SlideShare une entreprise Scribd logo
1  sur  31
1
Enterprise Network Management
& Administration
BBC
Makerere University Business School
2012-2013
BWIRE SEDRICK
Introduction to computer networking
Objective:
To be acquainted with:
• The definitions of networking and concepts
• Network topology
• Network peripherals, hardware and software
Why Study Networking?
Indispensable part of modern society
 Commercial – e-commerce, banking, inventorying,
telecommunications, archiving, health
 Social – critical infrastructure, homeland security,
policing
 Human interaction/communication – email, chat,
videoconferencing, social networking, entertainment
Appears in every facet of engineering
 Modern trend – Network every (electronic) device
(computers, phones, sensors, planes, cars, TVs,
appliances, heart monitors, …) 3
Definitions
A network can be defined as two or more
computing devices connected together in such a
way that they can share resources.
The purpose of a network is to share resources.
A resource may be:
 A file, A folder, A printer, A disk drive, Or just about
anything else that exists on a computer.
Definitions (cont..)
A network is simply a collection of computers or
other hardware devices that are connected
together, either physically or logically, using
special hardware and software, to allow them to
exchange information and cooperate. Networking
is the term that describes the processes involved
in designing, implementing, upgrading, managing
and otherwise working with networks and
network technologies.
Advantages of networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and Balancing
Entertainment
The Disadvantages (Costs) of Networking
Network Hardware, Software and Setup Costs
Hardware and Software Management and
Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns
Network Classifications
Networks can be classified by either network
geography or component roles within the network.
Classification by Network Geography - Networks
are frequently classified according to the
geographical boundaries spanned by the network
itself
A local area network (LAN) is a computer network
covering a small geographic area, like a home, office, or
group of buildings
Network Classifications Cont
Wide Area Network (WAN) is a computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, less formally, a
network that uses routers and public communications links. The largest
and most well-known example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so
that users and computers in one location can communicate with users and
computers in other locations
A Metropolitan Area Network (MAN) is a network that
interconnects users in a geographic area or region larger than that covered
by even a large local area network (LAN) but smaller than the area covered
by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network. It is also
used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes
referred to as a campus network.
Fundamental Network Classifications (cont)
Wide Area Network
Fundamental Network Classifications (cont)
Metropolitan Area Network (MAN)
Classification by Component Roles
Networks can also be classified according to the roles that the
networked computers play in the network’s operation.
Peer-to-peer, server-based, and client-based are the types of
roles into which networks are classified.
Classification by Component Roles
Peer-to-peer:
 In a peer-to-peer network, all computers are considered
equal. Each computer controls its own information and
is capable of functioning as either a client or a server
depending upon the requirement. Peer-to-peer networks
are inexpensive and easy to install.
 They are popular as home networks and for use in small
companies.
Classification by Component Roles
Peer-to-peer (continued):
 Most operating systems come with built-in peer-
to-peer networking capability.
 Peer-to-peer networks become difficult to manage
when more security is added to resources, since
the users control their security by password-
protecting shares.
 Shares can be document
folders, printers, peripherals, and any other
resource that they control on their computers.
Classification by Component Roles
Peer-to-peer network
Classification by Component Roles
Server-based:
 A server-based network offers centralized control
and is designed for secure operations. In a server-
based network, a dedicated server controls the
network.
 A dedicated server is one that services the
network by storing data, applications, resources,
and also provides access to resources required by
the client. These servers can also control the
network’s security from one centralized location
or share it with other specially configured servers.
Client/Server Networking (cont..)
Classification by Component Roles
Client-based:
 Client-based network servers process requests
from clients and return just the results.
 These networks take advantage of the powerful
processing capabilities of both the client and
the server.
 Application servers and communications
servers are examples of client-based networks.
Classification by Component Roles
Client-based network
Intranet and Internet Specifications
Intranet: An intranet is a private network that is contained within
an enterprise. It may consist of many interlinked local area
networks and also use leased lines in the wide area network. An
intranet uses TCP/IP, HTTP, and other Internet protocols and in
general looks like a private version of the Internet.
Extranet – a network that connects people within your company
with people who are outside your company--all within a secure,
password-protected network that can be accessed from anywhere
Internet: is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if
they have permission, get information from any other computer
(and sometimes talk directly to users at other computers).
Network topology
A topology is a way of “laying out” the network. Topologies can
be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network messages travel
Network topology (cont.)
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Network topology (cont.)
Bus
• A bus is the simplest physical topology. It consists of a
single cable that runs to every workstation. This topology
uses the least amount of cabling, but also covers the
shortest amount of distance.
• Each computer shares the same data and address path.
With a logical bus topology, messages pass through the
trunk, and each workstation checks to see if the message
is addressed to itself. If the address of the message matches
the workstation’s address, the network adapter copies the
message to the card’s on-board memory.
Network topology (cont.)
Star Topology
• A physical star topology branches each network device off
a central device called a hub, making it very easy to add a
new workstation.
• Also, if any workstation goes down it does not affect the
entire network. (But, as you might expect, if the central
device goes down, the entire network goes down.)
• Some types of Ethernet and ARCNet use a physical star
topology. Figure 8.7 gives an example of the organization
of the star network.
Network topology (cont.)
Star topologies are easy to install. A cable is run from each
workstation to the hub. The hub is placed in a central location
in the office.
Star topologies are more expensive to install than bus networks,
because there are several more cables that need to be installed,
plus the cost of the hubs that are needed.
Network topology (cont.)
Star Topology
Network topology (cont.)
Ring
• Each computer connects to two other computers,
joining them in a circle creating a unidirectional
path where messages move workstation to
workstation.
• Each entity participating in the ring reads a
message, then regenerates it and hands it to its
neighbor on a different network cable.
Network topology (cont.)
The ring makes it difficult to add new computers.
Unlike a star topology network, the ring topology network will
go down if one entity is removed from the ring.
Physical ring topology systems don’t exist much
anymore, mainly because the hardware involved was fairly
expensive and the fault tolerance was very low.
Network topology (cont.)
Mesh
• The mesh topology is the simplest logical topology in terms of data flow, but
it is the most complex in terms of physical design.
• In this physical topology, each device is connected to every other device .
This topology is rarely found in LANs, mainly because of the complexity of
the cabling.
• Because of its design, the physical mesh topology is very expensive to
install and maintain. Cables must be run from each device to every other
device. The advantage you gain from it is its high fault tolerance.
• With a logical mesh topology, however, there will always be a way of
getting the data from source to destination.
• It may not be able to take the direct route, but it can take an alternate,
indirect route. It is for this reason that the mesh topology is still found in
WANs to connect multiple sites across WAN links. It uses devices called
routersto search multiple routes through the mesh and determine the best
path.
Network topology (cont.)
Mesh Topology
Network topology (cont.)
Advantages and Disadvantages of Network Topologies
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure.
Break in bus disables entire network.
Star Cheap. Easy to install.
Easy to reconfigure. Fault tolerant.
More expensive than bus.
Ring Efficient. Easy to install. Reconfiguration difficult.
Very expensive.
Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult.
Extremely expensive. Very complex.

Contenu connexe

Tendances

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuNarenderSinghSandhu2
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridgeskeyur Nandaniya
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingPriya Manik
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Kapil Rode
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Wan technologies
Wan technologiesWan technologies
Wan technologiesOnline
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals Kirti Verma
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic conceptsrahul kapoliya
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Distribution File System DFS Technologies
Distribution File System DFS TechnologiesDistribution File System DFS Technologies
Distribution File System DFS TechnologiesRaphael Ejike
 
Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Dr Neelesh Jain
 

Tendances (20)

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
WLAN
WLANWLAN
WLAN
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Local area network
Local area networkLocal area network
Local area network
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
networking devices
networking devicesnetworking devices
networking devices
 
Distribution File System DFS Technologies
Distribution File System DFS TechnologiesDistribution File System DFS Technologies
Distribution File System DFS Technologies
 
Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,
 

En vedette

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )finalJai Kumar
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsali814
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingmartuj
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingBesar Limani
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networksmarwa_ma
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)slide_site
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In TelecommunicationsMarlon Jamera
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesCisco Canada
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks Nazren Wak
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication ServicesChetan Kumar S
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologiesPriyanka Nain
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networksJosue Wuezo
 

En vedette (20)

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topologia estrella
Topologia estrellaTopologia estrella
Topologia estrella
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
Topologies
TopologiesTopologies
Topologies
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Memory types
Memory typesMemory types
Memory types
 

Similaire à ENTERPRISE NETWORKING

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingshiv balapure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingAnuja Lad
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingKhan Rahimeen
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networkingArdit Meti
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.pptjeronimored
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slidenextgencyber cafe
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networkingSithu PM
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)saurabh goel
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptflyinimohamed
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdfODINARARCH
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)Sorath Peetamber
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 

Similaire à ENTERPRISE NETWORKING (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 

Plus de bwire sedrick

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...bwire sedrick
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentationbwire sedrick
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processingbwire sedrick
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbookbwire sedrick
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTMLbwire sedrick
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementationbwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management processbwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overviewbwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisbwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis sparebwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsbwire sedrick
 

Plus de bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Osi model
Osi modelOsi model
Osi model
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

ENTERPRISE NETWORKING

  • 1. 1 Enterprise Network Management & Administration BBC Makerere University Business School 2012-2013 BWIRE SEDRICK
  • 2. Introduction to computer networking Objective: To be acquainted with: • The definitions of networking and concepts • Network topology • Network peripherals, hardware and software
  • 3. Why Study Networking? Indispensable part of modern society  Commercial – e-commerce, banking, inventorying, telecommunications, archiving, health  Social – critical infrastructure, homeland security, policing  Human interaction/communication – email, chat, videoconferencing, social networking, entertainment Appears in every facet of engineering  Modern trend – Network every (electronic) device (computers, phones, sensors, planes, cars, TVs, appliances, heart monitors, …) 3
  • 4. Definitions A network can be defined as two or more computing devices connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be:  A file, A folder, A printer, A disk drive, Or just about anything else that exists on a computer.
  • 5. Definitions (cont..) A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.
  • 6. Advantages of networking Connectivity and Communication Data Sharing Hardware Sharing Internet Access Internet Access Sharing Data Security and Management Performance Enhancement and Balancing Entertainment
  • 7. The Disadvantages (Costs) of Networking Network Hardware, Software and Setup Costs Hardware and Software Management and Administration Costs Undesirable Sharing Illegal or Undesirable Behavior Data Security Concerns
  • 8. Network Classifications Networks can be classified by either network geography or component roles within the network. Classification by Network Geography - Networks are frequently classified according to the geographical boundaries spanned by the network itself A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings
  • 9. Network Classifications Cont Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. The largest and most well-known example of a WAN is the Internet. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations A Metropolitan Area Network (MAN) is a network that interconnects users in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network. It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
  • 10. Fundamental Network Classifications (cont) Wide Area Network
  • 11. Fundamental Network Classifications (cont) Metropolitan Area Network (MAN)
  • 12. Classification by Component Roles Networks can also be classified according to the roles that the networked computers play in the network’s operation. Peer-to-peer, server-based, and client-based are the types of roles into which networks are classified.
  • 13. Classification by Component Roles Peer-to-peer:  In a peer-to-peer network, all computers are considered equal. Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. Peer-to-peer networks are inexpensive and easy to install.  They are popular as home networks and for use in small companies.
  • 14. Classification by Component Roles Peer-to-peer (continued):  Most operating systems come with built-in peer- to-peer networking capability.  Peer-to-peer networks become difficult to manage when more security is added to resources, since the users control their security by password- protecting shares.  Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.
  • 15. Classification by Component Roles Peer-to-peer network
  • 16. Classification by Component Roles Server-based:  A server-based network offers centralized control and is designed for secure operations. In a server- based network, a dedicated server controls the network.  A dedicated server is one that services the network by storing data, applications, resources, and also provides access to resources required by the client. These servers can also control the network’s security from one centralized location or share it with other specially configured servers.
  • 18. Classification by Component Roles Client-based:  Client-based network servers process requests from clients and return just the results.  These networks take advantage of the powerful processing capabilities of both the client and the server.  Application servers and communications servers are examples of client-based networks.
  • 19. Classification by Component Roles Client-based network
  • 20. Intranet and Internet Specifications Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere Internet: is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • 21. Network topology A topology is a way of “laying out” the network. Topologies can be either physical or logical. Physical topologies describe how the cables are run. Logical topologies describe how the network messages travel
  • 22. Network topology (cont.) Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical)
  • 23. Network topology (cont.) Bus • A bus is the simplest physical topology. It consists of a single cable that runs to every workstation. This topology uses the least amount of cabling, but also covers the shortest amount of distance. • Each computer shares the same data and address path. With a logical bus topology, messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on-board memory.
  • 24. Network topology (cont.) Star Topology • A physical star topology branches each network device off a central device called a hub, making it very easy to add a new workstation. • Also, if any workstation goes down it does not affect the entire network. (But, as you might expect, if the central device goes down, the entire network goes down.) • Some types of Ethernet and ARCNet use a physical star topology. Figure 8.7 gives an example of the organization of the star network.
  • 25. Network topology (cont.) Star topologies are easy to install. A cable is run from each workstation to the hub. The hub is placed in a central location in the office. Star topologies are more expensive to install than bus networks, because there are several more cables that need to be installed, plus the cost of the hubs that are needed.
  • 27. Network topology (cont.) Ring • Each computer connects to two other computers, joining them in a circle creating a unidirectional path where messages move workstation to workstation. • Each entity participating in the ring reads a message, then regenerates it and hands it to its neighbor on a different network cable.
  • 28. Network topology (cont.) The ring makes it difficult to add new computers. Unlike a star topology network, the ring topology network will go down if one entity is removed from the ring. Physical ring topology systems don’t exist much anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 29. Network topology (cont.) Mesh • The mesh topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design. • In this physical topology, each device is connected to every other device . This topology is rarely found in LANs, mainly because of the complexity of the cabling. • Because of its design, the physical mesh topology is very expensive to install and maintain. Cables must be run from each device to every other device. The advantage you gain from it is its high fault tolerance. • With a logical mesh topology, however, there will always be a way of getting the data from source to destination. • It may not be able to take the direct route, but it can take an alternate, indirect route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routersto search multiple routes through the mesh and determine the best path.
  • 31. Network topology (cont.) Advantages and Disadvantages of Network Topologies Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. Easy to reconfigure. Fault tolerant. More expensive than bus. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.