Networking Notes
Networking Notes
INTRODUCTION
A network is a system of computers and other devices that are connected together. Networks
can range in size from a few computers connected by cables to millions of computers spread
across the world. The internet is an example of a very large network
For a specific purpose if things are connected together, are referred to as a NETWORK.
A network can be of many types, like a telephone network, television network, computer
network, or even a people network.
Similarly, a COMPUTER NETWORK is also a kind of setup, where it connects two or
more devices to share a range of services and information in the form of e-mails and
messages, databases, documents, websites, audios and videos, telephone calls, and
video conferences, etc. among them.
Network: A collection of interconnected devices, such as computers, printers, and servers, that
can communicate with each other.
Node: Any device connected to a network, such as a computer, printer, or router.
Protocol: A set of rules and standards that define how devices on a network communicate with
each other. To facilitates End to End communication, a number of protocols worked together
to form Protocol Suites or Stacks.
IP Address: A unique numerical identifier assigned to each device on a network, used to
identify and communicate with other devices.
Router: A networking device that connects multiple networks together and forwards data
packets between them.
Switch: A networking device that connects devices on a network and forwards data packets
between them.
Firewall: A security device or software that monitors and controls incoming and outgoing
network traffic, based on a set of predefined security rules.
DNS (Domain Name System): A system that translates domain names (such as
[Link]) into IP addresses, allowing devices to locate and connect to websites and
other network resources.
LAN (Local Area Network): A network that connects devices within a limited geographical
area, such as a home, office, or building.
WAN (Wide Area Network): A network that connects devices over a large geographical area,
such as multiple offices in different cities or countries.
DHCP (Dynamic Host Configuration Protocol): A protocol that automatically assigns IP
addresses and network configuration settings to devices on a network.
TCP/IP (Transmission Control Protocol/Internet Protocol): A set of protocols used to
communicate over the internet and other networks.
These are just a few basic networking terms, but understanding them is essential to building a
strong foundation in computer networking.
IP : Internet Protocol
FTP : File Transfer Protocol
SMTP : Simple Mail Transfer Protocol
HTTP : Hyper Text Transfer Protocol
The Network reference models were developed to allow products from different
manufacturers to interoperate on a network. A network reference model serves as a blueprint,
detailing standards for how protocol communication should occur.
The most widely recognized reference models are the Open Systems Interconnect ( OSI )
Model and Department of Defense ( DoD, also known as TCP/IP ) model.
SAN (Storage Area Network): A SAN provides systems with high-speed, lossless access
to high-capacity storage devices.
VPN (Virtual Private Network): A VPN allows for information to be securely sent across
a public or unsecured network, such as the Internet. Common uses of a VPN are to connect
branch offices or remote users to the main office.
Mesh Topology
In a mesh topology, every device is connected to another device via a particular channel. Every
device is connected to another via dedicated channels. These channels are known as links. In
Mesh Topology, the protocols used are AHCP (Ad Hoc Configuration
Protocols), DHCP (Dynamic Host Configuration Protocol), etc.
Mesh Topology
Suppose, the N number of devices are connected with each other in a mesh topology, the
total number of ports that are required by each device is N-1. In Figure 1, there are 5 devices
connected to each other, hence the total number of ports required by each device is 4. The
total number of ports required = N * (N-1).
Suppose, N number of devices are connected with each other in a mesh topology, then the
total number of dedicated links required to connect them is N C 2 i.e. N(N-1)/2. In Figure 1,
there are 5 devices connected to each other, hence the total number of links required is 5*4/2
= 10.
Advantages of Mesh Topology
Communication is very fast between the nodes.
Mesh Topology is robust.
The fault is diagnosed easily. Data is reliable because data is transferred among the devices
through dedicated channels or links.
Provides security and privacy.
Disadvantages of Mesh Topology
Installation and configuration are difficult.
The cost of cables is high as bulk wiring is required, hence suitable for less number of
devices.
The cost of maintenance is high.
A common example of mesh topology is the internet backbone, where various internet service
providers are connected to each other via dedicated channels. This topology is also used in
military communication systems and aircraft navigation systems.
Star Topology
In Star Topology, all the devices are connected to a single hub through a cable. This hub is the
central node and all other nodes are connected to the central node. The hub can be passive in
nature i.e., not an intelligent hub such as broadcasting devices, at the same time the hub can be
intelligent known as an active hub. Active hubs have repeaters in them. Coaxial cables or RJ-45
cables are used to connect the computers. In Star Topology, many popular Ethernet LAN
protocols are used as CD(Collision Detection), CSMA (Carrier Sense Multiple Access), etc.
Star Topology
Bus Topology
Ring Topology
Tree Topology
In tree topology, the various secondary hubs are connected to the central hub which contains the
repeater. This data flow from top to bottom i.e. from the central hub to the secondary and then to
the devices or from bottom to top i.e. devices to the secondary hub and then to the central hub. It
is a multi-point connection and a non-robust topology because if the backbone fails the topology
crashes.
Advantages of Tree Topology
It allows more devices to be attached to a single central hub thus it decreases the distance that
is traveled by the signal to come to the devices.
It allows the network to get isolated and also prioritize from different computers.
We can add new devices to the existing network.
Error detection and error correction are very easy in a tree topology.
Disadvantages of Tree Topology
If the central hub gets fails the entire system fails.
The cost is high because of the cabling.
If new devices are added, it becomes difficult to reconfigure.
A common example of a tree topology is the hierarchy in a large organization. At the top of the
tree is the CEO, who is connected to the different departments or divisions (child nodes) of the
company. Each department has its own hierarchy, with managers overseeing different teams
(grandchild nodes). The team members (leaf nodes) are at the bottom of the hierarchy, connected
to their respective managers and departments.
Hybrid Topology
Hybrid Topology is the combination of all the various types of topologies we have studied
above. Hybrid Topology is used when the nodes are free to take any form. It means these can be
individuals such as Ring or Star topology or can be a combination of various types of topologies
seen above. Each individual topology uses the protocol that has been discussed earlier.
Hybrid Topology
The above figure shows the structure of the Hybrid topology. As seen it contains a combination
of all different types of networks.
Advantages of Hybrid Topology
This topology is very flexible .
The size of the network can be easily expanded by adding new devices.
Disadvantages of Hybrid Topology
It is challenging to design the architecture of the Hybrid Network.
Hubs used in this topology are very expensive.
The infrastructure cost is very high as a hybrid network requires a lot of cabling and
network devices .
A common example of a hybrid topology is a university campus network. The network may have
a backbone of a star topology, with each building connected to the backbone through a switch or
router. Within each building, there may be a bus or ring topology connecting the different rooms
and offices. The wireless access points also create a mesh topology for wireless devices. This
hybrid topology allows for efficient communication between different buildings while providing
flexibility and redundancy within each building.
Why is Network Topology Important?
Network Topology is important because it defines how devices are connected and how they
communicate in the network. Here are some points that defines why network topology is
important.
Network Performance: Upon choosing the appropriate topology as per requirement, it helps
in running the network easily and hence increases network performance.
Network Reliability: Some topologies like Star, Mesh are reliable as if one connection fails,
they provide an alternative for that connection, hence it works as a backup.
Network Expansion : Chosing correct topology helps in easier expansion of Network as it
helps in adding more devices to the network without disrupting the actual network.
Network Security: Network Topology helps in understanding how devices are connected
and hence provides a better security to the network.
In conclusion, network topologies play a crucial role in determining the efficiency and reliability
of a computer network. Each topology, whether it’s bus, star, ring, mesh, or tree, offers unique
benefits and potential drawbacks. By understanding these different arrangements, network
designers can choose the most appropriate topology to meet the specific needs of their systems,
ensuring optimal performance and connectivity.
Types of Computer Networks
A computer network is a cluster of computers over a shared communication path that works to
share resources from one computer to another, provided by or located on the network nodes. In
this article, we will discuss computer networks and their types.
What is a Computer Network?
A computer network is a system that connects many independent computers to share information
(data) and resources. The integration of computers and other different devices allows users to
communicate more easily. A computer network is a collection of two or more computer systems
that are linked together. A network connection can be established using either cable or wireless
media. Hardware and software are used to connect computers and tools in any network.
Uses of Computer Networks
Communicating using email, video, instant messaging, etc.
Sharing devices such as printers, scanners, etc.
Sharing files.
Sharing software and operating programs on remote systems.
Allowing network users to easily access and maintain information.
Types of Computer Networks
There are mainly five types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
Types of Computer Networks
Types of PAN
Wireless Personal Area Networks: Wireless Personal Area Networks are created by simply
utilising wireless technologies such as WiFi and Bluetooth. It is a low-range network.
Wired Personal Area Network: A wired personal area network is constructed using a USB.
Advantages of PAN
PAN is relatively flexible and provides high efficiency for short network ranges.
It needs easy setup and relatively low cost.
It does not require frequent installations and maintenance
It is easy and portable.
Needs fewer technical skills to use.
Disadvantages of PAN
Low network coverage area/range.
Limited to relatively low data rates.
Devices are not compatible with each other.
Inbuilt WPAN devices are a little bit costly.
Applications of PAN
Home and Offices
Organizations and the Business sector
Medical and Hospital
School and College Education
Military and Defense
2. Local Area Network (LAN)
LAN is the most frequently used network. A LAN is a computer network that connects
computers through a common communication path, contained within a limited area, that is,
locally. A LAN encompasses two or more computers connected over a server. The two important
technologies involved in this network are Ethernet and Wi-fi. It ranges up to 2km &
transmission speed is very high with easy maintenance and low cost. Examples of LAN are
networking in a home, school, library, laboratory, college, office, etc.
Local Area Network (LAN)
Advantages of a LAN
Privacy: LAN is a private network, thus no outside regulatory body controls it, giving it a
privacy.
High Speed: LAN offers a much higher speed(around 100 mbps) and data transfer rate
comparatively to WAN.
Supports different transmission mediums: LAN support a variety of communications
transmission medium such as an Ethernet cable (thin cable, thick cable, and twisted pair),
fiber and wireless transmission.
Inexpensive and Simple: A LAN usually has low cost, installation, expansion and
maintenance and LAN installation is relatively easy to use, good scalability.
Disadvantages of LAN
The initial setup costs of installing Local Area Networks is high because there is special
software required to make a server.
Communication devices like an ethernet cable, switches, hubs, routers, cables are costly.
LAN administrator can see and check personal data files as well as Internet history of each
and every LAN user. Hence, the privacy of the users are violated
LANs are restricted in size and cover only a limited area
Since all the data is stored in a single server computer, if it can be accessed by an
unauthorized user, can cause a serious data security threat.
3. Campus Area Network (CAN)
CAN is bigger than a LAN but smaller than a MAN. This is a type of computer network that is
usually used in places like a school or colleges. This network covers a limited geographical area
that is, it spreads across several buildings within the campus. CAN mainly use Ethernet
technology with a range from 1km to 5km. Its transmission speed is very high with a moderate
maintenance cost and moderate cost. Examples of CAN are networks that cover schools,
colleges, buildings, etc.
Advantages of CAN
Speed: Communication within a CAN takes place over Local Area Network (LAN) so data
transfer rate between systems is little bit fast than Internet.
Security: Network administrators of campus take care of network by continuous monitoring,
tracking and limiting access. To protect network from unauthorized access firewall is placed
between network and internet.
Cost effective: With a little effort and maintenance, network works well by providing fast
data transfer rate with multi-departmental network access. It can be enabled wirelessly,
where wiring and cabling costs can be managed. So to work with in a campus using CAN is
cost-effective in view of performance
4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that
connects computers over a geographical distance through a shared communication path over a
city, town, or metropolitan area. This network mainly uses FDDI, CDDI, and ATM as the
technology with a range from 5km to 50km. Its transmission speed is average. It is difficult to
maintain and it comes with a high cost. Examples of MAN are networking in towns, cities, a
single large city, a large area within multiple buildings, etc.
Advantages of MAN
MAN offers high-speed connectivity in which the speed ranges from 10-100 Mbps.
The security level in MAN is high and strict as compared to WAN.
It support to transmit data in both directions concurrently because of dual bus architecture.
MAN can serve multiple users at a time with the same high-speed internet to all the users.
MAN allows for centralized management and control of the network, making it easier to
monitor and manage network resources and security.
Disadvantages of MAN
The architecture of MAN is quite complicated hence, it is hard to design and maintain.
This network is highly expensive because it required the high cost to set up fiber optics.
It provides less fault tolerance.
The Data transfer rate in MAN is low when compare to LANs.
5. Wide Area Network (WAN)
WAN is a type of computer network that connects computers over a large geographical distance
through a shared communication path. It is not restrained to a single location but extends over
many locations. WAN can also be defined as a group of local area networks that communicate
with each other with a range above 50km. Here we use Leased-Line & Dial-up technology. Its
transmission speed is very low and it comes with very high maintenance and very high cost. The
most common example of WAN is the Internet.
Advantages of WAN
It covers large geographical area which enhances the reach of organisation to transmit data
quickly and cheaply.
The data can be stored in centralised manner because of remote access to data provided by
WAN.
The travel charges that are needed to cover the geographical area of work can be minimised.
WAN enables a user or organisation to connect with the world very easily and allows to
exchange data and do business at global level.
Disadvantages of WAN
Traffic congestion in Wide Area Network is very high.
The fault tolerance ability of WAN is very less.
Noise and error are present in large amount due to multiple connection point.
The data transfer rate is slow in comparison to LAN because of large distances and high
number of connected system within the network.
Comparison between Different Computer Networks
Paramete
rs PAN LAN CAN MAN WAN
Campus Metropolitan
Full Personal Area Local Area Wide Area
Area Area
Name Network Network Network
Network Network
Transmi
ssion Very High Very High High Average Low
Speed
Mainten
Very Easy Easy Moderate Difficult Very Difficult
ance
There are several computer networks available; more information is provided below.
2. Storage Area Network (SAN)
SAN is a type of computer network that is high-speed and connects groups of storage devices to
several servers. This network does not depend on LAN or WAN. Instead, a SAN moves the
storage resources from the network to its high-powered network. A SAN provides access to
block-level data storage. Examples of SAN are a network of disks accessed by a network of
servers.
Storage Area Network (SAN)
Internetwork
An internet network is defined as two or more computer network LANs, WANs, or computer
network segments that are connected by devices and configured with a local addressing system.
The method is known as internetworking. There are two types of Internetwork.
Intranet: An internal network within an organization that enables employees to share data,
collaborate, and access resources. Intranets are not accessible to the public and use private IP
addresses.
Extranet: Extranets extend the intranet to authorized external users, such as business
partners or clients. They provide controlled access to specific resources while maintaining
security.
Advantages of Computer Network
Central Storage of Data: Files are stored on a central storage database which helps to easily
access and available to everyone.
Connectivity: A single connection can be routed to connect multiple computing devices.
Sharing of Files: Files and data can be easily shared among multiple devices which helps in
easily communicating among the organization.
Security through Authorization: Computer Networking provides additional security and
protection of information in the system.
Disadvantages of Computer Network
Virus and Malware: A virus is a program that can infect other programs by modifying
them. Viruses and Malware can corrupt the whole network.
High Cost of Setup: The initial setup of Computer Networking is expensive because it
consists of a lot of wires and cables along with the device.
loss of Information: In case of a System Failure, might lead to some loss of data.
Management of Network: Management of a Network is somehow complex for a person, it
requires training for its proper use.
Conclusion
In conclusion, computer networks are essential components that connect various computer
devices in order to efficiently share data and resources. PAN, LAN, CAN, MAN, and WAN
networks serve a wide range of applications and purposes, each with its own set of advantages
and drawbacks. Understanding these networks and their applications improves connectivity, data
exchange, and resource utilization in a variety of applications from personal use to global
communications.
1. Bus Topology
✅ Advantages:
✔ Simple and inexpensive setup
✔ Requires less cable
❌ Disadvantages:
✖ If the main cable fails, the entire network goes down
✖ Performance slows down with more devices
2. Star Topology
❌ Disadvantages:
✖ If the hub/switch fails, the entire network stops
✖ Requires more cables than a bus topology
3. Ring Topology
✅ Advantages:
✔ Predictable data transmission
✔ Reduces data collisions
❌ Disadvantages:
✖ If one device fails, the entire network can be disrupted
✖ Adding new devices can be difficult
4. Mesh Topology
✅ Advantages:
✔ Very reliable (multiple paths prevent failure)
✔ High security and performance
❌ Disadvantages:
✖ Expensive to set up
✖ Requires a lot of cables and configuration
🔹 Structure: A combination of star and bus topology, with a main backbone and branches.
🔹 Data Flow: Moves from top-level devices to lower levels.
✅ Advantages:
✔ Scalable (easy to expand)
✔ Structured and organized network
❌ Disadvantages:
✖ If the backbone fails, the entire network is affected
✖ More complex than star or bus topology
6. Hybrid Topology
✅ Advantages:
✔ Highly flexible and scalable
✔ Can be designed based on specific needs
❌ Disadvantages:
✖ Complex to set up and maintain
✖ Expensive compared to other topologies
Best Topology for Different Uses
Use Case Recommended Topology
Computer networks can be categorized based on how resources and services are managed and
accessed. The two main types are Peer-to-Peer (P2P) networks and Client-Server networks.
Each has distinct characteristics, advantages, and disadvantages.
Definition
A Peer-to-Peer (P2P) network is a decentralized network where all computers (nodes) are
equal and share resources directly without relying on a central server. Each computer acts as both
a client and a server, meaning it can request and provide services.
Key Characteristics
How It Works
Each device (peer) connects to others and can share data or request services.
Peers establish direct communication and manage connections dynamically.
Files or data are distributed across multiple devices, reducing dependence on a single
source.
Advantages
Disadvantages
2. Client-Server Network
Definition
How It Works
Clients send requests (e.g., file access, internet browsing, application execution) to the
server.
The server processes the request and sends the appropriate response.
Data is stored centrally, making it easy to back up and manage.
Advantages
Disadvantages
Structure Decentralized, all nodes are equal Centralized with dedicated servers
Performance Can slow down with many peers More efficient for large-scale use
Data
No central control Centrally managed and organized
Management
Conclusion
Both Peer-to-Peer (P2P) and Client-Server networks serve different purposes based on user
needs. P2P networks are ideal for small-scale, low-cost, decentralized data sharing, while
Client-Server networks are better suited for organizations that require centralized control,
security, and scalability.
4o
Network devices are hardware components used to connect computers, manage data traffic, and
ensure efficient communication within a network. These devices facilitate data transfer between
networked systems, ensuring security, performance, and connectivity.
Types of Network Devices and Their Functions
1. Router 🛜
o Definition: A router is a device that connects different networks and directs data
between them. It determines the best path for data packets to reach their
destination.
o Function:
✅ Connects multiple networks (e.g., home network to the internet).
✅ Directs traffic efficiently using IP addresses.
✅ Provides security features like firewalls and encryption.
o Example: Wi-Fi routers used in homes and offices.
2. Switch 🔄
o Definition: A switch is a network device that connects multiple devices within a
local area network (LAN) and efficiently forwards data only to the intended
recipient.
o Function:
✅ Filters and forwards data packets based on MAC addresses.
✅ Reduces data collision and increases network efficiency.
✅ Supports multiple devices in a wired network.
o Example: Ethernet switch used in offices for LAN connections.
3. Hub 🔗
o Definition: A hub is a basic networking device that connects multiple computers
in a LAN and transmits data to all connected devices.
o Function:
✅ Broadcasts data to all devices regardless of the recipient.
✅ Simple and cost-effective, but less efficient than a switch.
✅ Used in small networks with minimal traffic.
o Example: Used in small office networks for basic connectivity.
4. Modem 🌐
o Definition: A modem (modulator-demodulator) converts digital signals from a
computer into analog signals for transmission over telephone lines and vice versa.
o Function:
✅ Enables internet access by converting signal formats.
✅ Connects home or office networks to ISPs.
✅ Supports different types (DSL, cable, fiber optic).
o Example: ADSL or fiber-optic modem for home broadband.
5. Access Point (AP) 📶
o Definition: A wireless access point (WAP) extends a wired network by enabling
wireless connections for devices.
o Function:
✅ Expands Wi-Fi coverage in large areas.
✅ Connects wireless devices like smartphones and laptops to a wired network.
✅ Reduces network congestion by distributing connections.
o Example: Wi-Fi extenders in large office spaces.
6. Network Interface Card (NIC) 💻
o Definition: A NIC is a hardware component installed in computers and other
devices to enable network connectivity.
o Function:
✅ Provides wired or wireless network access.
✅ Uses MAC addresses for device identification.
✅ Supports different types (Ethernet, Wi-Fi).
o Example: Ethernet card in desktop computers.
7. Firewall 🔥
o Definition: A firewall is a security device (hardware or software) that monitors
and controls incoming and outgoing network traffic based on security rules.
o Function:
✅ Protects networks from unauthorized access and cyber threats.
✅ Blocks malicious traffic and unauthorized data transmission.
✅ Used in both personal and enterprise networks.
o Example: Hardware firewalls in corporate security systems.
8. Gateway 🌍
o Definition: A gateway is a device that connects different networks using different
communication protocols.
o Function:
✅ Acts as a bridge between two networks with different architectures.
✅ Converts data formats for compatibility.
✅ Used in cloud computing, VoIP, and enterprise networks.
o Example: Cloud service gateways connecting private and public clouds.
Conclusion
Network devices play crucial roles in data transmission, connectivity, security, and performance.
Choosing the right combination of these devices ensures an efficient, fast, and secure network
infrastructure. 🚀
Network connection media refer to the physical or wireless means through which data is
transmitted between devices in a network. These can be categorized into wired and wireless
media.
Wired network media use physical cables to establish connections between devices.
B. Coaxial Cable
Purpose:
Designed to transmit high-frequency electrical signals with minimal interference (e.g.,
TV, internet, radio signals).
1. Inner Conductor:
o Central copper or copper-clad steel wire for signal transmission.
2. Dielectric Insulator:
o Non-conductive material (e.g., polyethylene) separating the inner conductor from
the shield.
3. Metallic Shield:
o Braided copper or aluminum foil to block electromagnetic interference (EMI).
4. Outer Jacket:
o Protective PVC or thermoplastic layer for durability and insulation.
Short-distance
RG-58 50 Ω Radio antennas, Wi-Fi boosters
networking
Attenuation:
o Signal loss over distance (higher frequencies attenuate faster).
Bandwidth:
o RG-6 supports up to 3 GHz (suitable for 4K/HDTV).
Shielding Effectiveness:
o Measured in decibels (dB). Braided shields offer flexibility; foil shields provide
better EMI resistance.
Television:
o Connects antennas, satellite dishes, and set-top boxes.
Networking:
o Legacy Ethernet (10BASE2) and modern MoCA (Multimedia over Coax
Alliance).
Medical/Scientific:
o MRI machines and laboratory equipment.
Durability:
o Robust construction for indoor/outdoor use.
High Bandwidth:
o Supports high-frequency signals (e.g., 4K video).
Long Distance:
o Lower signal loss compared to twisted-pair cables.
Cost:
o More expensive than UTP (Unshielded Twisted Pair).
Installation Complexity:
o Requires specialized connectors (crimp or screw-on).
Obsolescence:
o Gradually replaced by fiber optics for long-distance/high-speed needs.
9. Installation Best Practices
1. Avoid Sharp Bends:
o Prevents damage to the inner conductor.
2. Use Weatherproofing:
o Outdoor cables require UV-resistant jackets.
3. Terminate Properly:
o Ensure connectors are securely attached to avoid signal loss.
4. Grounding:
o Essential for outdoor installations to prevent electrical surges.
MoCA Technology:
o Repurposes existing coax for home networking (up to 2.5 Gbps).
Velocity Factor: Speed of signal propagation relative to light (e.g., ~66% for RG-6).
Fiber optic cables are advanced communication cables that use light signals to transmit data.
They are widely used for high-speed internet, telecommunications, and networking due to their
efficiency and reliability.
Fiber Optics or Optical Fiber is a technology that transmits data as a light pulse along a glass or
plastic fiber. An Optical Fiber is a cylindrical fiber of glass that is hair-thin in size or any
transparent dielectric medium. The fiber which is used for optical communication is waveguides
made of transparent dielectrics. In this article, we will discuss Optical Fiber/Fiber Optics in
detail.
What is Fiber Optics?
Fiber optics refers to the technology and method of transmitting data as light pulses along a
glass or plastic strand or fiber. Fiber optic cables are used for long-distance and high-
performance data networking. They are capable of transmitting data over longer distances and
at higher bandwidths (data rates) than electrical cables, making them a critical component
in modern telecommunications, internet, and computer networking.
Main Elements of Fiber Optics
Core: It is the central tube of very thin size made of optically transparent dielectric medium
and carries the light transmitter to receiver and the core diameter may vary from about 5um
to 100 um.
Cladding: It is an outer optical material surrounding the core having a reflecting index lower
than the core and cladding helps to keep the light within the core throughout the phenomena
of total internal reflection.
Buffer Coating: It is a plastic coating that protects the fiber made of silicon rubber. The
typical diameter of the fiber after the coating is 250-300 um.
Multi-mode fiber: Multimode fiber allows many modes for the light rays traveling through
it. The core diameter is generally (40um) and that of cladding is (70um). The relative
refractive index difference is also greater than single-mode fiber. There is signal degradation
due to multimode dispersion. It is not suitable for long-distance communication due to the
large dispersion and attenuation of the signal. There are two categories based on Multi-mode
fiber i.e. Step Index Fiber and Graded Index Fiber. These are categories under the types of
optical fiber based on the Refractive Index
2. Based on Refractive Index
Step-index optical fiber: The refractive index of the core is constant. The refractive index of
the cladding is also continuous. The rays of light propagate through it in the form of
meridional rays which cross the fiber axis during every reflection at the core-cladding
boundary.
Graded index optical fiber: In this type of fiber, the core has a non-uniform refractive index
that gradually decreases from the center towards the core-cladding interface. The cladding
has a uniform refractive index. The light rays propagate through it in the form of skew rays
or helical rays. it does not cross the fiber axis at any time.
3. Based on the Material Used
Plastic Optical Fibres: For transmission of light, polymethylmethacrylate is used as core
material
Glass Fibres: These are extremely fine glass fibers, the core and cladding of the optical fiber
is made of plastic.
How Fiber Optic Works?
Fiber Optics has the work of transmission of light particles, or photons. Fiber optics transmit data
as light through thin sheets of glass or plastic. Each fiber consists of a core, where the light
travels through it, and a surrounding cladding that reflects the light back into the core part. Data
is converted into light using a laser or LED, and these light pulses travel through the core,
bouncing off the cladding to stay contained in it. At the receiving end, a photodetector converts
the light back into the electrical signals. This technology allows for fast, high-capacity data
transmission with minimal signal loss, immunity to electromagnetic interference, and therefore
the security is enhanced. Fiber optics are generally used for high-speed internet,
telecommunications, medical devices, and many more industrial applications.
Uses of Fiber Optics
Fiber Optics can be used in Computer Broadcasting and Networking
Fiber Optics are used on the Internet. They are also used in Television Cable.
Fiber Optics are widely used in Military Activities. They are also used in Medical Purposes
like for precise illumination.
They can also be used in Underwater environments as they don’t require to be replaced
frequently.
Advantages of Fiber Optics
Fiber Optics supports bandwidth with higher capacities.
Electromagnetic Interference is very little with Fiber Optics.
Fiber Optics are stronger and lighter than copper cables.
Very little Maintenance is required in Optical Fiber.
Disadvantages of Fiber Optics
Fiber Optics is more costly than Copper Wire.
Huge manual work is required to install new cables.
Some optical fibers like glass fiber require more protection.
Fiber Optics are more fragile i.e., can be easily broken, or signals can be lost easily.
A fiber optic cable consists of multiple layers that ensure data transmission and durability:
a) Core
b) Cladding
c) Buffer Coating
d) Strengthening Material
e) Outer Jacket
Definition: Uses light signals instead of electrical signals for data transmission.
Types:
✅ Single-Mode Fiber (SMF) – Transmits a single light signal over long distances.
✅ Multi-Mode Fiber (MMF) – Supports multiple signals for short-distance
communication.
Usage: Used in high-speed internet, backbone networks, and data centers.
Advantages:
1. Higher Speed & Bandwidth – Wired connections (e.g., Ethernet) typically offer higher
speeds and more bandwidth compared to wireless networks.
2. More Reliable Connection – Wired networks experience less interference and fewer
connectivity issues than wireless networks.
3. Lower Latency – Since wired networks have a direct physical connection, they have
lower latency, making them ideal for gaming and real-time applications.
4. Better Security – It is harder to intercept data on a wired network compared to a wireless
one, making it more secure.
5. Stable Performance – Wired networks are not affected by obstacles, interference, or
distance limitations as much as wireless networks.
Disadvantages:
Wireless media use electromagnetic waves for data transmission, eliminating the need for
physical cables.
Features
No physical medium is required for transmission.
It can carry signals through air, water, or vacuum.
It can travel large distances but it is also less secure
Wireless Communication
Wireless communication has advantages and also have disadvantages like it is less secure if we
talk about security.
Features
No physical medium is required for transmission.
It can carry signals through air, water, or vacuum.
It can travel large distances but it is also less secure.
Let’s discuss some of its types:-
Infrared
Infrared is used for short-range communication like TV remotes, mobile phones, personal
computers etc. In science, the Infrared is part of a spectrum that is not visible to the human eye.
The limitation of infrared rays is that they cannot penetrate any obstacles and can only use for
short-range. Also, Infrared is used in night vision cameras as it has thermal properties. The
frequency range of infrared rays 300GHz – 400THz
Uses:
As we have already have discussed they are used in TV remotes, Pc devices like mice, and
keyboards.
Now, let’s talk about the disadvantaged part of Infrared waves so they can only be used in
short-range communication. Also, they cannot penetrate any obstacles like walls or any
building.
Radio Waves
So we have seen the limitation of infrared waves, so here’s another wireless communication
that does not have limitations like infrared. Here we are discussing radio waves. that can travel
large distances as well as can penetrate any wall ( Omni-directional, these waves can move in
all directions). These are easy to generate and can penetrate through buildings. The
requirement of radio waves is antennas, sending antennas where one can transmit its message
and the other is receiving antennas. The frequency range of radio waves:3KHz – 1GHz. Also,
radio waves of frequency 300KHz-30MHz can travel long distances. Moreover, they are
Susceptible to interference meaning they can penetrate any walls.
Uses:
Radio waves are used in AM and FM radios, and cordless phones. Also, some private and
government organization reserves certain radio frequencies for direct communication.
Microwaves
Microwaves are a line of sight transmission, meaning both the antennas sending and receiving
should be properly aligned. Also, the distance covered by the signal is directly proportional to
the height of the antenna. Microwaves have a frequency Range between 1GHz – 300GHz.
Basically, we used Microwaves in mobile phones communication and television distribution.
Unlike radio waves, they are unidirectional, as they can move in only one direction, and
therefore it is used in point-to-point communication or unicast communication such as radar
and satellite.
Uses:
Microwaves are used in mobile phones communication and television distribution.
S.n
o Infrared Radio Waves Microwaves
300GHz – 400THz
S.N
Wired Network Wireless Network
o
A wired network employs wires “Wireless” means without wire, media that is
to link devices to the Internet or made up of electromagnetic waves (EM Waves)
1.
another network, such as laptops or infrared waves. Antennas or sensors will be
or desktop PCs. present on all wireless devices
2. Faster transmission speed Slow transmission speed
4. More Secure & hence Reliable Less Secure & hence less Reliable
Definition: Uses radio frequency (RF) signals for communication between devices.
Usage: Wi-Fi networks in homes, offices, and public places.
Frequency Bands:
✅ 2.4 GHz – Longer range but slower speed.
✅ 5 GHz – Faster speed but shorter range.
B. Microwave Transmission
D. Bluetooth
E. Satellite Communication
Speed Faster (up to 100 Gbps with fiber) Slower (Wi-Fi speeds vary)
Conclusion
Both wired and wireless network media have their advantages and disadvantages. Wired
networks offer better speed, reliability, and security, making them ideal for businesses and data
centers. Wireless networks provide mobility and flexibility, making them suitable for homes,
offices, and public places. The choice depends on network needs, budget, and required
performance. 🚀
A connection medium is the channel through which data is transmitted between devices in a
network. The choice of medium determines network performance, speed, security, and
reliability. Connection media can be categorized into wired (physical cables) and wireless
(electromagnetic signals) types, each with distinct characteristics.
Wired networks use physical cables to transmit data, providing a stable and secure connection.
Twisted pair cables consist of two insulated copper wires twisted together to reduce
electromagnetic interference (EMI).
✅ Speed: Supports speeds ranging from 10 Mbps (Cat3) to 10 Gbps (Cat6/6a and higher).
✅ Interference: Moderately susceptible to electromagnetic interference but improved with
Shielded Twisted Pair (STP).
✅ Security: More secure than wireless, as data cannot be intercepted easily.
✅ Cost: Low-cost, widely used for Ethernet networks.
✅ Distance: Maximum cable length of 100 meters (328 feet) without signal loss.
✅ Durability: Can be easily damaged or degraded over time.
✅ Common Use: LAN (Local Area Networks), telephone lines, DSL connections.
B. Coaxial Cable
Coaxial cables consist of a central copper conductor surrounded by insulating layers and
shielding to prevent signal loss.
Fiber optic cables use light signals instead of electrical signals for data transmission, making
them extremely fast and resistant to interference.
Wireless networks use electromagnetic waves to transmit data, eliminating the need for physical
cables.
Radio waves are the most common form of wireless communication, used in Wi-Fi, mobile
networks, and Bluetooth.
Microwaves use high-frequency radio signals to transmit data over long distances.
Infrared technology uses light signals for short-range communication between devices.
D. Bluetooth
Speed Faster (up to 100 Gbps with fiber) Slower (Wi-Fi speeds vary)
Durability Cables wear out over time No physical damage, but signal loss possible
Conclusion
The choice of connection medium depends on network requirements, cost, and security
considerations.
Wired networks (e.g., fiber optic, twisted pair, coaxial) are best for high-speed,
secure, and stable connections in businesses, data centers, and homes requiring reliable
connectivity.
Wireless networks (e.g., Wi-Fi, Bluetooth, microwave, infrared) offer flexibility and
mobility but are more vulnerable to interference and security threats.
Understanding these characteristics helps in selecting the most suitable medium for networking
applications, ensuring optimal performance and security.
Network configuration is the process of assigning network settings, policies, flows, and controls.
In networking, configuration refers to the process of setting up and managing network devices,
protocols, and settings to ensure proper communication and functionality within a network. This
includes defining parameters such as:
Network configuration can be done manually or through automated tools and scripts to ensure
optimal performance, security, and reliability.
1. Device Configuration
Configuring individual network devices such as routers, switches, firewalls, and access points.
🔹 Examples:
Setting up IP addresses and subnet masks
Configuring firewall rules
Enabling/disabling network interfaces
3. Security Configuration
4. Wireless Configuration
5. Protocol Configuration
The right network configuration is essential to supporting the flow of traffic through a network,
and it can also support and enhance network security and improve network stability. In addition,
the use of network configuration management manager and or configuration tools can provide a
number of benefits, including:
Automated data tracking and reporting, allowing administrators to spot any configuration
changes and potential threats or issues
An easy way to make bulk changes, such as a blanket password change in a situation where
passwords are compromised
The means to swiftly roll back network settings to a previous configuration
Reduced downtime, thanks to increased visibility and the ability to quickly identify changes
Streamlined maintenance and repair of network devices (physical or virtual) and connections
The ability to relaunch a device when it fails, thanks to centralized storage management of
device configurations
Network Architecture is the way network services and devices are structured together to serve
the connectivity needs of client devices and applications.
- **Purpose**: To ensure efficient, reliable, and secure data transmission between devices.
- Key Components:
- Nodes Devices like computers, servers, routers, switches, etc.
- Links: Physical or wireless connections between nodes.
- Protocols: Rules and conventions for communication (e.g., TCP/IP, HTTP).
- Topology: The arrangement of nodes and links in the network.
1. Fault Tolerance. A fault-tolerant network is one that limits the number of devices that are
impacted by faults, as the Internet will fail at times. It’s built to recover quickly and utilize
multiple paths between the source and destination, so if one faults, another steps in.
2. Scalability. A scalable network can expand quickly to support its new clients and applications
without impacting the performance of the service being delivered to already existing users.
3. Quality of Service (QoS). The quality of service is a requirement of networks in the modern
multi-cloud era. Services need to be dependable, measurable, and at times, guaranteed without
fear of compromised quality, which includes the controls to manage congested network traffic
and network bandwidth.
Peer-to-Peer Architecture
Client/Server Architecture
Some of the advantages of Network Architecture include efficiency, scalability, reliability, and
automation. The automated management solution that comes with NA for security and network
devices helps perform various tasks to backup and preserve configurations, which is essential to
keep operations running.
Some of the disadvantages of Network Architecture are that purchasing the necessities for
network architecture can be costly and it can last robustness when it comes to individual,
physical servers. That means it also lacks independence in some scenarios. Lastly, viruses and
malware are constant threats as infections can spread quickly throughout the network if they’re
not contained.
NETWORK MODEL
1. OSI Model
OSI stands for Open Systems Interconnection. OSI is a seven layered architecture. All these
seven layers work collaboratively to transmit data from one layer to another. Below are the
layers of OSI Model.
Physical Layer: Physical layer is the lowest layer of OSI model and is responsible for the
physical connection between all the required devices. The information present in physical
layer is in the form of bits. Physical layer performs various functions such as bit rate
control, bit synchronization, transmission mode etc.
Data Link Layer: Data Link layer provides with successful delivery of message from one
node to the another. It checks whether this delivery of message is error free. Other
functions performed by data link layer are error control, framing, flow control etc.
Network Layer: Network Layer is responsible for the transmission of data from one host
to another host that is connected in different network. It performs other tasks such routing
and logical addressing.
Transport Layer: Transport Layer is defined as a layer that takes services from network
layer and provides services to application layer. Other tasks performed by transport
layer are service point addressing, segmentation and reassembling.
Session Layer: Session layer is defined as a layer that is responsible for establishing a
connection, maintenance of session and to provide with security. Other functions of session
Layer are to establish session, termination and synchronization.
Presentation Layer: The data from application layer is extracted at the presentation layer.
This layer is also known as translation layer. The functions of presentation layer are
encryption, decryption, compression and translation.
Application Layer: Application layer is the topmost layer of OSI Model. Application layer
is also known as desktop layer. It provides with other functions such as directory services,
mail services, network virtual terminal etc.
2. TCP/IP Model
1. Network Access Layer
It is a group of applications requiring network communications. This layer is responsible for
generating the data and requesting connections. It acts on behalf of the sender and the Network
Access layer on the behalf of the receiver. During this article, we will be talking on the behalf
of the receiver.
The packet’s network protocol type, in this case, TCP/IP, is identified by network access layer.
Error prevention and “framing” are also provided by this layer. Point-to-Point Protocol
(PPP) framing and Ethernet IEEE 802.2 framing are two examples of data-link layer protocols.
2. Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols which are
responsible for the logical transmission of data over the entire network. The main protocols
residing at this layer are as follows:
IP: IP stands for Internet Protocol and it is responsible for delivering packets from the
source host to the destination host by looking at the IP addresses in the packet headers. IP
has 2 versions: IPv4 and IPv6. IPv4 is the one that most websites are using currently. But
IPv6 is growing as the number of IPv4 addresses is limited in number when compared to
the number of users.
ICMP: ICMP stands for Internet Control Message Protocol. It is encapsulated within IP
datagrams and is responsible for providing hosts with information about network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to find the hardware address
of a host from a known IP address. ARP has several types: Reverse ARP, Proxy ARP,
Gratuitous ARP, and Inverse ARP.
3. Transport Layer
The TCP/IP transport layer protocols exchange data receipt acknowledgments and retransmit
missing packets to ensure that packets arrive in order and without error. End-to-end
communication is referred to as such. Transmission Control Protocol (TCP) and User
Datagram Protocol are transport layer protocols at this level (UDP).
TCP Transmission Control Protocol): Applications can interact with one another
using TCP as though they were physically connected by a circuit. TCP transmits data in a
way that resembles character-by-character transmission rather than separate packets. A
starting point that establishes the connection, the whole transmission in byte order, and an
ending point that closes the connection make up this transmission.
UDP: User Datagram Protocol. The datagram delivery service is provided by UDP, the
other transport layer protocol. Connections between receiving and sending hosts are not
verified by UDP. Applications that transport little amounts of data use UDP rather than
TCP because it eliminates the processes of establishing and validating connections.
4. Application Layer
This layer is analogous to the transport layer of the OSI model. It is responsible for end-to-end
communication and error-free delivery of data. It shields the upper-layer applications from the
complexities of data. The three main protocols present in this layer are:
HTTP and HTTPS: HTTP stands for Hypertext transfer protocol. It is used by the World
Wide Web to manage communications between web browsers and servers. HTTPS stands
for HTTP-Secure. It is a combination of HTTP with SSL(Secure Socket Layer). It is
efficient in cases where the browser needs to fill out forms, sign in, authenticate, and carry
out bank transactions.
SSH: SSH stands for Secure Shell. It is a terminal emulations software similar to Telnet.
The reason SSH is preferred is because of its ability to maintain the encrypted connection.
It sets up a secure session over a TCP/IP connection.
NTP: NTP stands for Network Time Protocol. It is used to synchronize the clocks on our
computer to one standard time source. It is very useful in situations like bank transactions.
Assume the following situation without the presence of NTP. Suppose you carry out a
transaction, where your computer reads the time at 2:30 PM while the server records it at
2:28 PM. The server can crash very badly if it’s out of sync.
Network Operating System
The basic definition of an operating system is that the operating system is the interface
between the computer hardware and the user. In daily life, we use the operating system on our
devices which provides a good GUI, and many more features. Similarly, a network operating
system(NOS) is software that connects multiple devices and computers on the network and
allows them to share resources on the network. Let’s see what are the functions of the network
operating system.
Functions of the NOS (Network Operating System)
The following are the main functions of NOS:
Creating and managing user accounts on the network.
Controlling access to resources on the network.
Provide communication services between the devices on the network.
Monitor and troubleshoot the network.
Configuring and Managing the resources on the network.
Advantages of Network Operating Systems
Highly stable due to central server.
Provide good security.
Upgradation of new technology and hardware can be easily implemented in the network.
Provide remote access to servers from different locations.
Disadvantages of Network Operating Systems
Depend on the central location to perform the operations.
High cost to buying server.
Regular updating and maintenance are required.
Examples of Network Operating Systems
Following are the examples of network operating systems.
Microsoft Windows Server
UNIX/Linux
Artisoft’s LANtastic
Banyan’s VINES
Features of Network OS
The Network operating system includes a few security features, such as login restrictions
via the use of passwords.
Types of Network OS
1. Peer-to-Peer
Peer-to-peer networks are network resources where each and every system has the same
responsibilities and capabilities, i.e. no system in this design is more functional than the others.
It allows multiple computers to share resources, such as printers, scanners, CD-ROM drives, and
other peripherals. Smaller workplaces with 25 or fewer workstations are best served by these
networks.
To set up a Peer-to-Peer Network, you’ll need network adapter cards, network cabling that’s
been correctly installed, and or switch network or hub to connect the PCs.
Peer-to-Peer Networks is basically a collection of computers that may share resources and are
structured. Because each computer in a workstation keeps records of its own user accounts and
security settings, the workgroup is not managed by a single computer. There exists no central
login method for workgroups, and thus there is limited security. After logging into a peer on the
network, any user can make use of any shared resources, as there is no central security. Thus the
sharing resources can be managed using a password, or the user can make some files or folders
inaccessible by making them not shared.
Pros
It’s fairly simple to set up because it uses a simple cabling strategy, commonly twisted-
pair wire.
Cons
Any node in a system that fails has an impact on the entire system.
Each shared resource you want to govern in a Peer-to-Peer Network must have its own
password. It may be challenging to remember all of these passwords.
2. Client-Server
Client-Server Network OS refers to a server-based network where clients and servers share
storage and processing effort. Clients request services such as printing and document storage,
which are fulfilled by servers. All community services, such as digital mail and printing, are
usually handled through the server.
Client computer systems are typically less effective than server computer systems. This
organisation requires software for both customers and servers. The Network OS refers to a
software application that runs on the server and provides a community of environments for the
server and client. The Client-Server Network was created to deal with the situation when a
network connects multiple PC printers and servers. The basic concept was altered to specify a
specialised server with distinct capabilities.
Example
A file server holds the files of client machines and is connected to a large number of customers.
Another system, such as a Print Server, could be used to fulfil printing requests by utilising
several consumers. Different types of specialised servers that can be used in a Client-Server
system include web servers and email servers.
Due to centralised data protection, this network is more secure than a Peer-to-Peer
network.
The allocation of labour among clients and the server decreases network traffic.
Because the region covered is relatively large, large and modern businesses benefit from
it because it distributes storage as well as processing.
In the Client-Server Network system, the server can be remotely accessed from many
platforms.
Cons
Network security is the practice of protecting a computer network and its data from
unauthorized access, misuse, malfunction, modification, destruction, or improper disclosure. It
involves the use of hardware, software, policies, and procedures to safeguard the integrity,
confidentiality, and availability of networked resources.
🛡️Purpose:
The ultimate goal of network security is to prevent cyberattacks, ensure safe communication,
and maintain business continuity by protecting digital assets.
Network threats
Network threats are malicious activities or potential dangers that can compromise the integrity,
confidentiality, or availability of data within a network. These threats can be internal or
external, depending on the origin.
These originate within the organization—from employees, contractors, or even trusted partners.
They are often more dangerous because internal users typically have some level of access or
trust.
Characteristics:
🧩 Examples:
1. Disgruntled Employee
o A staff member intentionally deletes critical data or shares sensitive information
after being passed over for a promotion.
2. Data Theft by Insider
o An employee copies confidential files (e.g., customer databases or trade secrets)
to a USB drive to sell them to competitors.
3. Accidental Data Leakage
o An employee accidentally emails sensitive financial data to the wrong recipient or
uploads it to a public cloud.
4. Privilege Misuse
o A junior IT staff member with admin rights installs unauthorized software that
creates security loopholes.
5. Unauthorized Access
o An employee accesses HR or payroll systems without authorization to view
others’ salaries or personal records.
These come from outside the organization—such as hackers, cybercriminal groups, or foreign
governments.
Characteristics:
🧩 Examples:
1. Phishing Attacks
o An attacker sends fake emails pretending to be a bank or internal IT asking for
login credentials.
2. Distributed Denial of Service (DDoS)
o Attackers flood a network or website with excessive traffic, causing it to crash
and go offline.
3. Malware Infections
o External actors send malicious software (like ransomware or spyware) to gain
control over systems or steal data.
4. Man-in-the-Middle (MitM) Attacks
o A hacker intercepts communication between two parties (e.g., during online
banking) to steal information.
5. SQL Injection
o An attacker inserts malicious code into a website’s input fields to access and
manipulate databases.
🔄 Summary Table
Aspect Internal Threats External Threats
Access Level Usually already has some access Must breach defenses to gain access
Employee sabotage, data theft, privilege Phishing, malware, DDoS, MitM, SQL
Examples
abuse injection
1. Firewalls
📌 Definition:
A firewall is a security barrier that monitors and controls incoming and outgoing network
traffic based on predetermined security rules.
🔍 How It Works:
Acts as a filter between trusted internal networks and untrusted external ones (like the
internet).
Can be hardware-based, software-based, or both.
Rules can block traffic by IP address, port, protocol, or keywords.
🧠 Benefits:
💡 Example:
A firewall can block incoming traffic on port 21 (used for FTP) to prevent attackers from
accessing file transfer services.
📌 Definition:
This involves managing individual accounts for each user and assigning permissions based on
their role in the organization.
🔍 How It Works:
Each user has a username and password (and possibly two-factor authentication).
Access is restricted based on the principle of least privilege—users only get access to
the data they need.
🧠 Benefits:
💡 Example:
An HR employee can access employee records, but cannot access financial or engineering
documents.
📄 3. Security Policies
📌 Definition:
A security policy is a set of formal guidelines and rules that govern how an organization protects
its IT infrastructure and data.
🔍 How It Works:
🧠 Benefits:
💡 Example:
A policy may require all employees to lock their computer screens when away from their desks
and change their passwords every 60 days.
🛡️4. Anti-Viruses
📌 Definition:
Antivirus software is a program designed to detect, prevent, and remove malicious software
(malware), such as viruses, trojans, spyware, and ransomware.
🔍 How It Works:
Scans files and programs using virus signatures and behavior analysis.
Monitors system activity for suspicious behavior.
Often includes features like email scanning and browser protection.
🧠 Benefits:
💡 Example:
If a user downloads an infected email attachment, the antivirus blocks it before it runs on the
system.
🔐 5. Encryption
📌 Definition:
Encryption is the process of converting readable data into a coded format (ciphertext) that can
only be read by someone with the correct decryption key.
🔍 How It Works:
Used in both data at rest (stored files, databases) and data in transit (emails, internet
communication).
Algorithms like AES (Advanced Encryption Standard) and RSA are commonly used.
🧠 Benefits:
Banking apps use encryption so that account numbers and transaction data are unreadable to
hackers even if intercepted.
📊 Summary Table:
User Accounts Controls who can access what Prevents misuse and enforces accountability
Security
Guides secure behavior and practices Ensures consistency and legal compliance
Policies
Anti-Viruses Detects and removes malicious software Protects endpoints from malware
Secures data by converting it into Protects data privacy during storage and
Encryption
unreadable format transmission
Enforcing network security means putting systems, rules, and tools into action to protect the
network from threats and ensure safe operations. Here’s a detailed guide on how to effectively
enforce key network security measures:
✅ 1. Enforce Firewalls
🔧 Actions:
📌 Enforced Example:
Block all incoming traffic on ports not used by internal services (e.g., block ports 21, 23, 445).
🔧 Actions:
📌 Enforced Example:
HR staff can access employee records, but not financial databases or server settings.
🔧 Actions:
Develop clear, written IT security policies (e.g., password policy, internet usage policy).
Train employees regularly on these policies.
Use software to enforce rules (e.g., require screen locking after 5 minutes of inactivity).
📌 Enforced Example:
Automatically log out users after 10 minutes of inactivity to prevent unauthorized access.
✅ 4. Enforce Anti-virus Use
🔧 Actions:
📌 Enforced Example:
All company laptops must run the latest version of Norton or Bitdefender, updated daily.
✅ 5. Enforce Encryption
🔧 Actions:
📌 Enforced Example:
Customer credit card data is encrypted both in the database (at rest) and during transmission (in
transit).
🔧 Actions:
📌 Enforced Example:
Weekly log reviews detect login attempts outside of office hours, which are flagged for
investigation.
🧾 Summary of Enforcement Strategies
A Network Security Policy is a formal document that outlines the rules, procedures, and
guidelines for protecting a computer network from unauthorized access, misuse, modification, or
destruction. It defines how an organization safeguards the confidentiality, integrity, and
availability of its data and network infrastructure.
Defines who can access what on the network, and under what conditions.
Guidelines for how users can use network systems and resources responsibly.
🧠 Example: Employees must not use work networks to stream movies or download pirated
content.
🧠 Example: All devices must run real-time malware protection and be scanned weekly.
🔐 E. Encryption Policy
🧠 Example: All company emails with client data must be encrypted using TLS.
🧠 Example: Employees working from home must connect via VPN using company-issued
laptops.
Details how the policy is enforced and what happens when it is violated.
🔄 3. Policy Lifecycle
Access Control Use unique credentials; MFA required; access based on role.
📌 Final Thoughts
📶 1. Ping
📌 Definition:
Pingis a basic network utility used to test connectivity between two devices (typically your
computer and another device/server on the network or internet).
⚙️How It Works:
📈 Used For:
🧠 Example:
bash
CopyEdit
ping [Link]
Shows how long it takes to send and receive data from Google's server.
✅ Benefits:
Tracert shows the path that a packet takes from your computer to a destination server,
including all intermediate routers (hops).
⚙️How It Works:
📈 Used For:
🧠 Example:
bash
CopyEdit
tracert [Link]
✅ Benefits:
📌 Definition:
NSLookup is a tool for querying the Domain Name System (DNS) to get domain name or IP
address mapping.
⚙️How It Works:
Sends a DNS query to a server and returns information about domain names, IP
addresses, and DNS records.
📈 Used For:
✅ Benefits:
📌 Definition:
⚙️How It Works:
📈 Used For:
🧠 Examples:
bash
CopyEdit
ipconfig
bash
CopyEdit
ipconfig /release
ipconfig /renew
✅ Benefits:
📡 5. Speed Test
📌 Definition:
A speed test measures the bandwidth (download and upload speeds) and latency of an internet
connection.
⚙️How It Works:
📈 Used For:
🧠 Popular Tools:
[Link]
Google: just type “internet speed test”
Command-line: speedtest-cli (Linux/Python tool)
bash
CopyEdit
speedtest-cli
✅ Benefits:
🧾 Summary Table
Tracert Trace packet path through network Identifies where delays or drops occur
Tool Purpose Key Use