged/missing one.
NACK
for only that specific frame. The sender then retransmits only the requested frame.
Useful commands for troubleshooting and managing network connectivity.
ping
(Packet Internet Groper):
ICMP
protocol.
netstat
(Network Statistics):
Shows network status and protocol statistics (TCP, routing tables, network interface stats).
arp
(Address Resolution Protocol):
Displays or modifies the IP-to-MAC address translation tables. Used to find the
MAC Address
of a destination computer when its
IP Address
is known.
ipconfig
:
Used to view the
IP addresses
and other TCP/IP configuration details on Windows computers.
getmac
:
Used to view the
MAC address
of network devices.
hostname
:
Displays the current name of your Windows computer.
tracert
(Traceroute):
ICMP
protocol.
nslookup
(Name Server Lookup):
Finds the corresponding
IP address
of a domain name system (
DNS
) name.
taskkill
:
Used for ending processes.
systeminfo
:
Displays system information.
cls
:
Clears the screen.
TDM
(Time Division Multiplexing):
A technique used to improve bandwidth efficiency in digital communication systems.
65,535
bytes (
2
16
-1
).