A network is a group of computers connected together that allows information to be exchanged between the computers. It can be divided in several subnets depending on the usage and the requirements.
This chapter introduces the key elements of a computer network and explores the devices used to connect to a network such as nodes, network backbone, segments, and subnets. It discusses the various data transmission methods, the network reference models, and network topologies. This chapter also discusses the logical network arrangements, network classes, physical arrangements of the network (including topologies), and network equipment functions.
Network protocols are rules and conventions for communication between network devices. Protocols for computer networking all generally use packet switching techniques to send and receive messages in the form of packets. A network protocol facilitates device identification and data transfer.
This chapter describes the overview, functions of the network protocols, TCP/IP network classes, TELNET, application layer protocols, Light Weight Presentation Layer Protocol, session layer protocols, Reliable Data Protocol, User Datagram Protocol (UDP), routing protocols, and Data Link Layer protocols. This chapter also describes the implementation of Presentation Layer Protocols, Session Layer Protocols and Transport Layer Protocols.
Protocol Analysis involves the identification of basic knowledge objects within a protocol, usually a transcript. This chapter describes the TCP/IP protocol suite which includes TCP/IP: Network Interface layer, Internet Layer, Transport Layer, and Application Layer. This chapter lists the TCP user commands such as open, send, receive, close, status and abort and explains the TCP algorithms. This chapter also discusses the problems related to TCP and other protocols.
The Institute of Electrical and Electronics Engineers (IEEE) is a non-profit organization. It is one of the leading professional associations for the advancement of technology.
This chapter discusses the objectives of IEEE standards, IEEE 802 bridging and management, 802.2 Logical Link Control Layer, 802.3 CSMA/CD (Ethernet), 802.4 Token Passing Bus, 802.5 Token Ring Passing, 802.6 DQDB Access Method, and 802.7 Broadband LAN, 802.10 Security. This chapter also discusses the 802.11 Wireless LAN (WLAN), 802.12 Demand Priority Access, 802.15 Wireless Personal Area Network, 802.16 Broadband Wireless MAN (WMAN), 802.17 Resilient Packet Ring, wireless networking standards, and ETSI standards.
Security standards enable organizations to practice security techniques to minimize the number of the successful security attacks.
This chapter introduces the Internet Corporation for Assigned Names and Numbers, International Organization for Standardization, International Telecommunication Union and American National Standards Institute. This chapter also provides information on the Institute Of Electronics and Electrical Engineers (IEEE), Electronic Industries Association, National Institute for Standards and Technology, World Wide Web Consortium, and Web Application Security Consortium.
The security standards support the businesses that take advantage of working with computers and electronic commerce on the Internet. Although there are more data security products and security services available today, the rapid growth in Internet technology also creates new opportunities for hackers and businesses.
This chapter describes the Introduction to Internet Standards, Standards Creation Committee, and request for Comment Evolution, and Unshielded Twisted Pair (UTP) Categories. This chapter also discusses on how to obtain RFCs via File Transfer Protocol (FTP) and lists various cabling standards.