Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and design.
Networking fundamentals teaches computer science students the building blocks of modern network design. Typically you will learn about the many different types of networks, networking concepts, network architecture, network communications and network design.
Network Fundamentals Checklist
Jump to a topic:
Getting Started: Key Terms to Know
Defining a Network
Different Types of Networks
The Importance of Network Standards
Network Components, Devices and Functions
The 7 Layers of the OSI Model
The TCP/IP model
The following definitions will help you to better understand computer networks:
A network is a group of two or more computer systems or other devices that are linked together to exchange data. Networks share resources, exchange files and electronic communications. For example, networked computers can share files or multiple computers on the network can share the same printer.
There are many types of computer networks. Common types of networks include the following:
- Local-area network (LAN): The computers are geographically close together (that is, in the same building).
- Wide-area network (WAN): The computers are farther apart and are connected by telephone lines or radio waves.
- Metropolitan-area network (MAN): A data network designed for a town or city.
- Home-area network (HAN): A network contained within a user's home that connects a person's digital devices.
- Virtual private network (VPN): A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.
- Storage area network (SAN): A high-speed network of storage devices that also connects those storage devices with servers.
Recommended Reading: .
Network standards are important to ensure that hardware and software can work together. Without standards you could not easily develop a network to share information. Networking standards can be categorized in one of two ways: formal and de facto (informal).
Formal standards are developed by industry organizations or governments. Formal standards exist for network layer software, data link layer, hardware and so on. Formal standardization is a lengthy process of developing the specification, identifying choices and industry acceptance.
There are a several leading organizations for standardization including The International Organization for Standardization (ISO) and The American National Standards Institute (ANSI). The most known standards organization in the world is the Internet Engineering Task Force (IETF). IETF sets the standards that govern how much of the Internet operates.
The second category of networking standards is de facto standards. These standards typically emerge in the marketplace and are supported by technology vendors but have no official backing. For example, Microsoft Windows is a de facto standard, but is not formally recognized by any standards organization. It is simply widely recognized and accepted.
Networks share common devices and functions, such as servers, transmission media (the cabling used to connect the network) clients, shared data (e.g. files and email), network cards, printers and other peripheral devices.
The following is a brief introduction to common network components and devices. You can click any link below to read the full 顶盛体育直播 definition:
: A computer or device on a network that manages network resources. Servers are often dedicated, meaning that they perform no other tasks besides their server tasks.
: A client is an application that runs on a personal computer or workstation and relies on a server to perform some operations.
: Computer devices, such as a CD-ROM drive or printer, that is not part of the essential computer. Examples of devices include disk drives, printers, and modems.
: the type of physical system used to carry a communication signal from one system to another. Examples of transmission media include twisted-pair cable, coaxial cable, and fiber optic cable.
: A network operating system includes special functions for connecting computers and devices into a local-area network (LAN). The term network operating system is generally reserved for software that enhances a basic operating system by adding networking features.
: Operating systems provide a software platform on top of which other programs, called application programs, can run. Operating systems perform basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as disk drives and printers.
: An expansion board you insert into a computer so the computer can be connected to a network. Most NICs are designed for a particular type of network, protocol, and media, although some can serve multiple networks.
: A common connection point for devices in a network. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
: A device that filters and forwards packets between LAN segments. Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model.
A router is a device that forwards data packets along networks. A router is connected to at least two networks and is located at gateways, the places where two or more networks connect.
: A node on a network that serves as an entrance to another network.
: A device that connects two local-area networks (LANs), or two segments of the same LAN that use the same protocol
: The CSU is a device that connects a terminal to a digital line. Typically, the two devices are packaged as a single unit.
(ISDN Adapter): A device that connects a computer to an external digital communications line, such as an ISDN line. A terminal adapter is a bit like a modem but only needs to pass along digital signals.
: A hardware device or a computer's software that acts as a communication hub for users of a wireless device to connect to a wired LAN.
(modulator-demodulator): A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines.
: A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both.
: A MAC (Media Access Control) address, sometimes referred to as a hardware address or physical address, is an ID code that's assigned to a network adapter or any device with built-in networking capability.
To simplify networks, everything is separated in layers and each layer handles specific tasks and is independent of all other layers. Control is passed from one layer to the next, starting at the top layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy. Network models are used to define a set of network layers and how they interact. The two most widely recognized network models include the TCP/IP Model and the OSI Network Model.
The Open System Interconnect (OSI) is an open standard for all communication systems.The OSI model defines a networking framework to implement protocols in seven layers.
This layer conveys the bit stream - electrical impulse, light or radio signal -- through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Data Link Layer
At this layer, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. Examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
This layer provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Examples include AppleTalk DDP, IP, IPX.
This layer provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer.Examples include SPX, TCP, UDP.
This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. Examples include NFS, NetBios names, RPC, SQL.
This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. Examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
This layer supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP
Recommended Reading: View 顶盛体育直播's The for in-depth descriptions and diagrams.
The TCP/IP network model is a four-layer reference model. All protocols that belong to the TCP/IP protocol suite are located in the top three layers of this model.
Defines TCP/IP application protocols and how host programs interface with transport layer services to use the network. Protocol examples include HTTP, Telnet, FTP, TFTP, SNMP, DNS, SMTP.
Provides communication session management between host computers. Defines the level of service and status of the connection used when transporting data. Protocol examples include TCP, UDP, RTP.
Packages data into IP datagrams, which contain source and destination address information that is used to forward the datagrams between hosts and across networks. Performs routing of IP datagrams. Protocol examples include IP, ICMP, ARP, RARP.
Specifies details of how data is physically sent through the network, including how bits are electrically signaled by hardware devices that interface directly with a network medium, such as coaxial cable, optical fiber, or twisted-pair copper wire. Protocol examples include Ethernet, Token Ring, FDDI, X.25, Frame Relay, RS-232, v.35.
Each layer of the TCP/IP model corresponds to one or more layers of the seven-layer Open Systems Interconnection (OSI) reference model.
Network topology refers to the shape or the arrangement of the different elements in a computer network (i.e. links and nodes). Network Topology defines how different nodes in a network are connected to each other and how they communicate is determined by the network's topology.
Topologies are either physical or logical. There are four principal topologies used in LANs.
All devices are connected to a central cable, called the bus or backbone. Bus networks are relatively inexpensive and easy to install for small networks.
All devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it.
All devices are connected to a central hub. Star networks are relatively easy to install and manage, but bottlenecks can occur because all data must pass through the hub.
A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-configured workstations connected to a linear bus backbone cable.
These topologies can also be mixed. For example, a bus-star network consists of a high-bandwidth bus, called the backbone, which connects a collections of slower-bandwidth star segments.
Recommended Reading: View 顶盛体育直播's for in-depth descriptions and diagrams.
This article was last updated on September 06, 2015
Stay up to date on the latest developments in Internet terminology with a free newsletter from 顶盛体育直播. Join to subscribe now.
From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »Huge List of Computer Certifications
Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »