The Zurich release has arrived! Interested in new features and functionalities? Click here for more

Linking Computer Network Devices to CMDB Classes in ServiceNow

SrikrishnaB5625
Tera Expert

Nodes:

Nodes are devices that are connected to a network.

Protocol: 

A protocol is a set of rules and standards that govern how data is transmitted over a network. Examples of protocols include TCP/IP, HTTP, and FTP.

Topology: 

Network topology refers to the physical and logical arrangement of nodes on a network. The common network topologies include bus, star, ring, mesh, and tree.

IP Address:

An IP address is a unique numerical identifier identifies a device globally on the internet. Internet service providers (ISPs) typically assign IP addresses to devices that connect to the internet.

IPv4 address is 32 bits, hence, we have 232 IP addresses available. The length of an IPv6 address is 128 bits. “Ipconfig”

Mac Address:

A MAC address identifies a device locally on a network. The manufacturer of the device's network interface controller (NIC) provides the MAC address.

 “ipconfig/all”

Service Provider Networks:

These types of Networks give permission to take Network Capacity and Functionality on lease from the Provider.

Internet service provider: Data retrieved in mobiles from internet

DNS: 

The Domain Name System (DNS) is a protocol that is used to translate human-readable domain names (such as www.google.com) into IP addresses that computers can understand.

Open system: 

A system that is connected to the network and is ready for communication. 

Closed system: 

A system that is not connected to the network and can’t be communicated with.

Access Point:

An access point in networking is a device that allows wireless devices, like smartphones and laptops, to connect to a wired network.

Modems :

Modems is also known as modulator/demodulator is a network device that is used to convert  into analog signal of different frequencies and transmits these signal to a modem at the receiving location.

A modem connects your network to the internet by converting data between digital signals (used by devices) and analog signals (used by the internet provider).

Firewall:

A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predefined security rules. It acts as a barrier between a trusted internal network and untrusted external networks like the internet. - It is both virtual and physical.

Repeater

repeater operates at the physical layer. Its main function is to amplify (i.e., regenerate) the signal over the same network before the signal becomes too weak or corrupted to extend the length to which the signal can be transmitted over the same network. 

Hub

hub sends data to all connected devices, which can slow down the network. - physical layer - broadcasting

hub is a multiport repeater. A hub connects multiple wires coming from different branches, for example, the connector in star topology - active, passive  and intelligent.

Bridge

bridge operates at the data link layer. A bridge is a repeater, with add on the functionality of filtering content by reading the MAC addresses of the source and destination. It is also used for interconnecting two LANs working on the same protocol. - Transparent and source routing bridges.

Switch

A switch sends data only to the specific device that needs it based on MAC address.

switch is a multiport bridge with a buffer and a design that can boost its efficiency(a large number of ports imply less traffic) and performance. 

A switch is a data link layer device. The switch can perform error checking before forwarding data, which makes it very efficient as it does not forward packets that have errors and forward good packets selectively to the correct port only. 

Router

router is a device like a switch that routes data packets based on their IP addresses. The router is mainly a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing table based on which they make decisions on routing the data packets.

Gateway

gateway, as the name suggests, is a passage to connect two networks that may work upon different networking models. Gateways are also called protocol converters and can operate at any network layer.

Brouter

both bridge and router. It can work either at the data link layer or a network layer. Working as a router, it is capable of routing packets across networks and working as the bridge

Network interface

A network interface is what your OS uses to send and receive data over a network — it could be physical (via NIC) or virtual.

NIC

NIC or network interface card is a network adapter that is used to connect the computer to the network.

Port:

Port is a logical address of a 16-bit unsigned integer that is allotted to every application on the computer that uses the internet to send or receive data.

subnet mask

A subnet mask is used in IP addressing to divide the network into sub-networks, or subnets. It helps determine which portion of an IP address is the network address and which part is the host address.

NAT (Network Address Translation)?

NAT is a method used by routers to translate private IP addresses within a local network to a public IP address before sending data over the internet. This helps to conserve IP addresses and add a layer of security by hiding internal network addresses.

Virtual Machine instance

A Virtual Machine instance is a virtualized computer that runs within a host system, enabling users to operate multiple isolated operating systems on a single physical machine.

 

 

Network gear, server, load balancer

 

Ssh, Wmi, snap, powershelgl, cim, vm appliance

 

 

 

 

What is OSI Model? – Layers of OSI Model

The OSI (Open Systems Interconnection) Model is a set of rules that explains how different computer systems communicate over a network. OSI Model was developed by the International Organization for Standardization (ISO)

Physical Layer

Physical Layer is responsible for transmitting individual bits from one node to the next. - Hub, repeater, Modem, cables

Bit Synchronization:  by providing a clock. Bit Rate Control

Physical Topologies: how the different, devices/nodes are arranged in a network i.e. bus topologystar topology, or mesh topology.

Transmission Mode:  how the data flows between the two connected devices I.e  Simplex, half-duplex and full duplex. Half data transfer not at a time.

 

Data Link Layer (DLL)

The data link layer is responsible for the node-to-node delivery of the message. Ensures data transfer is error-free.

The Data Link Layer is divided into two sublayers:

The packet received from the Network layer is further divided into frames depending on the frame size of the NIC (Network Interface Card). DLL also encapsulates Sender and Receiver’s MAC address in the header.

The Receiver’s MAC address is obtained by placing an ARP (Address Resolution Protocol) request onto the wire asking, “Who has that IP address?” and the destination host will reply with its MAC address.

Framing: attaching special bit patterns to the beginning and end of the frame.

Physical Addressing: MAC addresses of the sender and/or receiver in the header of each frame.

Error Control. Flow Control. Access Control:  control over the channel at a given time.

 

 Network Layer

The network layer works for the transmission of data from one host to the other located in different networks. packet routing. The sender and receiver’s IP address are placed in the header by the network layer. Segment in the Network layer is referred to as Packet.-routers and switches.

Routing. Logical Addressing.

 

Transport Layer

Data is in Segments. It is responsible for the end-to-end delivery of the complete message. Protocols used in Transport Layer are TCPUDP NetBIOSPPTP. At the sender’s side, the transport layer receives the formatted data from the upper layers, performs Segmentation, and also implements Flow and error control to ensure proper data transmission. It also adds Source and Destination port number in its header and forwards the segmented data to the Network Layer.

At the Receiver’s side, Transport Layer reads the port number from its header and forwards the Data which it has received to the respective application. It also performs sequencing and reassembling of the segmented data.

Segmentation and Reassembly. Service Point Addressing.

Services Provided by Transport Layer

Connection oriented - Tcp

Connectionless oriented - Udp

 

Session Layer

It  provides authentication and security. Protocols used in the Session Layer are NetBIOS, PPTP. Connection establishment.

Session Establishment, Maintenance, and Termination. Synchronization: This layer allows a process to add checkpoints

Dialog Controller: The session layer allows two systems to start communication with each other in half-duplex or full duplex.

 

Presentation Layer

The presentation layer is also called the Translation layer. The data from the application layer is extracted here and manipulated as per the required format to transmit over the network. Protocols used in the Presentation Layer are JPEGMPEGGIFTLS/SSL, etc.

Translation: For example, ASCII to EBCDIC.

Encryption/ Decryption: The encrypted data is known as the ciphertext, and the decrypted data is known as plain text. A key value is used for encrypting as well as decrypting data.

Compression: Reduces the number of bits that need to be transmitted on the network.

 

Application Layer

This layer also serves as a window for the application services to access the network and for displaying the received information to the user. Protocols used in the Application layer are SMTPFTPDNS, etc.

Network Virtual Terminal (NVT): It allows a user to log on to a remote host.

 

PROTOCOLS:

  • Transmission Control Protocol/Internet Protocol (TCP/IP):TCP Ensures data is delivered reliably and in order and IP routes data packets to their destination based on IP addresses.
  • UDP (User Datagram Protocol): A connectionless protocol that does not guarantee delivery or order. It is used for applications where speed is more important than reliability, like streaming and gaming.
  • Hypertext Transfer Protocol (HTTP) and HTTPS: transmitting web pages.  HTTPS secured communication using SSL/TLS encryption.
  • Simple Mail Transfer Protocol (SMTP):  SMTP protocol works with other protocols like POP3 and IMAP for email retrieval.
  • File Transfer Protocol (FTP): 
  • Dynamic Host Configuration Protocol (DHCP): DHCP protocol automatically assigns IP addresses to devices on a network.
  • Domain Name System (DNS): DNS Translates human-friendly domain names into IP addresses. Ensures seamless navigation on the internet.
  • ARP: ARP stands for Address Resolution Protocol. It is used to convert an IP address to its corresponding physical address(i.e., MAC Address). ARP is used by the Data Link Layer to identify the MAC address of the Receiver’s machine. 
  • RARP: RARP stands for Reverse Address Resolution Protocol. As the name suggests, it provides the IP address of the device given a physical address as input. But RARP has become obsolete since the time DHCP has come into the picture.

 

 

Circuit Switching  dedicated communication path is established for the entire communication session. Traditional telephone networks (PSTN).

Message Switching entire message is sent to an intermediate node, stored, and forwarded until it reaches the destination.Email systems.q

Packet Switching data is divided into packets that are routed independently to the destination.  The Internet (TCP/IP).

 

large networks (Class A), medium-sized networks (Class B), small networks (Class C), multicasting (Class D), and experimental use (Class E); 

 

1 REPLY 1

Mark Manders
Mega Patron

You are posting this in the question part of the ServiceNow Community. What is the purpose of this post? I see a lot of definitions, but no question or anything related to ServiceNow.


Please mark any helpful or correct solutions as such. That helps others find their solutions.
Mark