<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Israh Binoj</title>
    <description>The latest articles on DEV Community by Israh Binoj (@israhverse).</description>
    <link>https://dev.to/israhverse</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3584842%2F4f9786a2-649b-4f8c-95fd-50435cf240e6.jpg</url>
      <title>DEV Community: Israh Binoj</title>
      <link>https://dev.to/israhverse</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/israhverse"/>
    <language>en</language>
    <item>
      <title>Understanding Switch learning &amp; Collision Domains (Lab notes) | Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Wed, 26 Nov 2025 15:47:51 +0000</pubDate>
      <link>https://dev.to/israhverse/day-21-understanding-switch-learning-collision-domains-lab-notes-israh-binoj-5cfg</link>
      <guid>https://dev.to/israhverse/day-21-understanding-switch-learning-collision-domains-lab-notes-israh-binoj-5cfg</guid>
      <description>&lt;p&gt;&lt;strong&gt;What Is a Switch?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A switch is a network device used to connect multiple devices within the same network and transfer data packets between them. It operates at Layer 2 of the OSI model, meaning it deals with MAC addresses and Ethernet frames. Unlike hubs, which broadcast data to every connected port, a switch sends data only to the specific port where the destination device is located. Because of this selective forwarding, switches are more efficient, reduce unnecessary traffic, and make the network much faster.&lt;/p&gt;

&lt;p&gt;The main function of a switch is the forwarding of frames. When it receives an Ethernet frame on one port, it forwards it only to the port where the destination device is connected.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Frame Filtering&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A switch also filters frames. This means it blocks frames from being sent to ports where the destination device does not exist. This prevents unnecessary broadcasting and improves overall network performance.&lt;/p&gt;

&lt;p&gt;To do this, switches build a MAC address table, also known as a CAM table (Content Addressable Memory). This table stores the MAC addresses that the switch has learned along with the ports they are connected to. With this information, the switch knows exactly where to send future frames.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Frames and MAC Addresses&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;An Ethernet frame contains several fields, including:&lt;/p&gt;

&lt;p&gt;Source MAC address&lt;/p&gt;

&lt;p&gt;Destination MAC address&lt;/p&gt;

&lt;p&gt;Ethertype&lt;/p&gt;

&lt;p&gt;Payload&lt;/p&gt;

&lt;p&gt;Switches use the source MAC address of incoming frames to learn where devices are located. They use the destination MAC address to decide where to forward the frame.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MAC Address Table (CAM Table)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The CAM table stores MAC addresses and their corresponding ports. There are two main types of entries:&lt;/p&gt;

&lt;p&gt;Dynamic entries: Learned automatically when the switch sees a source MAC on a port&lt;/p&gt;

&lt;p&gt;Static entries: Manually configured by the network administrator&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Switches Learn MAC Addresses&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;A frame arrives on a port.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The switch reads the source MAC address from the Ethernet header.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It records the source MAC in the MAC table along with the port number.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If the destination MAC is not present in the table, the switch floods the frame out of all other ports.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;When the destination device replies, the switch learns the destination’s MAC address from that reply.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;From then on, frames are forwarded directly to the correct port without flooding.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Collision Domains&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A collision domain is a set of interfaces on a shared medium where two devices can transmit at the same time, causing their frames to collide. Collisions are a major problem in hub-based networks.&lt;/p&gt;

&lt;p&gt;With switches, every port becomes a separate collision domain, especially when operating in full-duplex mode. Modern switches almost always use full duplex, which allows devices to send and receive data at the same time, effectively eliminating collisions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Switches Reduce Collisions and Provide Better Bandwidth&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Switches greatly reduce collisions for several reasons:&lt;/p&gt;

&lt;p&gt;Port isolation: Each switch port is its own collision domain.&lt;/p&gt;

&lt;p&gt;Selective forwarding: Only the required frames are sent to the correct destination port.&lt;/p&gt;

&lt;p&gt;Support for full-duplex communication: Devices can transmit and receive simultaneously, avoiding collisions entirely.&lt;/p&gt;

&lt;p&gt;These features allow switches to provide dedicated bandwidth to each connected device, making networks more reliable and faster.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Practice: Observing Switch MAC Learning Using Packet Tracer&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Step 1: Create a Small LAN&lt;/p&gt;

&lt;p&gt;First, I created a simple LAN using Cisco Packet Tracer.&lt;br&gt;
The network includes one switch and five PCs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffws1q9u5ruwpewq5beju.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffws1q9u5ruwpewq5beju.jpg" alt=" " width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Each PC is connected to a separate switch port using Copper Straight-Through cables.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxhqakcninrojpwvwnh4f.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxhqakcninrojpwvwnh4f.jpg" alt=" " width="428" height="389"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fac5vsno5oge2xj0lfulc.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fac5vsno5oge2xj0lfulc.jpg" alt=" " width="800" height="421"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;PC0 -&amp;gt; Switch port Fa0/1&lt;/p&gt;

&lt;p&gt;PC1 -&amp;gt; Switch port Fa0/2&lt;/p&gt;

&lt;p&gt;PC2 -&amp;gt; Switch port Fa0/3&lt;/p&gt;

&lt;p&gt;PC3 -&amp;gt; Switch port Fa0/4&lt;/p&gt;

&lt;p&gt;PC4 -&amp;gt; Switch port Fa0/5&lt;/p&gt;

&lt;p&gt;This cable type is used to connect end devices (PCs) to a switch.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpzy13ts3ik8fh12uyl6.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhpzy13ts3ik8fh12uyl6.jpg" alt=" " width="800" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Assign IP Addresses to the PCs&lt;/p&gt;

&lt;p&gt;Next, I assigned IP addresses to each PC so that they can communicate.&lt;/p&gt;

&lt;p&gt;To set the IP:&lt;/p&gt;

&lt;p&gt;Click the PC&lt;/p&gt;

&lt;p&gt;Go to Desktop -&amp;gt; IP Configuration&lt;/p&gt;

&lt;p&gt;Choose Static and enter the IPv4 address&lt;/p&gt;

&lt;p&gt;I used the following addressing:&lt;/p&gt;

&lt;p&gt;PC0: 192.168.1.2&lt;/p&gt;

&lt;p&gt;PC1: 192.168.1.3&lt;/p&gt;

&lt;p&gt;PC2: 192.168.1.4&lt;/p&gt;

&lt;p&gt;PC3: 192.168.1.5&lt;/p&gt;

&lt;p&gt;PC4: 192.168.1.6&lt;/p&gt;

&lt;p&gt;The Subnet Mask is automatically set to 255.255.255.0 for all PCs.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9f22syhqgsigq3b16qqd.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9f22syhqgsigq3b16qqd.jpg" alt=" " width="800" height="423"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3: Generate Traffic Using Ping&lt;/p&gt;

&lt;p&gt;To allow the switch to learn the MAC addresses, I generated network traffic between the PCs using the ping command.&lt;/p&gt;

&lt;p&gt;For example, on PC0:&lt;/p&gt;

&lt;p&gt;Go to Desktop -&amp;gt; Command Prompt&lt;/p&gt;

&lt;p&gt;Enter:&lt;/p&gt;

&lt;p&gt;ping 192.168.1.3&lt;/p&gt;

&lt;p&gt;Then I repeated the ping command to other PCs (PC2, PC3, PC4).&lt;br&gt;
This traffic allows the switch to learn the source MAC addresses of each device.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmojbl8mmoa6dhi81lzqo.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmojbl8mmoa6dhi81lzqo.jpg" alt=" " width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 4: Check the Switch’s MAC Address Table&lt;/p&gt;

&lt;p&gt;Finally, I checked whether the switch successfully learned the MAC addresses.&lt;/p&gt;

&lt;p&gt;Click the Switch&lt;/p&gt;

&lt;p&gt;Go to the CLI tab&lt;/p&gt;

&lt;p&gt;Press Enter&lt;/p&gt;

&lt;p&gt;Type:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;enable&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;and then, &lt;/p&gt;

&lt;p&gt;&lt;em&gt;show mac address-table&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The output shows the MAC address table, where the switch has stored each PC’s MAC address along with the port number it was learned from.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgomr3shx46u4ir4xnhe3.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgomr3shx46u4ir4xnhe3.jpg" alt=" " width="800" height="416"&gt;&lt;/a&gt;&lt;br&gt;
This confirms that MAC learning occurred successfully. &lt;/p&gt;

&lt;p&gt;Lab is successfully completed and u learned how MAC address table stores the addresses. &lt;/p&gt;

&lt;p&gt;Follow for more!! &lt;/p&gt;

</description>
      <category>beginners</category>
      <category>learning</category>
      <category>networking</category>
    </item>
    <item>
      <title>Understanding Hubs In Networking| Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Tue, 25 Nov 2025 17:45:52 +0000</pubDate>
      <link>https://dev.to/israhverse/understanding-hubs-in-networking-israh-binoj-2co1</link>
      <guid>https://dev.to/israhverse/understanding-hubs-in-networking-israh-binoj-2co1</guid>
      <description>&lt;p&gt;A hub is one of the simplest networking devices used to connect multiple devices in a small network. It acts as a central point where data from one device is received and then forwarded to all other connected devices without checking where the data actually needs to go. This simplicity makes hubs easy to use, but also limits their efficiency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Hubs&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Active Hub&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;An active hub works with its own power supply.&lt;br&gt;
It regenerates and amplifies incoming signals before forwarding them, which helps maintain signal strength over long distances.&lt;br&gt;
Because of this, active hubs are used in larger setups or long-distance networks and function similarly to repeaters.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Passive Hub&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A passive hub has no power supply of its own.&lt;br&gt;
It simply splits the connection and sends the signal as it is, without boosting or strengthening it.&lt;br&gt;
This type of hub is suitable for very small networks where the distance between devices is short.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Smart (Intelligent) Hub&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A smart hub, also known as an intelligent hub, includes basic management features.&lt;br&gt;
It can monitor network traffic, detect errors, and provide limited network diagnostics.&lt;br&gt;
Although not as advanced as switches, it offers more functionality than basic hubs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hub in the OSI Model&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hubs operate at Layer 1: The Physical Layer of the OSI model.&lt;br&gt;
They do not understand MAC addresses or make any forwarding decisions.&lt;br&gt;
Their job is simply to send whatever they receive to all ports.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Number of Ports&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Most hubs are available with:&lt;/p&gt;

&lt;p&gt;4 ports&lt;/p&gt;

&lt;p&gt;8 ports&lt;/p&gt;

&lt;p&gt;16 ports&lt;/p&gt;

&lt;p&gt;These ports allow you to connect multiple devices within a simple local network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Hubs Are Not Used in Modern Networks&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hubs create one large collision domain.&lt;br&gt;
When multiple devices send data at the same time, collisions occur, causing the network to slow down significantly.&lt;br&gt;
As more devices are added, collisions increase and performance decreases.&lt;/p&gt;

&lt;p&gt;Because of this inefficiency, hubs have largely been replaced by switches, which handle traffic much more intelligently.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Half-Duplex Communication&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hubs only support half-duplex mode, meaning:&lt;/p&gt;

&lt;p&gt;A device can either send or receive data,&lt;/p&gt;

&lt;p&gt;But not both at the same time.&lt;/p&gt;

&lt;p&gt;This further slows down communication, especially in busy networks.&lt;br&gt;
In contrast, switches support full-duplex, allowing sending and receiving simultaneously.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Hubs Transmit Data&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Bit-by-Bit Transmission&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hubs forward data one bit at a time in the form of electrical signals.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;No Address Filtering&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hubs do not read MAC addresses.&lt;br&gt;
They cannot direct data to a specific device and instead broadcast everything to all connected devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Hubs are simple devices ideal for small or temporary networks, but their limitations are collisions, half-duplex mode, and lack of traffic control make them unsuitable for modern environments. This is why switches have become the standard choice for efficient networking.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>computerscience</category>
      <category>networking</category>
    </item>
    <item>
      <title>Hubs in networking|Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Mon, 24 Nov 2025 18:07:28 +0000</pubDate>
      <link>https://dev.to/israhverse/hubs-in-networkingisrah-binoj-437n</link>
      <guid>https://dev.to/israhverse/hubs-in-networkingisrah-binoj-437n</guid>
      <description>&lt;p&gt;A hub is one of the simplest and most basic networking devices used to connect multiple devices within a Local Area Network (LAN). It receives data from one connected device and forwards that data to all other devices on the network. The hub does not check which device the data is intended for, so every device receives the same information-even if only one device actually needs it.&lt;/p&gt;

&lt;p&gt;In the OSI model, a hub operates at the Physical Layer (Layer 1). This means it does not understand MAC addresses, IP addresses, or any higher-level data. Its main job is just to repeat or broadcast electrical signals to every port. Because hubs have no intelligence or filtering capability, they simply forward everything they receive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;How a Hub Works&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The working process of a hub is very straightforward:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;A device sends data to the hub through one of its ports.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The hub does not inspect, analyze, or filter the incoming data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;It immediately forwards (broadcasts) the data to all other connected devices, regardless of the actual destination.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Out of all devices, only the intended device recognizes and accepts the data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;All other devices receive the same data, but they simply ignore it.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Because every packet is broadcast to everyone, hubs generate a lot of unnecessary network traffic. This also leads to more collisions, where two devices try to send data at the same time, causing interference. For this reason, hubs are far less efficient compared to switches, which send data only to the correct destination.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Uses of a Hub&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Although they are not commonly used today, hubs still have several important uses:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Small Local Area Networks (LANs)&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hubs are used to connect multiple computers in small setups where traffic is low and simplicity is more important than speed.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Basic File Sharing&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For simple file sharing or basic communication within a small group, a hub works well because of its plug-and-play nature.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Network Monitoring&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Since hubs broadcast all data to everyone, they make it easy to monitor network traffic. Network administrators sometimes use hubs to capture packets for analysis.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Educational and Training Labs&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Hubs are commonly used in computer networking labs to demonstrate how broadcasting, collisions, and basic network communication work.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Temporary or Low-Cost Networks&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;For short-term setups or environments with limited budgets, hubs offer a low-cost way to connect multiple devices without complex configuration.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Summary&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A hub is a simple and inexpensive networking device that operates at the Physical Layer (Layer 1) of the OSI model. It connects multiple devices and broadcasts data to all of them without checking the destination. While this makes hubs easy to use, it also results in high traffic, frequent collisions, and lower efficiency compared to modern devices like switches.&lt;/p&gt;

&lt;p&gt;Despite their limitations, hubs remain useful for learning, monitoring, and basic connectivity in small or temporary networks.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Network Interface Card- Detailed Notes|Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Sun, 23 Nov 2025 09:31:37 +0000</pubDate>
      <link>https://dev.to/israhverse/network-interface-card-detailed-notesisrah-binoj-5fcd</link>
      <guid>https://dev.to/israhverse/network-interface-card-detailed-notesisrah-binoj-5fcd</guid>
      <description>&lt;p&gt;A Network Interface Card (NIC) is one of the most essential components in any computer or smart device. It allows the device to connect to a network either through a physical cable or wirelessly through Wi-Fi. A NIC is responsible for converting data into signals, handling communication, identifying the device using a MAC address, and ensuring reliable data transmission. Without a NIC, a device cannot access a LAN, the internet, or any other network.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;&lt;strong&gt;Wired NIC&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;A wired NIC connects a computer to the network using an Ethernet cable. It contains an RJ-45 LAN port and converts digital data into electrical signals that travel through the cable. Wired NICs are known for their stability, low latency, and high-speed performance, making them ideal for desktops, servers, and gaming systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Wired NIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Onboard Ethernet&lt;/strong&gt;: Integrated directly into the motherboard.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PCIe Wired NIC&lt;/strong&gt;: Installed inside a desktop using PCIe slots and supports high speeds like 1 Gbps, 10 Gbps, and beyond.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;USB-to-Ethernet Adapter&lt;/strong&gt;: External NIC used for laptops or tablets that lack an Ethernet port.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Wireless NIC&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A wireless NIC enables a device to connect to a network without any cables, typically via Wi-Fi. It uses radio waves to communicate with wireless routers, hotspots, and access points. Wireless NICs come with internal or external antennas to improve range and signal quality.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Wireless NIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Built-in Wi-Fi Card&lt;/strong&gt;: Embedded inside laptops and phones.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;USB Wi-Fi Adapter&lt;/strong&gt;: Plug-and-play device for desktops and older laptops.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PCIe Wi-Fi Adapter&lt;/strong&gt;: High-performance card with external antennas for desktops.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;M.2 Wi-Fi Card&lt;/strong&gt;: Slim and fast modules used in modern laptops.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Wi-Fi Standards&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wireless NICs support various Wi-Fi technologies such as:&lt;/p&gt;

&lt;p&gt;802.11b (11 Mbps), 802.11g (54 Mbps)&lt;/p&gt;

&lt;p&gt;802.11n (300 Mbps, dual-band)&lt;/p&gt;

&lt;p&gt;802.11ac (1.3 Gbps)&lt;/p&gt;

&lt;p&gt;802.11ax / Wi-Fi 6 (up to 10 Gbps)&lt;/p&gt;

&lt;p&gt;802.11be / Wi-Fi 7 (30+ Gbps)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NIC in the OSI Model&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A NIC mainly operates in two layers of the OSI model:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Layer 1 – Physical Layer&lt;/strong&gt;: Converts data into electrical, optical, or radio signals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Layer 2 – Data Link Layer&lt;/strong&gt;: Handles MAC addressing, framing, and error detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Uses of NIC&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NICs perform several important functions:&lt;/p&gt;

&lt;p&gt;Connect devices to wired or wireless networks&lt;/p&gt;

&lt;p&gt;Provide a unique MAC address&lt;/p&gt;

&lt;p&gt;Convert data into signals&lt;/p&gt;

&lt;p&gt;Manage data framing and packet transmission&lt;/p&gt;

&lt;p&gt;Detect and handle errors&lt;/p&gt;

&lt;p&gt;Support duplex communication and auto-negotiation of speed&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NIC Speeds&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Wired NIC Speeds&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;100 Mbps (Fast Ethernet)&lt;/p&gt;

&lt;p&gt;1 Gbps (Gigabit Ethernet)&lt;/p&gt;

&lt;p&gt;2.5 Gbps / 5 Gbps&lt;/p&gt;

&lt;p&gt;10 Gbps Ethernet&lt;/p&gt;

&lt;p&gt;25G / 40G / 100G for data centers&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wireless NIC Speeds&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Depending on standards, speeds range from 11 Mbps (802.11b) to over 10 Gbps (Wi-Fi 6) and 30+ Gbps (Wi-Fi 7).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How a NIC Works&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;When a device sends data, the NIC receives it, adds the MAC address, creates frames, and converts the data into signals. These signals are then transmitted through cables or radio waves to the network. When receiving data, the NIC performs the reverse process: it checks for errors, converts signals back to digital form, and delivers the data to the operating system.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Components of a NIC&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Controller Chip&lt;/strong&gt;: The main processor of the NIC&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Transceiver&lt;/strong&gt;: Converts data to electrical or wireless signals&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;MAC Address ROM&lt;/strong&gt;: Stores the permanent MAC address&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Buffer Memory&lt;/strong&gt;: Temporary storage for packets&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RJ-45 Port&lt;/strong&gt;: For wired NICs&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Antenna&lt;/strong&gt;: For wireless NICs&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;PCIe/USB Interface&lt;/strong&gt;: Connects NIC to the motherboard&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NIC Drivers&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NIC drivers are software programs that let the operating system communicate with the NIC. They control speed, wireless security, power management, and packet handling. Without proper drivers, the NIC cannot function correctly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NIC Slot Types&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NICs can fit into different ports depending on the device:&lt;/p&gt;

&lt;p&gt;PCI / PCIe slots (desktops)&lt;/p&gt;

&lt;p&gt;Mini PCIe / M.2 slots (laptops)&lt;/p&gt;

&lt;p&gt;USB ports (external adapters)&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Virtual NIC (vNIC)&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A virtual NIC is a software-based network card used inside virtual machines. It behaves like a physical NIC—receiving IP addresses, connecting to networks, and transferring data. vNICs are essential in cloud computing and virtualization.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NIC LED Indicators&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Wired NIC ports usually have LED indicators:&lt;/p&gt;

&lt;p&gt;Solid Green: Connection established&lt;/p&gt;

&lt;p&gt;Blinking Light: Data activity&lt;/p&gt;

&lt;p&gt;Amber/Yellow: High-speed connection (1 Gbps or more)&lt;/p&gt;

&lt;p&gt;No Light: Cable unplugged or NIC disabled&lt;/p&gt;

</description>
      <category>networking</category>
      <category>learning</category>
      <category>hardware</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Network Interface Card -NIC| Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Sat, 22 Nov 2025 09:55:46 +0000</pubDate>
      <link>https://dev.to/israhverse/network-interface-card-nic-israh-binoj-36b2</link>
      <guid>https://dev.to/israhverse/network-interface-card-nic-israh-binoj-36b2</guid>
      <description>&lt;p&gt;A &lt;strong&gt;Network Interface Card (NIC)&lt;/strong&gt; is an essential hardware component that enables a computer or any digital device to connect to a network. Without a NIC, a device would not be able to communicate with other devices, access the internet, or participate in any form of data exchange over a network. In simple words, NICs act as the bridge between a device and the network.&lt;/p&gt;

&lt;p&gt;In our daily life, we often use different kinds of network adaptors, such as Wi-Fi dongles or Ethernet ports on laptops-these are all forms of NICs. Because of their purpose, they are also commonly known as LAN cards, Ethernet cards, or simply network adapters.&lt;/p&gt;

&lt;p&gt;A NIC can provide either a physical connection using cables or a wireless connection using radio waves. No matter the type, the main job of the NIC remains the same, it manages all the data that enters or leaves the device through the network. It handles important tasks such as data packet formation, buffering (temporary storage of data), and error checking to ensure that the information is transmitted correctly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How a NIC Works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The working process of a NIC can be understood in a few simple steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Data Conversion for Transmission&lt;/strong&gt;&lt;br&gt;
The computer generates digital data, but this data cannot travel directly through a cable or wireless signal. The NIC converts this digital data into electrical signals or radio signals. This conversion makes the data suitable for transmission through the network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Transmission of Data&lt;/strong&gt;&lt;br&gt;
Once the data is converted, the NIC sends it out through the connected medium-Ethernet cable, Wi-Fi antenna, or fiber optic cable.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Receiving Data Signals&lt;/strong&gt;&lt;br&gt;
When data arrives from the network, the NIC receives those incoming signals. These signals could be electrical, optical, or wireless, depending on the type of NIC being used.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Converting Signals Back into Digital Data&lt;/strong&gt;&lt;br&gt;
The NIC then converts the received signals back into digital data so that the computer can understand and process it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Addressing Using MAC Address&lt;/strong&gt;&lt;br&gt;
Every NIC comes with a unique MAC (Media Access Control) address. This hardware address ensures that the data reaches the correct device, just like a home address ensures correct delivery of mail. The MAC address helps identify the source and destination devices within a local network.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Types of NIC We Commonly Use&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;NICs come in different forms based on the type of connection they provide:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wired NIC-Ethernet&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is the most common type found in desktop computers and some laptops. It uses an RJ-45 Ethernet port and provides a stable and high-speed wired connection. Wired NICs are preferred in offices, gaming setups, and places that require reliable, uninterrupted connectivity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wireless NIC - Wi-Fi Adapter&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This type of NIC allows devices to connect to Wi-Fi networks using radio signals. Most smartphones, tablets, and modern laptops come with built-in wireless NICs. External USB Wi-Fi adapters are also available for devices that do not have built-in Wi-Fi.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;USB NIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;These are portable plug-and-play adapters that can be connected through a USB port. They can offer either Ethernet or Wi-Fi connectivity and are commonly used when the built-in NIC is damaged or unavailable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fiber NIC&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Used in high-speed and enterprise networks, fiber NICs support extremely fast data transfer through fiber optic cables. They are commonly used in servers, data centers, and advanced networking environments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;:&lt;/p&gt;

&lt;p&gt;A Network Interface Card may look simple, but it plays a crucial role in enabling communication between devices. Whether we are browsing the internet, streaming videos, or transferring files, the NIC silently manages all the behind-the-scenes data handling, ensuring smooth and efficient network connectivity&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Creating a Physical Wired Network in Cisco Packet Tracer - My Experience | Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Wed, 19 Nov 2025 08:45:22 +0000</pubDate>
      <link>https://dev.to/israhverse/creating-a-physical-wired-network-in-cisco-packet-tracer-my-experience-israh-binoj-3ige</link>
      <guid>https://dev.to/israhverse/creating-a-physical-wired-network-in-cisco-packet-tracer-my-experience-israh-binoj-3ige</guid>
      <description>&lt;p&gt;In this article, I am going to explain how I created a physical wired network in Cisco Packet Tracer and the difficulties I faced during the process.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Downloading Cisco Packet Tracer&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first step was to download Cisco Packet Tracer from the link provided by Udemy.&lt;br&gt;
After the download completed, I installed it just like any other regular application.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Creating a Cisco Account&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Before using Packet Tracer, I needed a Cisco account.&lt;br&gt;
I created the account, verified my email, and saved my login credentials for future use.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Logging Into Cisco Networking Academy&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After launching Packet Tracer for the first time, the application asked me to log in.&lt;br&gt;
I signed in through Skills For All by Cisco, which provides access for three months.&lt;br&gt;
Once I logged in successfully, Packet Tracer opened and I was ready to begin my project.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. Creating a Basic Physical Wired Network&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The first task I attempted was to create a simple wired physical network.&lt;br&gt;
My network consisted of:&lt;/p&gt;

&lt;p&gt;One PC&lt;/p&gt;

&lt;p&gt;One Switch&lt;/p&gt;

&lt;p&gt;One Copper Straight-Through cable&lt;/p&gt;

&lt;p&gt;This is the basic structure of most small networks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Steps I followed:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt;: Adding a PC&lt;/p&gt;

&lt;p&gt;I selected a PC from the End Devices section and dragged it onto the workspace.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2&lt;/strong&gt;: Adding a Switch&lt;/p&gt;

&lt;p&gt;Then I selected a 2960 series switch from the Switches category and placed it on the workspace.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3&lt;/strong&gt;: Connecting the Devices&lt;/p&gt;

&lt;p&gt;To connect the PC and the switch:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;I clicked on the Connections (lightning bolt icon).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I chose the Copper Straight-Through cable.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;I clicked on the PC and selected FastEthernet0.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Then I clicked on the switch and selected FastEthernet0/1.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The connection line turned green, which indicated that the cable was working and the link was active.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Difficulties I Faced&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;While creating the network, I faced a few difficulties:&lt;/p&gt;

&lt;p&gt;At first, I was confused between the Logical and Physical workspace views. I assumed that choosing the Physical view was necessary to create a wired network, but I later learned that all wired networks are created in the Logical view.&lt;/p&gt;

&lt;p&gt;I had trouble finding the correct cable type because there are many options, such as cross-over, console, and fiber cables.&lt;/p&gt;

&lt;p&gt;The link did not turn green immediately, which made me think the cable was not connected properly. It took a moment for the device to power on.&lt;/p&gt;

&lt;p&gt;This simple network was my first step in understanding how devices communicate in a wired environment.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>networking</category>
      <category>tools</category>
    </item>
    <item>
      <title>Wired Network Topology in detail | Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Tue, 11 Nov 2025 13:08:16 +0000</pubDate>
      <link>https://dev.to/israhverse/wired-network-topology-in-detail-israh-binoj-1pa6</link>
      <guid>https://dev.to/israhverse/wired-network-topology-in-detail-israh-binoj-1pa6</guid>
      <description>&lt;p&gt;Why is a star topology more reliable than a bus topology, even though it needs more cables?&lt;/p&gt;

&lt;p&gt;In a star topology, every computer is connected to a central device like a switch or hub.&lt;br&gt;
If one cable or computer stops working, it doesn’t affect the rest of the network ,only that single connection fails.&lt;br&gt;
But in a bus topology, all computers are connected through one main cable.&lt;br&gt;
If that cable breaks or has a problem, the entire network stops working.&lt;br&gt;
That’s why a star topology is more reliable even though it uses more wires.&lt;/p&gt;

&lt;p&gt;In a ring topology, how does data know when to stop at the right computer?&lt;br&gt;
In a ring topology, data travels in one direction around the circle.&lt;br&gt;
Each computer checks if the data is meant for it.&lt;br&gt;
If the address doesn’t match, it passes the data to the next computer.&lt;br&gt;
When the right computer gets the data, it accepts it and stops passing it on.&lt;br&gt;
This way, the message always reaches the correct device.&lt;/p&gt;

&lt;p&gt;How can a logical topology differ from the physical wiring of a network in real life?&lt;/p&gt;

&lt;p&gt;The physical topology shows how the devices are actually connected with cables.&lt;br&gt;
The logical topology shows how the data moves between them.&lt;br&gt;
For example, a network may be wired physically like a star (all computers connected to a switch),&lt;br&gt;
but the data may flow in a straight line, like in a bus topology.&lt;br&gt;
So, the way the network looks and the way data travels can be different.&lt;/p&gt;

&lt;p&gt;Why does a mesh topology provide better fault tolerance compared to other topologies?&lt;/p&gt;

&lt;p&gt;In a mesh topology, every computer is connected to all the other computers.&lt;br&gt;
This gives multiple paths for data to travel.&lt;br&gt;
If one cable fails, the data can still reach its destination through another route.&lt;br&gt;
Because of this, mesh topology is very reliable, though it needs more cables and costs more to set up.&lt;/p&gt;

&lt;p&gt;Why is bus topology considered outdated in modern wired networks, even though it’s cheap and simple?&lt;/p&gt;

&lt;p&gt;Bus topology was used in older networks because it was easy to install and required only one main cable.&lt;br&gt;
But it has many problems , when too many computers send data at the same time, the data can collide.&lt;br&gt;
If the main cable gets damaged, the whole network stops working.&lt;br&gt;
It’s also slow when more computers are added.&lt;br&gt;
That’s why star or hybrid topologies are used more today.&lt;/p&gt;

&lt;p&gt;Can a hybrid topology have both wired and wireless parts? How does it work together?&lt;/p&gt;

&lt;p&gt;Yes, it can have both. &lt;br&gt;
For example, in an office, some computers may be connected with cables in a star shape, while laptops and phones connect through Wi-Fi.&lt;br&gt;
Both the wired and wireless parts can communicate with each other using the same network.&lt;br&gt;
This makes hybrid topology more flexible and suitable for modern use.&lt;/p&gt;

&lt;p&gt;What kind of cables are usually used in wired topologies and why are they preferred?&lt;/p&gt;

&lt;p&gt;Most wired networks use Ethernet cables like Cat5e or Cat6.&lt;br&gt;
They are preferred because they are fast, reliable, and can transfer data without much loss.&lt;br&gt;
In bigger or faster networks, fiber optic cables are used.&lt;br&gt;
They carry data as light signals, which makes them faster and better for long distances.&lt;/p&gt;

&lt;p&gt;How the data collision occur in a bus topology, and how do modern systems avoid it?&lt;/p&gt;

&lt;p&gt;In a bus topology, all computers share the same cable.&lt;br&gt;
If two computers send data at the same time, the signals crash into each other, this is called a data collision.&lt;br&gt;
When this happens, both computers have to resend their data, which slows the network.&lt;br&gt;
Modern systems avoid this by using switches and special methods like CSMA/CD that check if the line is free before sending data.&lt;/p&gt;

&lt;p&gt;In a mesh topology with 5 computers, how many direct wired connections will be required between them for a full connection?&lt;/p&gt;

&lt;p&gt;In a full mesh topology, each computer is directly connected to every other computer.&lt;br&gt;
To find the total number of connections, we use the formula n(n − 1) / 2.&lt;br&gt;
Here, n = 5, so 5(5 − 1) / 2 = 10 connections in total.&lt;br&gt;
That means every computer will have 4 separate cables connecting it to the other 4 computers.&lt;/p&gt;

&lt;p&gt;So, here we explained wired network topology in detail with some questions... Stay tuned! &lt;/p&gt;

</description>
    </item>
    <item>
      <title>Wired Network Topology|Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Sun, 09 Nov 2025 06:59:10 +0000</pubDate>
      <link>https://dev.to/israhverse/wired-network-topologyisrah-binoj-kmn</link>
      <guid>https://dev.to/israhverse/wired-network-topologyisrah-binoj-kmn</guid>
      <description>&lt;p&gt;&lt;strong&gt;Wired network topology&lt;/strong&gt; refers to the physical or logical connection of devices such as computers, switches, or routers in a wired network, meaning they are connected using physical cables.&lt;br&gt;
It defines how data is transmitted between devices and how each component interacts within the network.&lt;br&gt;
Different types of wired topologies, such as star, ring, and mesh, offer varying levels of performance, reliability, and scalability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wired Star Topology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4wp97a18ggqxjgyem2m.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj4wp97a18ggqxjgyem2m.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
A wired star topology is created by connecting all devices to a central device, usually a switch. Each computer or device has its own dedicated connection to this central device — this is how a star topology works.&lt;/p&gt;

&lt;p&gt;It is easy to install and manage, and it also provides high performance. When a device sends data, the hub or switch receives it and then forwards the data either to the intended recipient device only (in the case of a switch) or to all devices (in the case of a hub).&lt;/p&gt;

&lt;p&gt;This topology is commonly used in office LANs, school or college computer labs, and home networks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wired Ring Topology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikr2eit8h3qo7dpqofhm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fikr2eit8h3qo7dpqofhm.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
In a wired ring topology, each device is connected in a circular manner, forming a closed loop. This loop allows data to flow in a single direction until it reaches its destination.&lt;/p&gt;

&lt;p&gt;It allows orderly transmission of data and provides good performance. In this topology, every device gets an equal chance to transmit data.&lt;/p&gt;

&lt;p&gt;In a &lt;strong&gt;dual ring topology&lt;/strong&gt;, two rings are used to connect all devices. Each device is connected to its neighboring devices through two separate cables, allowing data to be transmitted in two directions.&lt;/p&gt;

&lt;p&gt;Data usually travels through the primary loop, but if that loop fails, the secondary loop starts transmitting the data. This provides redundancy and fault tolerance.&lt;/p&gt;

&lt;p&gt;It is commonly used in Metropolitan Area Networks (MANs) and industrial networks that require high reliability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Wired Mesh Topology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oi7tiu8macvjm35uww0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2oi7tiu8macvjm35uww0.png" alt=" " width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
A wired mesh topology is a type of network layout where every device is connected to every other device in the network through dedicated physical cables. This creates multiple paths for data to travel, ensuring high reliability and fault tolerance.&lt;/p&gt;

&lt;p&gt;There are two main types of mesh topology:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Full Mesh&lt;/strong&gt;: Every device is connected to all other devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Partial Mesh&lt;/strong&gt;: Some devices are connected to all others, while others connect only to a few.&lt;/p&gt;

&lt;p&gt;In a wired mesh topology, data can take multiple routes to reach the destination device or server. Each device in the network acts as both a sender and a receiver, helping to transmit data across the network efficiently and reliably.&lt;/p&gt;

</description>
      <category>networking</category>
      <category>beginners</category>
      <category>architecture</category>
      <category>computerscience</category>
    </item>
    <item>
      <title>Network Topology|Physical and Logical Topology and types in detail| Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Thu, 06 Nov 2025 14:56:46 +0000</pubDate>
      <link>https://dev.to/israhverse/network-topologyphysical-and-logical-topology-and-types-in-detail-israh-binoj-57e</link>
      <guid>https://dev.to/israhverse/network-topologyphysical-and-logical-topology-and-types-in-detail-israh-binoj-57e</guid>
      <description>&lt;p&gt;&lt;strong&gt;What happens if the main cable in bus topology fails?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a bus topology, if the main cable fails, the entire network stops working.&lt;br&gt;
This happens because all the devices are connected to a single main cable, which acts as the backbone of the network. If this cable fails, the whole system fails, and data cannot reach its destination or the server.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How movement in ring topology occurs in one direction?&lt;/strong&gt;&lt;br&gt;
In a ring topology, data moves in a single direction ,either clockwise or counterclockwise.&lt;br&gt;
Each device is connected to two other devices, forming a closed loop.&lt;br&gt;
Each device receives the data, checks if it is the intended recipient, and if not, forwards it to the next device in the loop.&lt;br&gt;
This continuous flow of data around the ring is how a ring topology works.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How mesh topology enables data transmission?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a mesh topology, each node is connected to every other device in the network, creating multiple paths for data transmission.&lt;br&gt;
Here, every device has a direct connection to all other devices, so if one device needs to send data to another, it can do so directly without passing through any other device.&lt;br&gt;
Since there are multiple paths, if one path fails, the data can use an alternate route, ensuring effective and reliable networking.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How multiple topolgies connects in hybrid topology?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A hybrid topology is a combination of two or more different types of network topologies, such as ring, star, and mesh.&lt;br&gt;
Data transmission in a hybrid topology depends on the type of network topology used in each part of the system.&lt;br&gt;
For example, if a star topology is used, data first passes through the central hub or switch.&lt;br&gt;
If a bus topology is used, data travels through the main cable.&lt;br&gt;
In this way, data transmission in a hybrid topology follows the rules of the specific topologies that make it up.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How does a hybrid topology combine the advantages of different topologies?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;In a hybrid topology, two or more network topologies are combined together. While implementing this, the hybrid topology takes the strengths of each individual topology and uses them to improve network performance. It does not include or use the weaknesses of any topology in the hybrid design. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What determines whether a network follows a particular type of topology?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This is an important concept. For example, consider two types of logical topologies - logical ring and logical star.&lt;/p&gt;

&lt;p&gt;In a logical star, data passes through a central device such as a hub or switch.&lt;br&gt;
In a logical ring, data passes from one device to another in a loop until it reaches its destination.&lt;/p&gt;

&lt;p&gt;The choice of topology is completely based on the data flow pattern and communication method, which determine whether the network behaves as a logical ring or a logical star — regardless of the physical structure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Widely used topology and why?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The most commonly used network topology is the Star Topology.&lt;br&gt;
In a star topology, all devices are connected to a central device such as a hub, switch, or router.&lt;/p&gt;

&lt;p&gt;Features that make it commonly used:&lt;/p&gt;

&lt;p&gt;Easy to install and manage&lt;br&gt;
High performance&lt;br&gt;
Scalable (easy to add new devices)&lt;br&gt;
Managed through a central server or device&lt;/p&gt;

&lt;p&gt;Commonly used in:&lt;/p&gt;

&lt;p&gt;Wi-Fi router setups&lt;br&gt;
LAN (Local Area Network) configurations&lt;br&gt;
Offices, schools, and home networks. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Least used network topology and why?&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The least commonly used or not widely used network topology is the Mesh Topology.&lt;br&gt;
In a mesh topology, every device is connected to every other device in the network.&lt;br&gt;
While this provides high reliability and fault tolerance, it is very expensive and complex to set up and maintain.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can a network have a physical star topology and a logical star topology together?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A network can have a physical star topology and a logical star topology together. &lt;br&gt;
In this setup, physically, all devices are connected to a central device like a switch or router. &lt;br&gt;
Logically, data also passes through that same central device, which controls communication between all devices.&lt;br&gt;
So both the structure  and the data flow  follow a star pattern ,meaning the network has a physical star and logical star topology at the same time. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Which is the most affordable network topology to set up?&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;The most affordable network topology is the Bus Topology.&lt;br&gt;
In this topology, all devices share a single main cable, called the backbone. It uses less cabling, requires no central device, and is cheaper and easier to install than other topologies.&lt;br&gt;
It is mainly used in small and simple networks.&lt;br&gt;
Bus topology needs minimum cabling, with no need for switches, hubs, or routers, making it easy to set up ,and that’s why it is considered affordable.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>computerscience</category>
      <category>networking</category>
    </item>
    <item>
      <title>Network Topology| Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Mon, 03 Nov 2025 04:46:26 +0000</pubDate>
      <link>https://dev.to/israhverse/network-topology-israh-binoj-3d1j</link>
      <guid>https://dev.to/israhverse/network-topology-israh-binoj-3d1j</guid>
      <description>&lt;p&gt;Network topology means the arrangement of a computer network in a geometric structure. It defines how computer networking devices communicate effectively with each other. It shows the arrangement of nodes and links, such as devices and connections. It also describes how the connections work - whether physically or logically.&lt;/p&gt;

&lt;p&gt;There are two main types of network topology:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Physical Topology: The physical arrangement of devices and cables.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logical Topology: The path that data follows within a network.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Physical Topology&lt;/strong&gt;&lt;br&gt;
It is the physical appearance of how a network looks - the actual layout of cables, switches, computers, and other devices.&lt;br&gt;
It shows the physical connections between devices using wires, fiber optics, or wireless links.&lt;br&gt;
In simple words, it is the outline or map of how a network is physically arranged.&lt;/p&gt;

&lt;p&gt;Operates in the physical layer&lt;br&gt;
Purpose: To install and design the physical network&lt;/p&gt;

&lt;p&gt;Types of Physical Topology&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Bus Topology:&lt;br&gt;
All devices share one main cable.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Star Topology:&lt;br&gt;
All devices connect to a central hub or switch.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ring Topology:&lt;br&gt;
Devices form a circle; data moves in one direction.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Mesh Topology:&lt;br&gt;
Every device connects to every other device.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Tree Topology:&lt;br&gt;
Star networks joined in a tree shape.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Hybrid Topology:&lt;br&gt;
Mix of two or more topologies.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Logical Topology&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Logical topology explains how data actually flows through a network. More than the physical layout, it focuses on the working and communication of the network. It defines the path of data packets and how they move between devices.&lt;br&gt;
Data may travel in a different pattern than the physical connections, so logical topology shows the actual flow of data within the network.&lt;/p&gt;

&lt;p&gt;Operates in the data link or network layer&lt;br&gt;
Purpose : To understand and control how data moves. &lt;/p&gt;

&lt;p&gt;Types of Logical Topology&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Logical Bus:&lt;br&gt;
All devices share the same communication line.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logical Ring:&lt;br&gt;
Data travels in one direction around a loop.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logical Star:&lt;br&gt;
Data passes through a central device like a hub or switch.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logical Mesh:&lt;br&gt;
Data can take many paths to reach its destination.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Physical topology shows how a network looks, and logical topology shows how it works. Both together make a network clear, connected, and complete.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Purpose of computer network and more | Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Thu, 30 Oct 2025 17:53:04 +0000</pubDate>
      <link>https://dev.to/israhverse/purpose-of-computer-network-and-more-israh-binoj-5afg</link>
      <guid>https://dev.to/israhverse/purpose-of-computer-network-and-more-israh-binoj-5afg</guid>
      <description>&lt;p&gt;Purpose of computer network protocols&lt;/p&gt;

&lt;p&gt;Computer network protocols are sets of rules that define how data is transmitted and communicated over a network. They ensure that data is exchanged efficiently, accurately, and securely between computers and devices.&lt;/p&gt;

&lt;p&gt;Physical protocol&lt;/p&gt;

&lt;p&gt;A physical protocol defines the actual physical rules for data transmission, including cable type, voltage levels, and signal timing.&lt;br&gt;
Examples: Ethernet, Wi-Fi, USB.&lt;/p&gt;

&lt;p&gt;Logical protocol&lt;/p&gt;

&lt;p&gt;A logical protocol defines the software-based rules for communication between devices. It manages addressing, routing, error detection, and data formatting.&lt;br&gt;
Examples: IP, TCP, UDP, HTTP, HTTPS, FTP.&lt;/p&gt;

&lt;p&gt;OSI model and  layers&lt;/p&gt;

&lt;p&gt;The OSI (Open Systems Interconnection) model is a framework that standardizes how data is transmitted across networks. It has seven layers, each with specific functions for data communication - from physical transmission to user applications. &lt;/p&gt;

&lt;p&gt;Functions of the Presentation Layer in the OSI model?&lt;/p&gt;

&lt;p&gt;The Presentation Layer (Layer 6) translates data between the application and the network. It handles encryption, compression, and data format conversion to ensure compatibility between systems.&lt;/p&gt;

&lt;p&gt;Role of the Transport Layer in the OSI model?&lt;/p&gt;

&lt;p&gt;The Transport Layer (Layer 4) ensures reliable data transfer between devices. It manages error detection, flow control, and segmentation of data.&lt;br&gt;
Examples: TCP, UDP.&lt;/p&gt;

&lt;p&gt;Four layers of the TCP/IP model?&lt;/p&gt;

&lt;p&gt;The TCP/IP model has four layers:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Application Layer - Provides services for applications (web, email).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Transport Layer - Ensures reliable transmission of data.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Internet Layer - Handles routing and addressing of data packets.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network Access Layer - Manages physical transmission over hardware.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Main types of IP addresses?&lt;/p&gt;

&lt;p&gt;Answer:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Public IP - Identifies a device on the internet.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Private IP -Used within a local network.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Static IP - Fixed address that doesn’t change.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Dynamic IP -Assigned automatically and may change over time.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Difference between Half Duplex and Full Duplex communication&lt;/p&gt;

&lt;p&gt;Half Duplex: Communication occurs in both directions but only one device can send data at a time.&lt;/p&gt;

&lt;p&gt;Full Duplex: Both devices can send and receive data simultaneously.&lt;/p&gt;

&lt;p&gt;Ethernet and uses&lt;/p&gt;

&lt;p&gt;Ethernet is a networking technology used to connect devices in a Local Area Network (LAN) using wired connections. It provides high-speed, stable, and secure communication between computers, routers, and switches.&lt;br&gt;
Examples: Fast Ethernet, Gigabit Ethernet.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>How Computer network works | Israh Binoj</title>
      <dc:creator>Israh Binoj</dc:creator>
      <pubDate>Tue, 28 Oct 2025 17:19:15 +0000</pubDate>
      <link>https://dev.to/israhverse/how-computer-network-works-israh-binoj-1adh</link>
      <guid>https://dev.to/israhverse/how-computer-network-works-israh-binoj-1adh</guid>
      <description>&lt;p&gt;Computer Network Protocol&lt;/p&gt;

&lt;p&gt;Computer network protocols are the standard rules that define how data is transmitted and communicated over a network. They ensure that information is exchanged efficiently, accurately, and securely between computers and other devices. Every network follows these rules to enable effective communication.&lt;/p&gt;

&lt;p&gt;Two types of network protocols&lt;/p&gt;

&lt;p&gt;1) A physical protocol defines the actual physical rules for the transmission of data over a network. It specifies details such as the type of cables, voltage levels, signal timing, and data transmission rates. Examples of physical protocols include Ethernet, Wi-Fi, and USB.&lt;/p&gt;

&lt;p&gt;2) A logical protocol defines the rules and procedures for logical communication between devices. It manages the software structure of data transmission rather than the physical structure. The key functions of a logical protocol are addressing and routing, error detection, flow control, and data formatting. Examples include IP, TCP, UDP, HTTP, HTTPS, and FTP.&lt;/p&gt;

&lt;p&gt;OSI model&lt;/p&gt;

&lt;p&gt;The OSI model is a framework that defines how data is transmitted through a network and how communication occurs between different devices. It divides the process of networking into seven layers, which helps organize and standardize communication across various systems and technologies. Each layer has a specific function that contributes to the successful transmission of data.&lt;/p&gt;

&lt;p&gt;The 7 Layers of the OSI Model&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Application Layer (Layer 7)&lt;br&gt;
This is the topmost layer that provides network services directly to users and applications. It enables activities like web browsing, email, and file transfer.&lt;br&gt;
Examples: HTTP, HTTPS, FTP, SMTP, DNS&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Presentation Layer (Layer 6)&lt;br&gt;
This layer translates data between the application and the network. It handles data encryption, compression, and format conversion to ensure compatibility between systems.&lt;br&gt;
Examples: SSL, TLS, JPEG, MPEG&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Session Layer (Layer 5)&lt;br&gt;
The session layer manages sessions or connections between two devices. It establishes, maintains, and terminates communication sessions.&lt;br&gt;
Examples: NetBIOS, PPTP, RPC&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Transport Layer (Layer 4)&lt;br&gt;
This layer ensures reliable data transfer between devices. It handles error detection, flow control, and data segmentation.&lt;br&gt;
Examples: TCP, UDP&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network Layer (Layer 3)&lt;br&gt;
The network layer is responsible for logical addressing and routing of data packets so they can travel across different networks to reach the destination.&lt;br&gt;
Examples: IP, ICMP, IPsec, Routers&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Data Link Layer (Layer 2)&lt;br&gt;
This layer ensures reliable communication between devices on the same network. It handles framing, physical addressing (MAC), and error detection.&lt;br&gt;
Examples: Ethernet, PPP, Switches&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Physical Layer (Layer 1)&lt;br&gt;
The physical layer deals with the actual transmission of raw data bits over a physical medium, such as cables, switches, and radio signals. It defines hardware specifications like voltage, data rate, and cable type.&lt;br&gt;
Examples: Ethernet cables, Wi-Fi, Bluetooth, Hubs&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;TCP/IP model&lt;/p&gt;

&lt;p&gt;The TCP/IP model is a framework that is also known as the simplified version of the OSI model. It focuses on practical data communication over the internet. The model consists of four layers, each performing different functions, and they all work together to make network communication efficient and reliable.&lt;/p&gt;

&lt;p&gt;The 4 Layers of the TCP/IP Model&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Application Layer: Provides services for applications such as email, file transfer, and web browsing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Transport Layer: Ensures the reliable transmission of data between devices.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Internet Layer: Handles the routing of data packets and manages logical addressing.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Network Access Layer: Manages the physical transmission of data over hardware like cables and network interfaces.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;IP Address&lt;br&gt;
An IP address is a unique number assigned to every device connected to the internet that uses the Internet Protocol for communication. It acts as an identifier for a device and ensures that the data sent reaches the correct destination.&lt;/p&gt;

&lt;p&gt;There are four main types of IP addresses:&lt;/p&gt;

&lt;p&gt;Public IP: Used to identify a device on the internet.&lt;/p&gt;

&lt;p&gt;Private IP: Used within a local or internal network.&lt;/p&gt;

&lt;p&gt;Static IP: A fixed address that does not change.&lt;/p&gt;

&lt;p&gt;Dynamic IP: Assigned automatically and may change over time.&lt;/p&gt;

&lt;p&gt;Duplex communication&lt;/p&gt;

&lt;p&gt;Duplex communication refers to the way data is transmitted between two devices. It defines whether communication happens in one direction or in both directions.&lt;/p&gt;

&lt;p&gt;Half Duplex: Two-way communication, but only one device can send data at a time.&lt;/p&gt;

&lt;p&gt;Full Duplex: Two-way communication that allows both devices to send and receive data simultaneously.&lt;/p&gt;

&lt;p&gt;Ethernet&lt;/p&gt;

&lt;p&gt;Ethernet is a technology used to connect computers and other devices in a Local Area Network (LAN). It defines how data is transmitted over a wired network between devices such as computers, routers, and switches.&lt;/p&gt;

&lt;p&gt;Ethernet provides high-speed, stable, and secure data transmission, allowing multiple devices to communicate efficiently within a local area.&lt;/p&gt;

&lt;p&gt;Examples: Ethernet, Fast Ethernet, Gigabit Ethernet, etc.&lt;/p&gt;

</description>
      <category>beginners</category>
      <category>computerscience</category>
      <category>networking</category>
    </item>
  </channel>
</rss>
