SlideShare une entreprise Scribd logo
1  sur  39
Communication PIC-Microcontroller Lab
         Course by JAOM Center, Feb. 2013




Introduction to Networking




               Instructor:
              Mohsen Sarakbi
Definition of Networking
 A network is nothing more
  than two or more computers
  connected to each other so that
  they can exchange information,
  such as e-mail messages or
  documents, or share resources,
  such as disk storage or printers.

 In most cases, this connection
  is made via electrical cables that
  carry the information in the
  form of electrical signals. Or by
  radio signals (wireless
  connection).
Why use a Network?

 Specifically, networks are about sharing three things:
  1. Information (Files)
  2. Resources (Printers)
  3. Applications (Server – Clients)
Network Classifications

 Local Area Network (LAN)
 Metropolitan Area Network (MAN)
 Wide Area Network (WAN)


 Concept:
   Area covered.
   Number of devices attached.
Network Topology

 A topology refers to the manner in which the cable is run to
  individual workstations on the network.
Types of topologies:
   Bus
   Star (Hub)
   Ring
Peer-to-Peer Networks
 A peer-to-peer network is a network
  where the computers act as both
  workstations and servers.
 great for small, simple, and
  inexpensive networks.
 In a strict peer-to-peer networking
  setup, every computer is an equal, a
  peer in the network.
 Each machine can have resources that
  are shared with any other machine.
Client and Server
 The terms "client" and "server" are
  used to describe individual computers
  that are part of a network where
  computing resources and workload are
  shared.

 A server is a computer that makes its
  resources available to the network and
  responds to the commands of a client.
  The server’s shared resources can be
  files (a file server); printers (a print
  server); processing power (an
  application server); etc…

 A client is a computer that uses the
  resources made available by a server.
Client and Server
Network Components

 Physical Media (Cables)
 Interconnecting Devices (NIC, HUB, Switches, Routers ..)
 Computers (Client - Server)
 Networking Software (TCP/IP)
 Applications (Email, web browsing, Chat, VoIP ..)
Computer Networking Models
       Models, also called protocol stacks, represented in layers, help to
         understand where things go right or wrong.
                                     OSI 7-layer model
                                 7       Application

                                 6      Presentation

                                 5        Session

                                 4       Transport

                                 3        Network

OSI                              2          Data
(Open Systems Interconnection)
                                 1        Physical
Computer Networking Models




     All People Seem To Need Data Processing
Protocols

 Protocols are sets of rules.
   What do you want to do? (Application)
   Where are you going? (Addressing)
   How do you get there? (Media types)
   Did you get there? (Acknowledgments, Error checking)
Physical Layer           (Layer 1)



 Electrical current
 Hub
 No addressing

 Nowadays: Pretty much just Cat 5 (or Cat 5e or Cat6)
  twisted pair copper wire and microwave (wireless).
   Twists in wire keep down interference
   Standard connecter: RJ45.
 Fiber (multi-mode or single-mode) coaxial copper (thick- and
  thin-net), Cable Modem, plain phone (DSL), microwaves (wireless
  Ethernet), etc.
Physical Layer              (Layer 1)

 Coaxial Cable
   Thinnet
   Thicknet
   Coax transmits at 10 Mbps..
 Twisted Pair.
   Shielded Twisted Pair (STP). STP
   Unshielded Twisted Pair (UTP). UTP is used in Ethernet networks (Cat5
    (100Mbps) or Cat6 (1000Mbps))
   Transmission rates vary between 10-100-1000-10000 Mbps.
 Fiber-Optic Cable.
   More distance
   More capacity
   More cost
Cabling
UTP
Wireless   (Layer 1)


  Terms: 802.11a/b/g/n
  Uses microwave radio waves in the 2.4Ghz (802.11b
   and g) and 5.4Ghz (802.11a and n) bands to transmit
   data.
  These are unregulated frequencies, so other things
   (cordless phones, Bluetooth, etc.) can use the same
   frequencies, but hopefully one or the other is smart
   enough to hop frequencies to stay clear of the other.
  802.11b at 11Mbps, both 802.11a/g claim 54Mbps.
Data Link Layer     (Layer 2)




    Ethernet!
    Addressing by MAC Address
    Framing
    Error detection
    Bridge or Switch
Ethernet IEEE 802.3
 Ethernet is a popular, relatively inexpensive, easy-to-install LAN architecture
   with the following characteristics:
      Uses the CSMA/CD media access control.
      Data transmission normally occurs at 100Mbps or 1000 Mbps
      Typically implemented in a star topology
      Ethernet LANs use Twisted Pair cables

 An Ethernet LAN is often described in terms of three parameters: transmission
   rate, transmission type, and segment distance or cable type.
    "100baseT" means:
      100 - transmission rate or through put of 100Mbps
      base - transmission type is baseband rather than broadband network (i.e., the signal is
       placed directly on the cable, one signal at a time)
      T – the cable type (e.g. Twisted pair)
 Few types of Ethernet: 10Base2, 10Base5, 10BaseT and 10BaseF, 100BaseT,
   100BaseF, etc..
Ethernet Addressing
        Since there can be many users on an Ethernet network, everyone has to
         have their own unique address.

        This is called the Media Access Control (or MAC) address, or sometimes
         Ethernet address, physical address, adaptor address, hardware address, etc.
        It’s a 12-digit (48 bit) hexadecimal address that is unique to that Ethernet
         adaptor and no other in the world.
           It can be written as 00:30:65:83:fc:0a or 0030.6583.fc0a or 003065:83fc0a or
            00-30-65-83-fc-0a
        The first 6 digits are the Vendor code, (003065 belongs to Apple), the last
         6 are the individual interface's own.
        How to get MAC address? CMD/IPconfig, Adapter properties

 Check your MAC address!
Ethernet Frame
Hub vs. Switch
    Hubs are shared media devices. Everyone sees everyone’s packets, you’re
     only supposed to pay attention to those specifically directed to you, or to
     broadcasts. Not too secure, but cheap.

    Switches aren’t shared, most of the time. The switch pays attention to the
     packets and makes a list of the “sender” Ethernet addresses and makes a
     table (it removes old data after a while). When a packet comes along whose
     destination address is in the table, the packet only goes to that port.
     Unknown packets and broadcasts still go to all ports, but overall, there are
     nearly no collisions and is generally more secure.
Network Layer         (Layer 3)




    IP Address & Subnet Mask
    Packets
    Routing
    Routers


  Network packets can be routed. This means they can be
     passed from one local network to another.

  Network Layer Protocols: Internet Protocol (IP)
IP Addressing                    (Layer 3)

        The Internet Protocol (IP) is the Network layer protocol used on the
         Internet.

        ARP: Address Resolution Protocol. Turns an IP number into an Ethernet
         number, very important
           You ask “Who’s 172.19.4.15” and if you get a reply, associate the Ethernet
            address with the IP address in your ARP table.

        IP addresses consists of 32 bits in decimal such as: 171.64.20.23
        Each “octet, 8bits” consists of numbers between 0 and 255

        Network address, Broadcast address, Subnet Mask and host IP address.

        IP Classes: A, B, C, D & E
        Privet IP vs. Public IP
IP Addressing                 (Layer 3)


  Example:

 IP address 192.168.70.130 / 24

 Subnet Mask: 255.255.255.0
 Network Address: 192.168.70.0
 Broadcast Address: 192.168.70.255

 Key: Network bits & host bits!

 Quiz: 192.168.101.207 / 29
Port number        (Layer 3)


  Security and specify exact application
  Form: IP : Port
   In computer networking, a port number is part of the
       addressing information used to identify the senders
       and receivers of messages.

      HTTP: 80
      HTTPS: 8080 or 443
      FTP: 20/21
      POP3: 110
      Telnet: 23
      VPN: 1723
Port number   (Layer 3)
Domain Name Resolution (DNS)
  Since most people find it easier to remember names instead of
    numbers, IP numbers can and almost always are associated
    with names.

  DNS exists to translate IPs to names

 Example:
 Any web site.
Routing. “How do you get there from here?”

  You can put an IP (Network layer) packet inside of an
   Ethernet (data layer) packet, but a Router got to pass it along
  Router makes routing table
  If you want to talk to someone outside your local network,
   you’ll send that Ethernet packet to your router’s Ethernet
   address
  Default Gateway
Switch vs. Router

  Addressing

  Broadcast domain

  Processing Speed
Network Devices
Network Devices
DHCP (Dynamic Host Configuration Protocol)

  s a network protocol that enables a server to automatically
    assign an IP address to a computer from a defined range of
    numbers (i.e., a scope) configured for a given network

  Relates IP – Names addressing automatically

  DHCP assignment can be reserved for a device by reserve the
    IP address to the MAC address of that device

  Reserved DHCP
Encapsulation
 This is called “encapsulation” and is why a layered model is so handy.
VPN
 A Virtual Private Network (VPN) extends a private network and the
  resources contained in the network across public networks like the Internet.
 It enables a host computer to send and receive data across shared or public
  networks as if it were a private network with all the functionality, security and
  management policies of the private network.
 This is done by establishing a virtual point-to-point connection through the use
  of dedicated connections, encryption, or a combination of the two.

 The VPN connection across the Internet is technically a wide area
   network (WAN) link between the sites but appears to the user as a private
   network link—hence the name “virtual private network”.
VPN
VPN

 No QoS


 Protocols:
   Layer 2Tunneling Protocol (L2TP)
   IP security (IPSec)
   Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
   Point-To-Point Tunneling Protocol (PPTP)
Lab
 IPconfig
     Check IP
     Check Default network
   Build a LAN
   Share files
   Router GUI (DHCP, NAT, FILTER, ACL, ..)
   Check public IP and Rout thru internet
   Create a VPN connection
       VPN Server & Client
       Use different internet access
       Check IPs on both
       Set as home network/ Firewall options
       Share files!
Introduction to networking

Contenu connexe

Tendances

Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Subnetting
SubnettingSubnetting
Subnettingswascher
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Sachii Dosti
 
Network media (cable)
Network media (cable)Network media (cable)
Network media (cable)Leah Gonzales
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing NetworksDsunte Wilson
 
Network cable
Network cableNetwork cable
Network cableFrya Lora
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 
UTP Cable Standards and Their Usage in Networks
UTP Cable Standards and Their Usage in NetworksUTP Cable Standards and Their Usage in Networks
UTP Cable Standards and Their Usage in Networksreminiscentwand90
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentationmuhammad amir
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentationbcdran
 

Tendances (20)

Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Subnetting
SubnettingSubnetting
Subnetting
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1Network Fundamentals – Chapter 1
Network Fundamentals – Chapter 1
 
Network media (cable)
Network media (cable)Network media (cable)
Network media (cable)
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA ppt
CCNA pptCCNA ppt
CCNA ppt
 
The Basics of Computer Networking
The Basics of Computer NetworkingThe Basics of Computer Networking
The Basics of Computer Networking
 
CCNA Introducing Networks
CCNA Introducing NetworksCCNA Introducing Networks
CCNA Introducing Networks
 
Network cable
Network cableNetwork cable
Network cable
 
Packet tracer
Packet tracerPacket tracer
Packet tracer
 
01. network topologies & cable
01. network topologies & cable01. network topologies & cable
01. network topologies & cable
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
UTP Cable Standards and Their Usage in Networks
UTP Cable Standards and Their Usage in NetworksUTP Cable Standards and Their Usage in Networks
UTP Cable Standards and Their Usage in Networks
 
Ip address presentation
Ip address presentationIp address presentation
Ip address presentation
 
IP address
IP addressIP address
IP address
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Ccna Presentation
Ccna PresentationCcna Presentation
Ccna Presentation
 

Similaire à Introduction to networking

Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of NetworkingIsrael Marcus
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)Sri Prasanna
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo Network Technologies
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworkingMd. Mashiur Rahman
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1Sujee Antony
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxEric Vyncke
 
Intro net 91407
Intro net 91407Intro net 91407
Intro net 91407Anuja Lad
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networkingisma ishak
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyAvishek Maitra
 

Similaire à Introduction to networking (20)

Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
LAN
LANLAN
LAN
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
Networks (Distributed computing)
Networks (Distributed computing)Networks (Distributed computing)
Networks (Distributed computing)
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Cisco doc
Cisco docCisco doc
Cisco doc
 
Lecture 1 networking & internetworking
Lecture 1 networking & internetworkingLecture 1 networking & internetworking
Lecture 1 networking & internetworking
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
CCNA
CCNACCNA
CCNA
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Intro net 91407
Intro net 91407Intro net 91407
Intro net 91407
 
IMD 251 - Networking
IMD 251 - NetworkingIMD 251 - Networking
IMD 251 - Networking
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyyNetworrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
Networrrrrrrrkkkk secuiiirtyyyyyyyyyyyyyyyyyyyy
 

Plus de Mohsen Sarakbi

Plus de Mohsen Sarakbi (7)

ZigBee module
ZigBee moduleZigBee module
ZigBee module
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
GSM Module
GSM ModuleGSM Module
GSM Module
 
Bluetooth Module
Bluetooth ModuleBluetooth Module
Bluetooth Module
 
RF module
RF moduleRF module
RF module
 
PIC microcontroller review
PIC microcontroller reviewPIC microcontroller review
PIC microcontroller review
 
Introduction to communication systems
Introduction to communication systemsIntroduction to communication systems
Introduction to communication systems
 

Dernier

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 

Dernier (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Introduction to networking

  • 1. Communication PIC-Microcontroller Lab Course by JAOM Center, Feb. 2013 Introduction to Networking Instructor: Mohsen Sarakbi
  • 2. Definition of Networking  A network is nothing more than two or more computers connected to each other so that they can exchange information, such as e-mail messages or documents, or share resources, such as disk storage or printers.  In most cases, this connection is made via electrical cables that carry the information in the form of electrical signals. Or by radio signals (wireless connection).
  • 3. Why use a Network?  Specifically, networks are about sharing three things: 1. Information (Files) 2. Resources (Printers) 3. Applications (Server – Clients)
  • 4. Network Classifications  Local Area Network (LAN)  Metropolitan Area Network (MAN)  Wide Area Network (WAN)  Concept:  Area covered.  Number of devices attached.
  • 5. Network Topology  A topology refers to the manner in which the cable is run to individual workstations on the network. Types of topologies:  Bus  Star (Hub)  Ring
  • 6. Peer-to-Peer Networks  A peer-to-peer network is a network where the computers act as both workstations and servers.  great for small, simple, and inexpensive networks.  In a strict peer-to-peer networking setup, every computer is an equal, a peer in the network.  Each machine can have resources that are shared with any other machine.
  • 7. Client and Server  The terms "client" and "server" are used to describe individual computers that are part of a network where computing resources and workload are shared.  A server is a computer that makes its resources available to the network and responds to the commands of a client. The server’s shared resources can be files (a file server); printers (a print server); processing power (an application server); etc…  A client is a computer that uses the resources made available by a server.
  • 9. Network Components  Physical Media (Cables)  Interconnecting Devices (NIC, HUB, Switches, Routers ..)  Computers (Client - Server)  Networking Software (TCP/IP)  Applications (Email, web browsing, Chat, VoIP ..)
  • 10. Computer Networking Models  Models, also called protocol stacks, represented in layers, help to understand where things go right or wrong. OSI 7-layer model 7 Application 6 Presentation 5 Session 4 Transport 3 Network OSI 2 Data (Open Systems Interconnection) 1 Physical
  • 11. Computer Networking Models All People Seem To Need Data Processing
  • 12. Protocols  Protocols are sets of rules.  What do you want to do? (Application)  Where are you going? (Addressing)  How do you get there? (Media types)  Did you get there? (Acknowledgments, Error checking)
  • 13. Physical Layer (Layer 1)  Electrical current  Hub  No addressing  Nowadays: Pretty much just Cat 5 (or Cat 5e or Cat6) twisted pair copper wire and microwave (wireless).  Twists in wire keep down interference  Standard connecter: RJ45.  Fiber (multi-mode or single-mode) coaxial copper (thick- and thin-net), Cable Modem, plain phone (DSL), microwaves (wireless Ethernet), etc.
  • 14. Physical Layer (Layer 1)  Coaxial Cable  Thinnet  Thicknet  Coax transmits at 10 Mbps..  Twisted Pair.  Shielded Twisted Pair (STP). STP  Unshielded Twisted Pair (UTP). UTP is used in Ethernet networks (Cat5 (100Mbps) or Cat6 (1000Mbps))  Transmission rates vary between 10-100-1000-10000 Mbps.  Fiber-Optic Cable.  More distance  More capacity  More cost
  • 16. UTP
  • 17. Wireless (Layer 1)  Terms: 802.11a/b/g/n  Uses microwave radio waves in the 2.4Ghz (802.11b and g) and 5.4Ghz (802.11a and n) bands to transmit data.  These are unregulated frequencies, so other things (cordless phones, Bluetooth, etc.) can use the same frequencies, but hopefully one or the other is smart enough to hop frequencies to stay clear of the other.  802.11b at 11Mbps, both 802.11a/g claim 54Mbps.
  • 18. Data Link Layer (Layer 2)  Ethernet!  Addressing by MAC Address  Framing  Error detection  Bridge or Switch
  • 19. Ethernet IEEE 802.3  Ethernet is a popular, relatively inexpensive, easy-to-install LAN architecture with the following characteristics:  Uses the CSMA/CD media access control.  Data transmission normally occurs at 100Mbps or 1000 Mbps  Typically implemented in a star topology  Ethernet LANs use Twisted Pair cables  An Ethernet LAN is often described in terms of three parameters: transmission rate, transmission type, and segment distance or cable type.  "100baseT" means:  100 - transmission rate or through put of 100Mbps  base - transmission type is baseband rather than broadband network (i.e., the signal is placed directly on the cable, one signal at a time)  T – the cable type (e.g. Twisted pair)  Few types of Ethernet: 10Base2, 10Base5, 10BaseT and 10BaseF, 100BaseT, 100BaseF, etc..
  • 20. Ethernet Addressing  Since there can be many users on an Ethernet network, everyone has to have their own unique address.  This is called the Media Access Control (or MAC) address, or sometimes Ethernet address, physical address, adaptor address, hardware address, etc.  It’s a 12-digit (48 bit) hexadecimal address that is unique to that Ethernet adaptor and no other in the world.  It can be written as 00:30:65:83:fc:0a or 0030.6583.fc0a or 003065:83fc0a or 00-30-65-83-fc-0a  The first 6 digits are the Vendor code, (003065 belongs to Apple), the last 6 are the individual interface's own.  How to get MAC address? CMD/IPconfig, Adapter properties Check your MAC address!
  • 22. Hub vs. Switch  Hubs are shared media devices. Everyone sees everyone’s packets, you’re only supposed to pay attention to those specifically directed to you, or to broadcasts. Not too secure, but cheap.  Switches aren’t shared, most of the time. The switch pays attention to the packets and makes a list of the “sender” Ethernet addresses and makes a table (it removes old data after a while). When a packet comes along whose destination address is in the table, the packet only goes to that port. Unknown packets and broadcasts still go to all ports, but overall, there are nearly no collisions and is generally more secure.
  • 23. Network Layer (Layer 3)  IP Address & Subnet Mask  Packets  Routing  Routers  Network packets can be routed. This means they can be passed from one local network to another.  Network Layer Protocols: Internet Protocol (IP)
  • 24. IP Addressing (Layer 3)  The Internet Protocol (IP) is the Network layer protocol used on the Internet.  ARP: Address Resolution Protocol. Turns an IP number into an Ethernet number, very important  You ask “Who’s 172.19.4.15” and if you get a reply, associate the Ethernet address with the IP address in your ARP table.  IP addresses consists of 32 bits in decimal such as: 171.64.20.23  Each “octet, 8bits” consists of numbers between 0 and 255  Network address, Broadcast address, Subnet Mask and host IP address.  IP Classes: A, B, C, D & E  Privet IP vs. Public IP
  • 25. IP Addressing (Layer 3)  Example: IP address 192.168.70.130 / 24 Subnet Mask: 255.255.255.0 Network Address: 192.168.70.0 Broadcast Address: 192.168.70.255 Key: Network bits & host bits! Quiz: 192.168.101.207 / 29
  • 26. Port number (Layer 3)  Security and specify exact application  Form: IP : Port  In computer networking, a port number is part of the addressing information used to identify the senders and receivers of messages.  HTTP: 80  HTTPS: 8080 or 443  FTP: 20/21  POP3: 110  Telnet: 23  VPN: 1723
  • 27. Port number (Layer 3)
  • 28. Domain Name Resolution (DNS)  Since most people find it easier to remember names instead of numbers, IP numbers can and almost always are associated with names.  DNS exists to translate IPs to names Example: Any web site.
  • 29. Routing. “How do you get there from here?”  You can put an IP (Network layer) packet inside of an Ethernet (data layer) packet, but a Router got to pass it along  Router makes routing table  If you want to talk to someone outside your local network, you’ll send that Ethernet packet to your router’s Ethernet address  Default Gateway
  • 30. Switch vs. Router  Addressing  Broadcast domain  Processing Speed
  • 33. DHCP (Dynamic Host Configuration Protocol)  s a network protocol that enables a server to automatically assign an IP address to a computer from a defined range of numbers (i.e., a scope) configured for a given network  Relates IP – Names addressing automatically  DHCP assignment can be reserved for a device by reserve the IP address to the MAC address of that device  Reserved DHCP
  • 34. Encapsulation This is called “encapsulation” and is why a layered model is so handy.
  • 35. VPN  A Virtual Private Network (VPN) extends a private network and the resources contained in the network across public networks like the Internet.  It enables a host computer to send and receive data across shared or public networks as if it were a private network with all the functionality, security and management policies of the private network.  This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two.  The VPN connection across the Internet is technically a wide area network (WAN) link between the sites but appears to the user as a private network link—hence the name “virtual private network”.
  • 36. VPN
  • 37. VPN  No QoS  Protocols:  Layer 2Tunneling Protocol (L2TP)  IP security (IPSec)  Secure Sockets Layer (SSL) and Transport Layer Security (TLS)  Point-To-Point Tunneling Protocol (PPTP)
  • 38. Lab  IPconfig  Check IP  Check Default network  Build a LAN  Share files  Router GUI (DHCP, NAT, FILTER, ACL, ..)  Check public IP and Rout thru internet  Create a VPN connection  VPN Server & Client  Use different internet access  Check IPs on both  Set as home network/ Firewall options  Share files!