SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
1
Basic and Advanced Networking Concepts
Prepared by
Ms. R. Gomathijayam
Assistant Professor
Department of Computer Applications
Bon Secours College for Women
Thanjavur
NETWORK BASICS
• Definition
• Applications
• Networking devices and topology
• Addressing and DNS
• Port and Socket
• Protocol and OSI layers
• Types of networks
2
3
Definition
Collection of computers and devices connected via
communications devices and transmission media
Applications
• Sharing of resources such as printers
• Sharing of expensive software's and database
• Communication from one computer to another
computer
• Exchange of data and information among users
via network
• Sharing of information over geographically wide
areas.
4
Networking Devices
Example: Router, Switch, Hub, Bridge.
Topology
• Bus
• Star
• Mesh
• Ring
• Daisy chain
IPAddress
• Logical or network address of the system across the
network
• Internet Assigned Numbers Authority(IANA)
assigns IPV4 address as unique ID for each device on
the network
Example: 136.102.233.49
Domain Name System (DNS)
• Mnemonic textual addresses are provided to
facilitate the manipulation of internet addresses.
• DNS servers are responsible for translating
mnemonic textual Internet addresses into hard numeric
Internet addresses.
6
Port
• An IP port will identify a specific application running
on an Internet host Machine.
• A port is identified by a number, the port number.
Socket
• Unique combination of IP address and port number
together are termed as socket
Protocols
• Define the rules that govern the communications
between two computers connected to the network.
• Roles: addressing and routing of messages, error
detection and recovery, sequence and flow controls etc.
7
OSI Layers
• Application layer
- applications connected to the network
• Presentation layer
- provides standard data representations for applications
• Session layer
- manages sessions among applications
• Transport layer
- provides end-to-end errors detection and correction
• Network layer
- handles connection to the network by the higher layers
• Data-link layer
- provides safe communication of data over the physical
network
• Physical layer
- defines the physical characteristics of the network
8
Types of networks
Criteria LAN MAN VAN
Ownership Private Private or public Private or public
Geographical area Single building,
schoolsor at home
Large city
(5 to 50 km)
Country-wide
Size Small Larger Largest
Cost Low High Higher
Speed 1000Mbps 1.544Mbps 150Mbps
Transmission
Medium
Twisted pair Twisted pair and
Fiber optic cables
Fiber optic, radio
wave and satellite
Example Network in office Switched
Multimegabit Data
Service
Internet
9
ADVANCED NETWORKING
CONCEPTS
• Subnetting
• Classes
• CISCO
• Routing and VOIP
• Switching and VLAN
• Security
10
Subnetting
• allows us to break a single large network in smaller
networks.
• reduces network traffic by allowing only the broadcast
traffic which is relevant to the subnet.
•improves overall performance of the network by
reducing unnecessary traffic
• increases security of the network by blocking a subnet’
traffic in subnet
• reduces the requirement of IP range.
11
Concept of Classes
S. No. Class Network
Bit
Host
Bit
Range Subnet Wildmask
1 A 8 24 1-126 255.0.0.0 0.255.255.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D Broadcast 224-239
5 E Research 240-255
12
Corps Information System Control Officer
(CISCO)
Cisco Systems is an American multinational technology
company headquartered in San Jose, California, that
designs, manufactures and sells networking equipment.
It provides three certifications
• CCNA – Cisco Certified Network
Associate/Administrator
• CCNP – Cisco Certified Network Professional
• CCIE – Cisco Certified Internetwork Expert
13
Routing
process of selecting a path for traffic in a network, or
between or across multiple networks.
Routing schemes differin how they deliver messages:
• Unicast delivers a message to a single specific node
• Broadcast delivers a message to all nodes in the network
• Multicast delivers a message to a group of nodes that have
expressed interest in receiving the message
• Anycast delivers a message to any one out of a group of nodes,
typically the one nearest to the source
• Geocast delivers a message to a group of nodes based
on geographic location
14
Types of routing
• Static routing
 form of routing that occurs when a router uses
a manually-configured routing entry
routes are manually configured by a network
administrator by adding in entries into a routing
table
• Dynamic routing
networking technique that provides optimal
data routing
enables routers to select paths according to real-
time logical network layout changes
the routing protocol operating on the router is
responsible for the creation, maintenance and
updating of the dynamic routing table.
15
Introduction to VOIP
VOIP is an acronym for Voice Over Internet Protocol, or in
more common terms phone service over the Internet.
 If you have a reasonable quality Internet connection you can
get phone service delivered through your Internet connection
instead of from your local phone company.
Basic idea of VOIP
• Continuously sample audio.
• Convert each sample to digital form.
• Send the resulting digitized stream across an IP network in
packets.
• Convert the stream back to analog for playback.
• Before the procedure above, the system must handle call setup.
• Phone number to IP.
16
Advantages Of VOIP
• Low call costs.
• Low cost of performing moves, ads and changes on a business
VOIP phone system.
• Increased functionality and integration with other IT business
systems.
• Ability to have your land-line phone number follow you
anywhere.
• Low infrastructure costs.
Disadvantages of VOIP
• Loss of service during outages.
• Without power VOIP phones are useless, so in case of
emergencies during power cuts it can be a major disadvantage.
• With VOIP emergency calls, it is hard to locate you and send
help in time.
• Latency and traffic.
• No standard protocol is applicable.
17
Switching
• Process to forward packets coming in from one port to a port
leading towards the destination.
• A communication system may include number of switches and
nodes.
• Switching can be divided into two major categories:
 Connectionless
 Connection Oriented
18
Circuit Switching
• It consists of a set of switches connected by physical links.
• Two nodes communicate with each other over a dedicated communication
path.
• The nodes must make a reservation for the resources to be used during the
communication.
Packet Switching
• Messages are divided into packets of fixed or variable size.
• The size of packet is decided by the network and the governing protocol.
• The resource allocation is doneon first-come, first-served basis.
• Each switching node has a small amount of buffer space to hold packets
temporarily.
• If the outgoing line is busy, the packet stays in queue until the line becomes
available.
Message Switching
• Each message is routed independentlythrough the network.
• Each message carries a header that contains the full information about the
destination.
• Each intermediatedevice receives the whole message and buffers it until
there are resources available to transfer it to the next hop.
• Message switching is sometimes called as Store and ForwardSwitching.
19
Virtual Local Area Network (VLAN)
• It is a smart device
• It divides switch into multiple parts in order to
maintain security.
Per- VLAN Spanning Tree
• Per-VLAN Spanning Tree (PVST) maintains a
spanning tree instance for each VLAN configured in the
network.
• It uses ISL Trunking and allows a VLAN trunk to be
forwarding for some VLANs while blocking for other
VLANs.
• It has the ability to load balance traffic (at layer-2) by
forwarding some VLANs on one trunk and other
VLANs on another trunk without causing a Spanning
Tree loop.
20
Security
It is the network device protection in order to secure
our network with help of CCNA technology
Types of Security
• Access Control List
It is type of security in which we filter
inbound and outbound traffic
Types of ACL
• Standard ACL
It is a type of ACL in which we block all the
protocols in our network
• Extended ACL
It is a type of ACL in which we block a
particular protocol as well as particular IP
21
Virtual Terminal Type (VTY)
• It is protocol used for remotely connection with other
connection.
Virtual Private Network (VPN)
• VPN is a technology that creates an encrypted
connection over a less secure network.
• In this basically TUNNEL is made to keep data secure
through which only source and destination clients can
get the data.
Network Address Translator
• It is type of security in which we convert our private
address into public address.
• It is a part of ethical hacking in which there is use of
fake IP.
22
Types of NAT
• Static NAT
It is a type of NAT in which the client will fetch
only single fake IP every time.
• Dynamic NAT
It is a type of security in which we create a pool
of fake IP’s, because of which the user will
receive a different fake IP every time within the
range of given IP pool.
• Overload / NATPAD
It means that the single public IP assigned to
your router can be used by multiple internal hosts
concurrently. This is done by translating source
UDP/TCP ports in the packets and keeping track
of them within the translation table kept in the
router .
23
Ad Hoc Network
• Network that is composed of individual devices
communicating with each other directly. The term
implies spontaneous or impromptu construction because
these networks often bypass the gatekeeping hardware
or central access point such as a router.
•Many ad hoc networks are local area networks where
computers or other devices are enabled to send data
directly to one another rather than going through a
centralized access point.
24
Mobile Adhoc Network (MANET)
• Wireless adhoc network or adhoc wireless network
that usually has a routable networking environment on
top of a Link Layer ad hoc network.
• They consist of set of mobile nodes connected
wirelessly in a self configured, self healing network
without having a fixed infrastructure.
• MANET nodes are free to move randomly as the
network topology changes frequently. Each node behave
as a router as they forward traffic to other specified
node in the network.
25
Characteristics of MANET
• Dynamic Topologies
• Bandwidth constrained, variable capacity links
• Autonomous Behavior
• Energy Constrained Operation
• Limited Security
• Less Human Intervention
26
Pros and Cons of MANET
Pros
• Separation from central network administration.
• Each nodes can play both the roles ie. of router and
host showing autonomous nature.
• Self configuring and self healing nodes, does not
require human intervention.
Cons:
• Resources are limited due to various constraints like
noise, interference conditions, etc.
• Lack of authorization facilities.
• More prone to attacks due to limited physical security.
27
Vehicular Ad-Hoc Network (VANET)
• Vehicular ad hoc network, consisting of a network of
vehicles, moving at a relatively high speed, that
communicate among themselves with different
purposes, being the main purpose that of improving
security on the road.
• VANET turns every participating car into a wireless
router or node, allowing cars approximately 100 to
300 meters of each other to connect and, in turn, create
a network with a wide range.
• As cars fall out of the signal range and drop out of
the network, other cars can join in, connecting
vehicles to one another so that a mobile Internet is
created.
28
Wi-Fi (Wireless Fidelity)
• Wi-Fi is the name of a popular wireless networking
technology that uses radio waves to provide wireless
high-speed Internet and network connections.
The Wi-Fi Alliance
• Organization that owns the Wi-Fi registered trademark
term specifically defines Wi-Fi as any "wireless local
area network (WLAN) products that are based on the
IEEE 802.11 standards.“
• The Wi-Fi Alliance has expanded the generic use of
the Wi-Fi term to include any type of network
or WLAN product based on any of the 802.11 standards,
including 802.11b, 802.11a, dual-band and so on, in an
attempt to stop confusion about wireless LAN
interoperability.
29
Li-Fi
• LiFi is a wireless optical networking technology that
uses light-emitting diodes for data transmission.
• LiFi is designed to use LED light bulbs similar to
those currently in use in many energy-conscious homes
and offices.
• LiFi bulbs are outfitted with a chip that modulates the
light imperceptibly for optical data transmission. LiFi
data is transmitted by the LED bulbs and received by
photoreceptors.
• LiFi's early developmental models were capable of
150 Mbps. In the lab, with stronger LEDs and different
technology, researchers have enabled 10 Gbps.
30
Benefits of LiFi
• Higher speeds than Wi-Fi.
• 10000 times the frequency spectrum of
radio.
• More secure because data cannot be
intercepted without a clear line of sight.
• Prevents piggybacking.
• Eliminates neighboring network
interference.
• Unimpeded by radio interference.
• Does not create interference in sensitive
electronics, making it better for use in
environments like hospitals and aircraft.

Contenu connexe

Tendances (20)

MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Mobile Computing UNIT-8
Mobile Computing UNIT-8Mobile Computing UNIT-8
Mobile Computing UNIT-8
 
Network devices
Network devicesNetwork devices
Network devices
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Computer networks
Computer networksComputer networks
Computer networks
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Client server system and remote connectivity
Client server system and remote connectivityClient server system and remote connectivity
Client server system and remote connectivity
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
Chapter13
Chapter13Chapter13
Chapter13
 
Chapter10
Chapter10Chapter10
Chapter10
 
Unit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocolUnit iii - mobile ip and wireless access protocol
Unit iii - mobile ip and wireless access protocol
 
Point to point.48
Point to point.48Point to point.48
Point to point.48
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
Networking
NetworkingNetworking
Networking
 
Topic 4.0 wireless technology
Topic 4.0 wireless technologyTopic 4.0 wireless technology
Topic 4.0 wireless technology
 
Voice and Data Delivery Networks
Voice and Data Delivery NetworksVoice and Data Delivery Networks
Voice and Data Delivery Networks
 

Similaire à Network Concepts

Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111abenimelos
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111abenimelos
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devicesRaveena kumari
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALLMoin Islam
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 

Similaire à Network Concepts (20)

Vision
VisionVision
Vision
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Networks
NetworksNetworks
Networks
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Computer networks
Computer networksComputer networks
Computer networks
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Week 3
Week 3Week 3
Week 3
 
Lesson 3 - Networking
Lesson 3 - NetworkingLesson 3 - Networking
Lesson 3 - Networking
 
Networking
Networking Networking
Networking
 
Networking and internetworking devices
Networking and internetworking devicesNetworking and internetworking devices
Networking and internetworking devices
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Case mis ch06
Case mis ch06Case mis ch06
Case mis ch06
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 

Plus de Rajamanickam Gomathijayam (9)

Computer Application in Business
Computer Application in BusinessComputer Application in Business
Computer Application in Business
 
Sololearn cert
Sololearn certSololearn cert
Sololearn cert
 
Uml ppt
Uml pptUml ppt
Uml ppt
 
Coding for php with mysql
Coding for php with mysqlCoding for php with mysql
Coding for php with mysql
 
Php with mysql ppt
Php with mysql pptPhp with mysql ppt
Php with mysql ppt
 
Corel Draw Introduction
Corel Draw IntroductionCorel Draw Introduction
Corel Draw Introduction
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Introducction to Algorithm
Introducction to AlgorithmIntroducction to Algorithm
Introducction to Algorithm
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 

Dernier

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Delhi Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 

Dernier (20)

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 

Network Concepts

  • 1. 1 Basic and Advanced Networking Concepts Prepared by Ms. R. Gomathijayam Assistant Professor Department of Computer Applications Bon Secours College for Women Thanjavur
  • 2. NETWORK BASICS • Definition • Applications • Networking devices and topology • Addressing and DNS • Port and Socket • Protocol and OSI layers • Types of networks 2
  • 3. 3 Definition Collection of computers and devices connected via communications devices and transmission media Applications • Sharing of resources such as printers • Sharing of expensive software's and database • Communication from one computer to another computer • Exchange of data and information among users via network • Sharing of information over geographically wide areas.
  • 4. 4 Networking Devices Example: Router, Switch, Hub, Bridge. Topology • Bus • Star • Mesh • Ring • Daisy chain
  • 5. IPAddress • Logical or network address of the system across the network • Internet Assigned Numbers Authority(IANA) assigns IPV4 address as unique ID for each device on the network Example: 136.102.233.49 Domain Name System (DNS) • Mnemonic textual addresses are provided to facilitate the manipulation of internet addresses. • DNS servers are responsible for translating mnemonic textual Internet addresses into hard numeric Internet addresses.
  • 6. 6 Port • An IP port will identify a specific application running on an Internet host Machine. • A port is identified by a number, the port number. Socket • Unique combination of IP address and port number together are termed as socket Protocols • Define the rules that govern the communications between two computers connected to the network. • Roles: addressing and routing of messages, error detection and recovery, sequence and flow controls etc.
  • 7. 7 OSI Layers • Application layer - applications connected to the network • Presentation layer - provides standard data representations for applications • Session layer - manages sessions among applications • Transport layer - provides end-to-end errors detection and correction • Network layer - handles connection to the network by the higher layers • Data-link layer - provides safe communication of data over the physical network • Physical layer - defines the physical characteristics of the network
  • 8. 8 Types of networks Criteria LAN MAN VAN Ownership Private Private or public Private or public Geographical area Single building, schoolsor at home Large city (5 to 50 km) Country-wide Size Small Larger Largest Cost Low High Higher Speed 1000Mbps 1.544Mbps 150Mbps Transmission Medium Twisted pair Twisted pair and Fiber optic cables Fiber optic, radio wave and satellite Example Network in office Switched Multimegabit Data Service Internet
  • 9. 9 ADVANCED NETWORKING CONCEPTS • Subnetting • Classes • CISCO • Routing and VOIP • Switching and VLAN • Security
  • 10. 10 Subnetting • allows us to break a single large network in smaller networks. • reduces network traffic by allowing only the broadcast traffic which is relevant to the subnet. •improves overall performance of the network by reducing unnecessary traffic • increases security of the network by blocking a subnet’ traffic in subnet • reduces the requirement of IP range.
  • 11. 11 Concept of Classes S. No. Class Network Bit Host Bit Range Subnet Wildmask 1 A 8 24 1-126 255.0.0.0 0.255.255.255 2 B 16 16 128-191 255.255.0.0 0.0.255.255 3 C 24 8 192-223 255.255.255. 0 0.0.0.255 4 D Broadcast 224-239 5 E Research 240-255
  • 12. 12 Corps Information System Control Officer (CISCO) Cisco Systems is an American multinational technology company headquartered in San Jose, California, that designs, manufactures and sells networking equipment. It provides three certifications • CCNA – Cisco Certified Network Associate/Administrator • CCNP – Cisco Certified Network Professional • CCIE – Cisco Certified Internetwork Expert
  • 13. 13 Routing process of selecting a path for traffic in a network, or between or across multiple networks. Routing schemes differin how they deliver messages: • Unicast delivers a message to a single specific node • Broadcast delivers a message to all nodes in the network • Multicast delivers a message to a group of nodes that have expressed interest in receiving the message • Anycast delivers a message to any one out of a group of nodes, typically the one nearest to the source • Geocast delivers a message to a group of nodes based on geographic location
  • 14. 14 Types of routing • Static routing  form of routing that occurs when a router uses a manually-configured routing entry routes are manually configured by a network administrator by adding in entries into a routing table • Dynamic routing networking technique that provides optimal data routing enables routers to select paths according to real- time logical network layout changes the routing protocol operating on the router is responsible for the creation, maintenance and updating of the dynamic routing table.
  • 15. 15 Introduction to VOIP VOIP is an acronym for Voice Over Internet Protocol, or in more common terms phone service over the Internet.  If you have a reasonable quality Internet connection you can get phone service delivered through your Internet connection instead of from your local phone company. Basic idea of VOIP • Continuously sample audio. • Convert each sample to digital form. • Send the resulting digitized stream across an IP network in packets. • Convert the stream back to analog for playback. • Before the procedure above, the system must handle call setup. • Phone number to IP.
  • 16. 16 Advantages Of VOIP • Low call costs. • Low cost of performing moves, ads and changes on a business VOIP phone system. • Increased functionality and integration with other IT business systems. • Ability to have your land-line phone number follow you anywhere. • Low infrastructure costs. Disadvantages of VOIP • Loss of service during outages. • Without power VOIP phones are useless, so in case of emergencies during power cuts it can be a major disadvantage. • With VOIP emergency calls, it is hard to locate you and send help in time. • Latency and traffic. • No standard protocol is applicable.
  • 17. 17 Switching • Process to forward packets coming in from one port to a port leading towards the destination. • A communication system may include number of switches and nodes. • Switching can be divided into two major categories:  Connectionless  Connection Oriented
  • 18. 18 Circuit Switching • It consists of a set of switches connected by physical links. • Two nodes communicate with each other over a dedicated communication path. • The nodes must make a reservation for the resources to be used during the communication. Packet Switching • Messages are divided into packets of fixed or variable size. • The size of packet is decided by the network and the governing protocol. • The resource allocation is doneon first-come, first-served basis. • Each switching node has a small amount of buffer space to hold packets temporarily. • If the outgoing line is busy, the packet stays in queue until the line becomes available. Message Switching • Each message is routed independentlythrough the network. • Each message carries a header that contains the full information about the destination. • Each intermediatedevice receives the whole message and buffers it until there are resources available to transfer it to the next hop. • Message switching is sometimes called as Store and ForwardSwitching.
  • 19. 19 Virtual Local Area Network (VLAN) • It is a smart device • It divides switch into multiple parts in order to maintain security. Per- VLAN Spanning Tree • Per-VLAN Spanning Tree (PVST) maintains a spanning tree instance for each VLAN configured in the network. • It uses ISL Trunking and allows a VLAN trunk to be forwarding for some VLANs while blocking for other VLANs. • It has the ability to load balance traffic (at layer-2) by forwarding some VLANs on one trunk and other VLANs on another trunk without causing a Spanning Tree loop.
  • 20. 20 Security It is the network device protection in order to secure our network with help of CCNA technology Types of Security • Access Control List It is type of security in which we filter inbound and outbound traffic Types of ACL • Standard ACL It is a type of ACL in which we block all the protocols in our network • Extended ACL It is a type of ACL in which we block a particular protocol as well as particular IP
  • 21. 21 Virtual Terminal Type (VTY) • It is protocol used for remotely connection with other connection. Virtual Private Network (VPN) • VPN is a technology that creates an encrypted connection over a less secure network. • In this basically TUNNEL is made to keep data secure through which only source and destination clients can get the data. Network Address Translator • It is type of security in which we convert our private address into public address. • It is a part of ethical hacking in which there is use of fake IP.
  • 22. 22 Types of NAT • Static NAT It is a type of NAT in which the client will fetch only single fake IP every time. • Dynamic NAT It is a type of security in which we create a pool of fake IP’s, because of which the user will receive a different fake IP every time within the range of given IP pool. • Overload / NATPAD It means that the single public IP assigned to your router can be used by multiple internal hosts concurrently. This is done by translating source UDP/TCP ports in the packets and keeping track of them within the translation table kept in the router .
  • 23. 23 Ad Hoc Network • Network that is composed of individual devices communicating with each other directly. The term implies spontaneous or impromptu construction because these networks often bypass the gatekeeping hardware or central access point such as a router. •Many ad hoc networks are local area networks where computers or other devices are enabled to send data directly to one another rather than going through a centralized access point.
  • 24. 24 Mobile Adhoc Network (MANET) • Wireless adhoc network or adhoc wireless network that usually has a routable networking environment on top of a Link Layer ad hoc network. • They consist of set of mobile nodes connected wirelessly in a self configured, self healing network without having a fixed infrastructure. • MANET nodes are free to move randomly as the network topology changes frequently. Each node behave as a router as they forward traffic to other specified node in the network.
  • 25. 25 Characteristics of MANET • Dynamic Topologies • Bandwidth constrained, variable capacity links • Autonomous Behavior • Energy Constrained Operation • Limited Security • Less Human Intervention
  • 26. 26 Pros and Cons of MANET Pros • Separation from central network administration. • Each nodes can play both the roles ie. of router and host showing autonomous nature. • Self configuring and self healing nodes, does not require human intervention. Cons: • Resources are limited due to various constraints like noise, interference conditions, etc. • Lack of authorization facilities. • More prone to attacks due to limited physical security.
  • 27. 27 Vehicular Ad-Hoc Network (VANET) • Vehicular ad hoc network, consisting of a network of vehicles, moving at a relatively high speed, that communicate among themselves with different purposes, being the main purpose that of improving security on the road. • VANET turns every participating car into a wireless router or node, allowing cars approximately 100 to 300 meters of each other to connect and, in turn, create a network with a wide range. • As cars fall out of the signal range and drop out of the network, other cars can join in, connecting vehicles to one another so that a mobile Internet is created.
  • 28. 28 Wi-Fi (Wireless Fidelity) • Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections. The Wi-Fi Alliance • Organization that owns the Wi-Fi registered trademark term specifically defines Wi-Fi as any "wireless local area network (WLAN) products that are based on the IEEE 802.11 standards.“ • The Wi-Fi Alliance has expanded the generic use of the Wi-Fi term to include any type of network or WLAN product based on any of the 802.11 standards, including 802.11b, 802.11a, dual-band and so on, in an attempt to stop confusion about wireless LAN interoperability.
  • 29. 29 Li-Fi • LiFi is a wireless optical networking technology that uses light-emitting diodes for data transmission. • LiFi is designed to use LED light bulbs similar to those currently in use in many energy-conscious homes and offices. • LiFi bulbs are outfitted with a chip that modulates the light imperceptibly for optical data transmission. LiFi data is transmitted by the LED bulbs and received by photoreceptors. • LiFi's early developmental models were capable of 150 Mbps. In the lab, with stronger LEDs and different technology, researchers have enabled 10 Gbps.
  • 30. 30 Benefits of LiFi • Higher speeds than Wi-Fi. • 10000 times the frequency spectrum of radio. • More secure because data cannot be intercepted without a clear line of sight. • Prevents piggybacking. • Eliminates neighboring network interference. • Unimpeded by radio interference. • Does not create interference in sensitive electronics, making it better for use in environments like hospitals and aircraft.