1. 1
Basic and Advanced Networking Concepts
Prepared by
Ms. R. Gomathijayam
Assistant Professor
Department of Computer Applications
Bon Secours College for Women
Thanjavur
2. NETWORK BASICS
• Definition
• Applications
• Networking devices and topology
• Addressing and DNS
• Port and Socket
• Protocol and OSI layers
• Types of networks
2
3. 3
Definition
Collection of computers and devices connected via
communications devices and transmission media
Applications
• Sharing of resources such as printers
• Sharing of expensive software's and database
• Communication from one computer to another
computer
• Exchange of data and information among users
via network
• Sharing of information over geographically wide
areas.
5. IPAddress
• Logical or network address of the system across the
network
• Internet Assigned Numbers Authority(IANA)
assigns IPV4 address as unique ID for each device on
the network
Example: 136.102.233.49
Domain Name System (DNS)
• Mnemonic textual addresses are provided to
facilitate the manipulation of internet addresses.
• DNS servers are responsible for translating
mnemonic textual Internet addresses into hard numeric
Internet addresses.
6. 6
Port
• An IP port will identify a specific application running
on an Internet host Machine.
• A port is identified by a number, the port number.
Socket
• Unique combination of IP address and port number
together are termed as socket
Protocols
• Define the rules that govern the communications
between two computers connected to the network.
• Roles: addressing and routing of messages, error
detection and recovery, sequence and flow controls etc.
7. 7
OSI Layers
• Application layer
- applications connected to the network
• Presentation layer
- provides standard data representations for applications
• Session layer
- manages sessions among applications
• Transport layer
- provides end-to-end errors detection and correction
• Network layer
- handles connection to the network by the higher layers
• Data-link layer
- provides safe communication of data over the physical
network
• Physical layer
- defines the physical characteristics of the network
8. 8
Types of networks
Criteria LAN MAN VAN
Ownership Private Private or public Private or public
Geographical area Single building,
schoolsor at home
Large city
(5 to 50 km)
Country-wide
Size Small Larger Largest
Cost Low High Higher
Speed 1000Mbps 1.544Mbps 150Mbps
Transmission
Medium
Twisted pair Twisted pair and
Fiber optic cables
Fiber optic, radio
wave and satellite
Example Network in office Switched
Multimegabit Data
Service
Internet
10. 10
Subnetting
• allows us to break a single large network in smaller
networks.
• reduces network traffic by allowing only the broadcast
traffic which is relevant to the subnet.
•improves overall performance of the network by
reducing unnecessary traffic
• increases security of the network by blocking a subnet’
traffic in subnet
• reduces the requirement of IP range.
11. 11
Concept of Classes
S. No. Class Network
Bit
Host
Bit
Range Subnet Wildmask
1 A 8 24 1-126 255.0.0.0 0.255.255.255
2 B 16 16 128-191 255.255.0.0 0.0.255.255
3 C 24 8 192-223 255.255.255.
0
0.0.0.255
4 D Broadcast 224-239
5 E Research 240-255
12. 12
Corps Information System Control Officer
(CISCO)
Cisco Systems is an American multinational technology
company headquartered in San Jose, California, that
designs, manufactures and sells networking equipment.
It provides three certifications
• CCNA – Cisco Certified Network
Associate/Administrator
• CCNP – Cisco Certified Network Professional
• CCIE – Cisco Certified Internetwork Expert
13. 13
Routing
process of selecting a path for traffic in a network, or
between or across multiple networks.
Routing schemes differin how they deliver messages:
• Unicast delivers a message to a single specific node
• Broadcast delivers a message to all nodes in the network
• Multicast delivers a message to a group of nodes that have
expressed interest in receiving the message
• Anycast delivers a message to any one out of a group of nodes,
typically the one nearest to the source
• Geocast delivers a message to a group of nodes based
on geographic location
14. 14
Types of routing
• Static routing
form of routing that occurs when a router uses
a manually-configured routing entry
routes are manually configured by a network
administrator by adding in entries into a routing
table
• Dynamic routing
networking technique that provides optimal
data routing
enables routers to select paths according to real-
time logical network layout changes
the routing protocol operating on the router is
responsible for the creation, maintenance and
updating of the dynamic routing table.
15. 15
Introduction to VOIP
VOIP is an acronym for Voice Over Internet Protocol, or in
more common terms phone service over the Internet.
If you have a reasonable quality Internet connection you can
get phone service delivered through your Internet connection
instead of from your local phone company.
Basic idea of VOIP
• Continuously sample audio.
• Convert each sample to digital form.
• Send the resulting digitized stream across an IP network in
packets.
• Convert the stream back to analog for playback.
• Before the procedure above, the system must handle call setup.
• Phone number to IP.
16. 16
Advantages Of VOIP
• Low call costs.
• Low cost of performing moves, ads and changes on a business
VOIP phone system.
• Increased functionality and integration with other IT business
systems.
• Ability to have your land-line phone number follow you
anywhere.
• Low infrastructure costs.
Disadvantages of VOIP
• Loss of service during outages.
• Without power VOIP phones are useless, so in case of
emergencies during power cuts it can be a major disadvantage.
• With VOIP emergency calls, it is hard to locate you and send
help in time.
• Latency and traffic.
• No standard protocol is applicable.
17. 17
Switching
• Process to forward packets coming in from one port to a port
leading towards the destination.
• A communication system may include number of switches and
nodes.
• Switching can be divided into two major categories:
Connectionless
Connection Oriented
18. 18
Circuit Switching
• It consists of a set of switches connected by physical links.
• Two nodes communicate with each other over a dedicated communication
path.
• The nodes must make a reservation for the resources to be used during the
communication.
Packet Switching
• Messages are divided into packets of fixed or variable size.
• The size of packet is decided by the network and the governing protocol.
• The resource allocation is doneon first-come, first-served basis.
• Each switching node has a small amount of buffer space to hold packets
temporarily.
• If the outgoing line is busy, the packet stays in queue until the line becomes
available.
Message Switching
• Each message is routed independentlythrough the network.
• Each message carries a header that contains the full information about the
destination.
• Each intermediatedevice receives the whole message and buffers it until
there are resources available to transfer it to the next hop.
• Message switching is sometimes called as Store and ForwardSwitching.
19. 19
Virtual Local Area Network (VLAN)
• It is a smart device
• It divides switch into multiple parts in order to
maintain security.
Per- VLAN Spanning Tree
• Per-VLAN Spanning Tree (PVST) maintains a
spanning tree instance for each VLAN configured in the
network.
• It uses ISL Trunking and allows a VLAN trunk to be
forwarding for some VLANs while blocking for other
VLANs.
• It has the ability to load balance traffic (at layer-2) by
forwarding some VLANs on one trunk and other
VLANs on another trunk without causing a Spanning
Tree loop.
20. 20
Security
It is the network device protection in order to secure
our network with help of CCNA technology
Types of Security
• Access Control List
It is type of security in which we filter
inbound and outbound traffic
Types of ACL
• Standard ACL
It is a type of ACL in which we block all the
protocols in our network
• Extended ACL
It is a type of ACL in which we block a
particular protocol as well as particular IP
21. 21
Virtual Terminal Type (VTY)
• It is protocol used for remotely connection with other
connection.
Virtual Private Network (VPN)
• VPN is a technology that creates an encrypted
connection over a less secure network.
• In this basically TUNNEL is made to keep data secure
through which only source and destination clients can
get the data.
Network Address Translator
• It is type of security in which we convert our private
address into public address.
• It is a part of ethical hacking in which there is use of
fake IP.
22. 22
Types of NAT
• Static NAT
It is a type of NAT in which the client will fetch
only single fake IP every time.
• Dynamic NAT
It is a type of security in which we create a pool
of fake IP’s, because of which the user will
receive a different fake IP every time within the
range of given IP pool.
• Overload / NATPAD
It means that the single public IP assigned to
your router can be used by multiple internal hosts
concurrently. This is done by translating source
UDP/TCP ports in the packets and keeping track
of them within the translation table kept in the
router .
23. 23
Ad Hoc Network
• Network that is composed of individual devices
communicating with each other directly. The term
implies spontaneous or impromptu construction because
these networks often bypass the gatekeeping hardware
or central access point such as a router.
•Many ad hoc networks are local area networks where
computers or other devices are enabled to send data
directly to one another rather than going through a
centralized access point.
24. 24
Mobile Adhoc Network (MANET)
• Wireless adhoc network or adhoc wireless network
that usually has a routable networking environment on
top of a Link Layer ad hoc network.
• They consist of set of mobile nodes connected
wirelessly in a self configured, self healing network
without having a fixed infrastructure.
• MANET nodes are free to move randomly as the
network topology changes frequently. Each node behave
as a router as they forward traffic to other specified
node in the network.
25. 25
Characteristics of MANET
• Dynamic Topologies
• Bandwidth constrained, variable capacity links
• Autonomous Behavior
• Energy Constrained Operation
• Limited Security
• Less Human Intervention
26. 26
Pros and Cons of MANET
Pros
• Separation from central network administration.
• Each nodes can play both the roles ie. of router and
host showing autonomous nature.
• Self configuring and self healing nodes, does not
require human intervention.
Cons:
• Resources are limited due to various constraints like
noise, interference conditions, etc.
• Lack of authorization facilities.
• More prone to attacks due to limited physical security.
27. 27
Vehicular Ad-Hoc Network (VANET)
• Vehicular ad hoc network, consisting of a network of
vehicles, moving at a relatively high speed, that
communicate among themselves with different
purposes, being the main purpose that of improving
security on the road.
• VANET turns every participating car into a wireless
router or node, allowing cars approximately 100 to
300 meters of each other to connect and, in turn, create
a network with a wide range.
• As cars fall out of the signal range and drop out of
the network, other cars can join in, connecting
vehicles to one another so that a mobile Internet is
created.
28. 28
Wi-Fi (Wireless Fidelity)
• Wi-Fi is the name of a popular wireless networking
technology that uses radio waves to provide wireless
high-speed Internet and network connections.
The Wi-Fi Alliance
• Organization that owns the Wi-Fi registered trademark
term specifically defines Wi-Fi as any "wireless local
area network (WLAN) products that are based on the
IEEE 802.11 standards.“
• The Wi-Fi Alliance has expanded the generic use of
the Wi-Fi term to include any type of network
or WLAN product based on any of the 802.11 standards,
including 802.11b, 802.11a, dual-band and so on, in an
attempt to stop confusion about wireless LAN
interoperability.
29. 29
Li-Fi
• LiFi is a wireless optical networking technology that
uses light-emitting diodes for data transmission.
• LiFi is designed to use LED light bulbs similar to
those currently in use in many energy-conscious homes
and offices.
• LiFi bulbs are outfitted with a chip that modulates the
light imperceptibly for optical data transmission. LiFi
data is transmitted by the LED bulbs and received by
photoreceptors.
• LiFi's early developmental models were capable of
150 Mbps. In the lab, with stronger LEDs and different
technology, researchers have enabled 10 Gbps.
30. 30
Benefits of LiFi
• Higher speeds than Wi-Fi.
• 10000 times the frequency spectrum of
radio.
• More secure because data cannot be
intercepted without a clear line of sight.
• Prevents piggybacking.
• Eliminates neighboring network
interference.
• Unimpeded by radio interference.
• Does not create interference in sensitive
electronics, making it better for use in
environments like hospitals and aircraft.