maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti
maasemitti

Internetworking - bridges - Internet protocol - Addressing – Routing Protocol

Internetworking, bridges, Internet protocol, Addressing, Routing Protocol

Internetworking - bridges - Internet protocol - Addressing – Routing Protocol IMAGE

Internetworking

is the practice of interconnecting multiple computer networks, such that any pair of hosts in the connected networks can exchange messages irrespective of their hardware-level networking technology. The resulting system of interconnected networks are called an internetwork, or simply an internet. 

There are 3 main units of Internetworking...

1. Extranet

2. Intranet

3. Internet

1. Extranet

An Extranet is a private network that extends some of an organization's internal network resources and services to external users or organizations, typically on the internet. 

It's essentially a controlled and secure extension of an organization's Intranet (internal network) to include specific external parties such as customers, suppliers, business partners, or other authorized users.

Key characteristics of an Extranet include:

1. Selective Access: Extranets are designed to provide access only to authorized users, allowing organizations to share specific information, collaborate on projects, or conduct transactions securely with external parties.

2. Security: Security measures, such as encryption, firewalls, and user authentication, are in place to protect the confidentiality and integrity of data shared over the Extranet. This is essential to ensure that sensitive information remains secure.

3. Collaboration: Extranets facilitate collaboration and communication between an organization and its external partners. This can include sharing documents, project management, joint planning, and more.

4. Shared Resources: Organizations often use Extranets to share resources like databases, applications, and project management tools with external entities. This can streamline operations and improve efficiency.

5. Customization: Extranets can be customized to meet the specific needs of the organization and its external partners. Access permissions, available resources, and user interfaces can be tailored accordingly.

6. Remote Access: Since Extranets are typically accessed over the internet, authorized users can connect from remote locations, making it convenient for collaboration with external parties who may be geographically dispersed.

7. Examples: Examples of Extranets include customer portals where customers can access their account information and place orders, supplier portals where suppliers can check inventory levels and submit purchase orders, and partner collaboration platforms for joint projects.

2. Intranet

An Intranet is a private, internal network within an organization that uses internet-based technologies and protocols but is restricted to authorized users, typically employees and sometimes trusted partners or suppliers. 

It serves as a secure platform for sharing information, resources, and communication among members of the organization.

Characteristics and purposes of an Intranet:

1. Internal Use: Intranets are designed for use within an organization. They are not accessible to the general public or the broader internet.

2. Secure Environment: Intranets employ various security measures like firewalls, user authentication, and encryption to protect sensitive data and ensure that unauthorized users cannot access the network.

3. Information Sharing: Intranets serve as a central platform for sharing company-specific information such as policies, procedures, news, announcements, and internal documents.

4. Communication: Intranets often include communication tools such as email, instant messaging, discussion forums, and collaboration software to facilitate internal communication and collaboration among employees.

5. Resource Access: Employees can access resources like shared files, databases, company directories, and applications through the Intranet. This streamlines workflow and makes it easier to access necessary tools.

6. Knowledge Management: Intranets are often used to store and manage knowledge resources, such as documents, manuals, training materials, and employee directories.

7. Corporate Culture: They can be a platform for promoting and reinforcing an organization's corporate culture, values, and mission through internal communications and engagement initiatives.

8. Cost-Efficiency: Intranets can reduce the need for physical paperwork, streamline processes, and improve efficiency, resulting in cost savings for the organization.

9. Customization: Organizations can tailor the Intranet to their specific needs, creating custom web applications, portals, and interfaces that suit their business requirements.

10. Scalability: Intranets can grow and evolve with the organization, accommodating increasing user numbers and expanding resources as needed.

3. Internet

The internet, often simply referred to as the "Internet," is a global network of interconnected computer networks that spans the entire planet. It is a vast and decentralized network that connects billions of devices and computers worldwide, allowing them to communicate, share information, and access a wide range of services and resources.

Key characteristics of the internet include:

1. Global Connectivity: The internet connects individuals, organizations, and devices from all corners of the world. It is not limited by geographic boundaries, making it a truly global network.

2. Decentralization: The internet is not controlled by a single entity or organization. Instead, it is made up of a multitude of interconnected networks, each managed by various entities, including internet service providers (ISPs), companies, and governments.

3. Protocols: The internet relies on a set of standardized communication protocols, such as TCP/IP (Transmission Control Protocol/Internet Protocol), which enable devices to exchange data packets seamlessly.

4. Access via Web Browsers: Most users access the internet through web browsers like Google Chrome, Mozilla Firefox, or Microsoft Edge. The World Wide Web (WWW) is a significant part of the internet, allowing users to access websites and web-based applications.

5. Information and Services: The internet offers a vast array of resources and services, including websites, email, social media, online shopping, streaming media, search engines, cloud computing, and much more.

6. Communication: The internet facilitates various forms of communication, such as email, instant messaging, video conferencing, and social networking, connecting people across the globe.

7. Openness: The internet is built on the principles of openness and accessibility, allowing anyone with an internet connection to access information and contribute to it.

8. Security and Privacy: While the internet provides valuable services, it also raises concerns about security and privacy. Users and organizations must take measures to protect their data and online activities.

9. Evolution: The internet is constantly evolving, with new technologies, standards, and services regularly emerging. This ongoing evolution has transformed the way people work, communicate, and access information.

Bridge

A network bridge is a computer networking device that creates a single, aggregate network from multiple communication networks or network segments. 

This function is called network bridging. Bridging is distinct from routing.  

A bridge within a computer network is a hardware device employed to link numerous Local Area Networks (LANs) into a larger unified LAN. This process of merging networks is referred to as bridging. These bridges are physical devices that function at the data link layer of the OSI model and are sometimes referred to as switches operating at the second layer.

Types of Bridge

There are three primary types of bridges in computer networks:

1. Transparent Bridge: This type of bridge operates inconspicuously on the network, filtering traffic based on MAC addresses. Its purpose is to extend network coverage and segment LANs seamlessly.

2. Source Routing Bridge: A source routing bridge relies on the sender specifying the route for data frames through the network. The bridge simply follows the designated route as instructed.

3. Translational Bridge: The translational bridge serves as a bridge with the additional capability of translating between different network protocols or formats. It facilitates communication between networks that use distinct protocols or data formats.

Advantages of bridges in Computer Networks 

1. Bridges are capable of extending networks by connecting two different network topologies.

2. They establish separate collision domains, leading to enhanced bandwidth utilization.

3. Bridges can serve as a buffer when various MAC protocols are employed on different network segments.

4. They offer high reliability and ease of maintenance, allowing the network to be divided into multiple LAN segments.

5. Bridges are straightforward to install, requiring no additional hardware or software aside from the bridge itself.

6. They exhibit a higher level of protocol transparency when compared to other networking protocols.

Disadvantages of bridges in Computer Networks

1. Higher cost compared to hubs and repeaters.

2. Slower data transfer speeds.

3. Reduced performance due to the need for extra processing to identify device MAC addresses on the network.

4. Inability to perform individual data filtering because it deals with bulk or broadcasted traffic.

5. Elevated broadcast traffic during data broadcasting, which may result in the formation of broadcast storms within the network.

Internet Protocol

It is a protocol defined in the TCP/IP model used for sending the packets from source to destination

The Internet Protocol (IP) is a fundamental communication protocol used in computer networks, including the global network that we know as the Internet. 

These protocols work together to enable data transmission and communication across connected networks.

Addressing

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

The first IP was IPv4 that was commercially used. IPv4 was entirely exhausted by the internet users and internet service providers. Thus to satisfy the ever-increasing need of IP Addresses, Internet Engineering Task Force (IETF) came up with the new IPv6 in 1995, standardized in 1996. At present both IPv4 and IPv6 are in use, and both are entirely different from each other regarding providing addresses.

IPv4 uses a 32-bit address format (e.g., 192.168.1.1), while IPv6 uses a 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Routing 

A routing protocol is a set of rules and algorithms used by routers in a network to determine the best path for forwarding data packets from the source to the destination. These protocols enable efficient communication between different devices within a network by dynamically adapting to changes in network topology, such as link failures or new connections.

Routing protocols are particularly important in larger networks, where there can be multiple paths between the source and destination. 

The primary goal of routing protocols is to find the most optimal path for data transmission based on factors such as shortest path, available bandwidth, latency, and reliability. 

The routing algorithm initializes and maintains the routing table for the process of path determination are some key aspects of routing protocols: 

एक टिप्पणी भेजें

0 टिप्पणियाँ