SlideShare une entreprise Scribd logo
1  sur  185
Networking Fundamentals
Khurram Shahzad. Saudi Arabia +966 50 8654598
http://www.facebook.com/khurramshahzad.goraya
 Stand-alone computers were insufficient in a business
   context
     Hard-drive capacities were insufficient
     Computers required a local printer
     Sharing documents via the sneakernet was
      cumbersome
     E-mail didn't exist
 Networks addressed these problems
Networking Fundamentals
 Computer networks allow computers to link to each
  other's resources
 Networks can increase productivity as well as
  decrease cash outlay for new hardware and software
Networking Fundamentals
 Networking today is a a relatively simple plug-and-
  play process
 Wireless network cards can automatically detect and
  join networks
 Of course, not all networks are that simple
Networking Fundamentals
 Background information needed to understand how
 networks work
   LANs vs. WANs
   Primary network components
   Network operating systems (NOSs)
   Network resource access
   Network topologies
   Network architectures
   Transmitting data on a network
LANs vs. WANs
 Local area networks (LANs) connect computers in
  a single office
 Wide area networks (WANs) expand the LANs to
  include networks outside the local environment
 Think of a WAN as multiple, disbursed LANs
  connected together
 LANs exist in many homes (wireless networks)
  and nearly all businesses
Local Area Networks (LANs)
Local Area Networks (LANs)
Local Area Networks (LANs)
 The earliest LANs could not cover large distances
 Only a few software programs supported them
 The first software programs were constrained by file
  locking
 Nowadays, multiple users can access a program at one
  time
Wide Area Networks (WANs)
Primary Network Components
 Three types of components available on a network:
    Servers
    Clients or workstations
    Resources
Blurring the Lines
 LANs and WANs were often differentiated by their
 connection speeds in the 1980s and 90s
   LANs connected computers with a 10Mbps connection
    or faster
   WANs often connected to each other by very expensive
    T1 connections (a maximum bandwidth of 1.544Mbps)
Blurring the Lines
 Today, connections of 1Gbps are fairly common
 WAN, while still slower than LAN connectivity,
  can be several times faster than the T1
 Because of the speed increases, categorizing
  networks based on connection speed is outdated
 Today, the most common way to classify a
  network is based on geographical distance
Servers
 Core component of the network
    Provide a link to the resources needed to perform tasks
    Direct client computers
    Centralize the control of resources and security
    Balance the load on computers
    Compartmentalize files
Servers
 Perform several different critical tasks
    File servers
    Print servers
 Can be multipurpose or single-purpose
 Can be dedicated or nondedicated
Dedicated Servers
 Assigned to provide specific applications or
  services for the network and nothing else
 Requires fewer resources from the computer that
  is hosting it
 Savings in overhead may translate to a certain
  efficiency
 A web server is an example of a dedicated server
Nondedicated Servers
 Assigned to provide one or more network services
  and local access
 Slightly more flexible in its day-to-day use than a
  dedicated server
 Often serve as a front-end for the administrator
 Can act as a workstation as well as a server
 Can function well in a peer-to-peer environment
Dedicated and Nondedicated
 Many networks use both dedicated and nondedicated
  servers
 Offers improved network performance and flexibility
Workstations
 The computers on which the network users do their
  work
 Connected to a network that offers additional
  resources
 Can range from diskless computer systems to desktop
  systems
 Also known as client computers
Workstations
 Items needed to make a workstation into a network
 client
   Network interface card (NIC)
   Special expansion card
   Cabling system
   Client software
Workstations
 To users, being on a network changes a few things:
    They can store more information
    They can share and receive information from other
     users
    They can use programs that would be too large or
     complex for their computer
    They can use hardware not attached directly to their
     computer
Network Resources
 A resource is any item that can be used on a network
 Resources can include
   Printers and other peripherals
   Disk storage and file access
   Applications
Network Resources
 Networks give users more storage space to store files
 Storing files on a server allows the administrator to
 back up user files
Network Resources
 Files that all users need to access can also be stored
  on a server
 Applications (programs) no longer need to be on
  every computer in the office
Being on a Network Brings Responsibilities
 When you are on a network, you need to take
 responsibility for your actions
   You cannot randomly delete files or move documents
    from server to server
   You do not own your e-mail
   Printing does not mean that if you send something to
    print it will print immediately
   If your workstation has also been set up as a
    nondedicated server, you cannot turn it off
Network Operating Systems (NOSs)
 Networks use a NOS to control the communication
  with resources and the flow of data across the
  network
 The NOS runs on the server
 With today's NOSs, servers are able to monitor
  memory, CPU time, disk space, and peripherals
  without a babysitter
Network Operating Systems (NOSs)
 LANs and WANs allow for a wide range of
  collaboration
 NOSs provide this functionality on a network
Network Resource Access
 Peer-to-peer and client-server
 Questions to ask
    What is the size of the organization?
    How much security does the company require?
    What software or hardware does the resource require?
    How much administration does it need?
    How much will it cost?
    Will this resource meet the needs of the organization
     today and in the future?
    Will additional training be needed?
Peer-to-Peer Networks
Peer-to-Peer Networks
 No centralized administration or control
 Every station has unique control over the
  resources the computer owns
 Lack of centralized control can make it difficult to
  administer the network
 The network isn't very secure
 May not be easy to locate resources
 Users need more training
Peer-to-Peer Networks
 The right choice for small companies that don't
  expect future growth
 Setting up a peer-to-peer resource model simply
  because it is cheap and easy to install could be a
  costly mistake
Client-Server Resource Model
Client-Server Resource Model
 Server-based networks are also known as domains
 The key characteristic of a domain is that security
  is centrally administered
 When you log in to the network, the login request
  is passed to the server responsible for security
 In a peer-to-peer model, users need a user
  account set up on each machine
 In a domain, all user accounts are stored on the
  server
Client-Server Resource Model
 The desired model for companies that are
  continually growing or that need to initially
  support a large environment
 Server-based networks offer flexibility
 Hardware costs may be more, but managing
  resources becomes less time consuming
 Only a few administrators need to be trained
 Users are only responsible for their own work
  environment
Resource Access Model
 Always take the time to plan your network before
  installing it
 You don't want the type of network you chose to not
  meet the needs of the company
Network Topologies
 A way of laying out the network
 Can be physical or logical
 Five primary topologies
    Bus (can be both logical and physical)
    Star (physical only)
    Ring (can be both logical and physical)
    Mesh (can be both logical and physical)
    Hybrid (usually physical)
Bus Topology
Bus Topology
 Easy to install
 Cheapest to install
 Difficult to add a workstation
 Expensive to maintain
Star Topology
Ring Topology
Mesh Topology
Mesh Topology
 Expensive to install and maintain
 The advantage you gain is high fault tolerance
 Found in WANs to connect multiple sites across
  WAN links
 Routers are used to search multiple routes
  through the mesh
 Becomes inefficient with five or more entities
Hybrid Topology
 A mix of the other topologies
 Most networks today are not only hybrid but
  heterogeneous
 May be more expensive, but it exploits the best
  features of all the other topologies
Network Topologies
Network Architectures
 Define the structure of the network, including
  hardware, software, and physical layout
 Performance is usually discussed in terms of
  bandwidth
 Major architectures used today are Ethernet and
  Token Ring
Ethernet
 Original definition of the IEEE 802.3 model
  included a bus topology using coaxial cable and
  baseband signaling
 From this model came the first Ethernet
  architecture
 Has several specifications, each one specifying the
  speed, communication method, and cable
 Original Ethernet was given a designation of
  10Base5
Token Ring
 Exactly like the IEEE 802.5 specification
 Uses a physical star, logical ring topology
 Workstations are cabled to a central device called a
  multistation access unit (MAU)
 Can use shielded or unshielded cable and can
  transmit data at either 4Mbps or 16Mbps
Transmitting Data on a Network
 To facilitate communication across a network,
  computers use a common language called a
  protocol
 Protocols are a language with rules that need to
  be followed so that both computers understand
  the right communication behavior
 Computers need standards to follow to keep their
  communication
   OSI model
   IEEE 802 standards
OSI Model
 The International Organization for Standardization
  (ISO) introduced the Open Systems Interconnection
  (OSI) model
 The ISO put together a seven-layer model providing a
  relationship between the stages of communication
 As transmission takes place data passes through the
  layers
OSI Model
 The OSI model layers from top to bottom
    7. Application layer
    6. Presentation layer
    5. Session layer
    4. Transport layer
    3. Network layer
    2. Data Link layer
    1. Physical layer
OSI Model
 Application layer
   Allows access to network services
   The layer at which file and print services operate
 Presentation layer
   Determines the format of the data
   Performs protocol conversion and manages data
    compression, data translation, and encryption
   Character set information is determined at this level
OSI Model
 Session layer
   Allows applications on different computers to establish,
    maintain, and end a session
   Enables network procedures, such as identifying
    passwords, logons, and network monitoring
 Transport layer
   Verifies that all packets were received by the
    destination host on a TCP/IP network
   Controls the data flow and troubleshoots any problems
    with transmitting or receiving datagrams
   Provides error checking and reliable, end-to-end
    communications
OSI Model
 Network layer
   Responsible for logical addressing of messages
   At this layer, the data is organized into chunks called
    packets
   Manages traffic through packet switching, routing, and
    controlling congestion of data
 Data Link layer
   Arranges data into chunks called frames
   Describes the unique physical address (MAC address)
   Subdivided into two sections: Media Access Control
    (MAC) and Logical Link Control (LLC)
OSI Model
 Physical layer
   Describes how the data gets transmitted over a physical
    medium
   Defines how long each piece of data is and the
    translation of each into the electrical pulses that are
    sent over the wires
   Decides whether data travels unidirectionally or
    bidirectionally across the hardware
   Relates electrical, optical, mechanical, and functional
    interfaces to the cable
OSI Model
IEEE 802 Standards
 Designed primarily for enhancements to the bottom
  three layers of the OSI model
 Breaks the Data Link layer into two sublayers
   The LLC sublayer manages data link communications
   The MAC sublayer watches out for data collisions and
    assigns physical addresses
IEEE 802.3 CSMA/CD (Ethernet)
 Ethernet is the most well-known example of the
  IEEE 802.3 CSMA/CD standard
 The original 802.3 CSMA/CD standard
   Defines a bus topology network that uses a 50 ohm
    coaxial baseband cable
   Carries transmissions at 10Mbps
 Groups data bits into frames and uses the CSMA/
  CD cable access method
 Currently, the 802.3 standard has been amended
  to include speeds up to 10Gbps
IEEE 802.3 CSMA/CD (Ethernet)
 The CSMA/CD acronym illustrates how it works
   Carrier Sense (CS) means that computers on the
    network are listening to the wire at all times
   Multiple Access (MA) means that multiple computers
    have access to the line at the same time
   Collision Detection (CD) detects collisions and senders
    send again
 CSMA/CD technology is considered a contention-
 based access method
IEEE 802.3 CSMA/CD (Ethernet)
 The only major downside to 802.3 is that with large
 networks (more than 100 computers on the same
 cable), the number of collisions increases to the point
 where more collisions than transmissions are taking
 place
IEEE 802.5 Token Ring
 Specifies a physical star, logical ring topology that
  uses a token-passing technology to put the data on
  the cable
 IBM developed this technology for its mainframe and
  minicomputer networks
IEEE 802.5 Token Ring
 A chunk of data called a token circulates the ring
 A computer with data to transmit takes a free
  token off the ring, modifies it, places the token
  (along with the data) back on the ring
 The token travels around the ring
 The destination computer takes the token and
  data off the wire and places the token back on the
  wire
 When the original sender receives the token back,
  it modifies the token to make it free for use and
  sends the token back on the ring
IEEE 802.5 Token Ring
 Main advantage of the token-passing access method is
  that it eliminates collisions
 Whole procedure takes place in a few milliseconds
 Scales very well
   Not uncommon for Token Ring networks based on the
    IEEE 802.5 standard to reach hundreds of workstations
    on a single ring
Understanding Networking Protocols
 Computers use a protocol as a common language for
 communication
   A protocol is a set of rules that govern communications
   Protocols detail what "language" the computers are
    speaking when they talk over a network
   If two computers are going to communicate, they both
    must be using the same protocol
Understanding Networking Protocols
 The A+ exam objectives list two common protocols:
  TCP/IP and NetBIOS
 Other common protocols
   IPX/SPX
   AppleTalk
TCP/IP
 Most popular network protocol in use today
 Named after two of its hardest-working protocols,
  Transmission Control Protocol (TCP) and Internet
  Protocol (IP), but contains dozens of protocols
 Protocol of the Internet
 Robust and flexible
 Works on disparate operating systems such as
  Unix, Linux, and Windows
 Flexibility comes from its modular nature
TCP/IP
TCP/IP
TCP/IP
IP Addresses
 Each device needs to have a unique IP address
 Any device with an IP address is referred to as a host
 Configure manually or automatically from a DHCP
 server
IP Addresses
 A 32-bit hierarchical address that identifies a host
  on the network
 Typically written in dotted-decimal notation, such
  as 192.168.10.55
   Each of the numbers represents eight bits (or one byte)
    of the address, also known as an octet
   The same address written in binary would be 11000000
    10101000 00001010 00110111
   Numbers will be between 0 and 255
IP Addresses
 Addresses are said to be hierarchical
 Numbers at the beginning of the address identify
 groups of computers that belong to the same network
Parts of the IP Address
 Each IP address is made up of two components: the
  network ID and the host ID
 Network portion comes before the host portion
 Network portion does not have to be a specific fixed
  length
Parts of the IP Address
 Computers differentiate where the network address
 ends and the host address begins through the subnet
 mask
   A value written just like an IP address and may look
    something like 255.255.255.0
   Any bit that is set to a 1 in the subnet mask makes the
    corresponding bit in the IP address part of the network
    address
   The number 255 is the highest number you will ever see
    in IP addressing, and it means that all bits in the octet
    are set to 1
Parts of the IP Address
 An example
   The subnet mask of 255.255.255.0
    indicates that the first three octets are the
    network portion of the address, and the
    last octet is the host portion
   In the IP address of 192.168.10.55, the
    network portion is 192.168.10 and the host
    portion is 55
IP Address Classes
 Classes of networks are based on their size
     Class A - huge companies with thousands of computers
     Class C - companies with few computers
     Class B - medium-sized companies
     Class D and E - reserved
 The class of address can be identified by the first
 octet of the IP address
Class A
 Designed for very large networks
 Default network portion for Class A networks is
  the first 8 bits
 Only 126 Class A network addresses available
 Remaining 24 bits of the address allow each Class
  A network to hold as many as 16,777,214 hosts
 All possible Class A networks are in use; no more
  are available
Class B
 Designed for medium-sized networks
 Default network portion for Class B networks is the
  first 16 bits
 Allows for 16,384 networks, each with as many as
  65,534 hosts attached
 Class B networks are generally regarded as
  unavailable
Class C
 Designed for smaller networks
 Default network portion for Class C networks is
  the first 24 bits
 Allows for 2,097,152 networks, but each network
  can have a maximum of only 254 hosts
 Most companies have Class C network addresses
 Class C networks are still available
IP Address Classes
Common Ports
 Each protocol in the TCP/IP suite that operates at the
  Process/Application layer uses a port number to
  identify information it sends or receives
 The port number, when combined with the host's IP
  address, is called a socket
Common Ports
 65,536 ports numbered from 0 to 65535
 Ports 0 through 1023 are called the well-known ports
 1024 through 49151 are called the registered ports
 Anything from 49152 to 65535 is free to be used by
 application vendors
Common Ports
DHCP and DNS
 Both are run off a server and provide key services
  to network clients
 A DHCP server can be configured to automatically
  provide IP configuration information to clients
   IP address
   Subnet mask
   Default gateway (the "door" to the outside world)
   DNS server address
DHCP and DNS
 DNS resolves hostnames to IP
  addresses
 Allows your computer to get the
  address of the website you want and
  traverse the Internet to find it
DHCP and DNS
 DNS works the same way on an intranet
 Instead of helping you find google.com, it may help
 you find Jenny's print server or Joe's file server
Other Protocols
 There probably aren't any reasons why you would
  want to use a different protocol
 Only knock on TCP/IP is that it can be more difficult
  to configure than other protocols
 Only other protocol called out on the A+ Essentials
  exam objectives is NetBIOS
NetBEUI/NetBIOS
 NetBIOS is an acronym formed from network basic
  input/output system
 Is a Session layer network protocol
 Provides an interface with a consistent set of
  commands for requesting lower-level network
  services to transmit information from node to node
NetBEUI/NetBIOS
 NetBEUI is an acronym formed from NetBIOS
  Extended User Interface
 An implementation and extension of IBM's
  NetBIOS transport protocol from Microsoft
 Shipped with all versions of Microsoft's operating
  systems and is generally considered to have a lot
  of overhead
 Has no networking layer and therefore no routing
  capability
NetBEUI/NetBIOS
 These protocols make up a very fast protocol suite
  that most people call NetBEUI/NetBIOS
 Good for small LANs
 Allows users to find and use the network services
  they need easily
 Because it contains no Network layer protocol, it
  cannot be routed and thus cannot be used on a
  WAN
IPX/SPX
 Default communication protocol for versions of
  the Novell NetWare operating system before
  NetWare 5
 A communication protocol similar to TCP/IP
 Used primarily in LANs
 Two main protocols in IPX/SPX are IPX and SPX
   SPX provides similar functions to TCP
   IPX provides functions similar to the TCP/IP suite
    protocols IP and UDP
IPX/SPX
AppleTalk
 Not just a protocol - it is a proprietary network
  architecture for Macintosh computers
 Uses a Carrier Sense Multiple Access with
  Collision Avoidance (CSMA/CA) technology to
  put data on the cable
 Unlike Ethernet, which uses a CSMA/CD method
  (where the CD stands for Collision Detection), it
  uses smart interface cards to detect traffic before
  it tries to send data
 A CSMA/CA card listens to the wire
AppleTalk
 Big selling point of AppleTalk
   Simple and cheap
   Came installed on Macintosh computers
   Assigned itself an address
 Problems
   Slow
   Limited in capacity
   Had to license it from Apple
 Today, TCP/IP is the default networking protocol
 on Macs
Network Interface Cards (NICs)
 Physical interface between computer and cabling
 Prepares, sends, and controls flow of data
 Considerations when choosing a NIC
    Preparing data
    Sending and controlling data
    Configuration
    Drivers
    Compatibility
    Performance
Preparing Data
 In the computer, data moves along buses in parallel
 The NIC translates the data from the computer into
  signals that can flow easily along the cable
 It translates digital signals into electrical signals (and
  in the case of fiber-optic NICs, to optical signals)
Sending and Controlling Data
 For two computers to send and receive data, the
 cards must agree on several things
   Maximum size of the data frames
   Amount of data sent before giving confirmation
   Time needed between transmissions
   Amount of time to wait before sending confirmation
   Amount of data a card can hold
   Speed at which data transmits
Sending and Controlling Data
 To successfully send data on the network, all NICs
  need to use the same media access method
 If you try to use cards of different types neither of
  them would be able to communicate with the other
  unless you had a separate hardware device between
  them that could translate
Sending and Controlling Data
 NICs can send data using either full-duplex or
 half-duplex mode
   Half-duplex means that between the sender and
    receiver, only one can transmit at any one time
   In full-duplex communication, a computer can send
    and receive data simultaneously
   Main advantage of full-duplex over half-duplex
    communication is performance
   NICs can operate twice as fast (200Mbps) in full-duplex
    mode as they do normally in half-duplex mode
    (100Mbps)
NIC Configuration
 The NIC's configuration may include
     Manufacturer's hardware address
     IRQ address
     Base I/O port address
     Base memory address
 Each card must have a unique MAC address
 If two cards on the same network have the same
  MAC address, neither one will be able to
  communicate
 IEEE has established a standard for hardware
  addresses
NIC Drivers
 For the computer to use the NIC, it is very important
  to install the proper device drivers
 Drivers communicate directly with the network
  redirector and adapter
 Operate in the Media Access Control sublayer of the
  Data Link layer of the OSI model
PC Bus Type
 Choose NIC that fits the bus type of your PC
 If you have more than one type of bus in your PC use
  a NIC that fits into the fastest type
 More and more computers are using network cards
  that have either PC Card or USB interfaces
Network Interface Card Performance
 Most important goal of the network adapter card is to
  optimize network performance and minimize the
  amount of time needed to transfer data packets across
  the network
 Ensure you get the fastest card you can for the type of
  network you're on
Cabling and Connectors
 Cable properly moves the data to its intended
  destination
 Four main types of cabling methods
   Coaxial cable
   Twisted-pair cable
   Fiber-optic cable
   Wireless
Coaxial
Coaxial
 Available in various specifications that are rated
  according to the RG Type system
 Distance and cost are considerations when selecting
  coax cable
   The thicker the copper, the farther a signal can travel --
    and with that comes a higher cost and a less-flexible
    cable
Coaxial
Coax Connector Types
Coax Connector Types
Twisted Pair
Twisted Pair
 Category 1: voice-only transmissions, two twisted pairs
 Category 2: 4Mbps, four twisted pairs
 Category 3: 10Mbps, four twisted pairs
 Category 4: 16Mbps, four twisted pairs
 Category 5: 100Mbps, four twisted pairs of copper wire
 Category 5e: up to 1Gbps, four twisted pairs of copper wire,
  but they are physically separated and contain more twists
  per foot than Category 5
 Category 6: up to 1Gbps and beyond, four twisted pairs of
  copper wire, and they are oriented differently than in
  Category 5 or 5e
Twisted-Pair Connector Types
Twisted-Pair Connector Types
Fiber-Optic
Fiber-Optic
 Referred to as either single-mode or multimode
  fiber
 Mode refers to the bundles of light that enter the
  fiber-optic cable
 Single-mode
   Uses only a single mode of light to propagate
 Multimode
   Allows multiple modes of light to propagate
   Light bounces off the cable walls as it travels through
    the cable, which causes the signal to weaken more
    quickly
Fiber-Optic
 Multimode
   Most often used as horizontal cable
   Permits multiple modes of light to propagate through the
    cable, which shortens cable distances and delivers a less
    available bandwidth
   Devices that use multimode fiber-optic cable typically use
    light-emitting diodes (LEDs)
   Higher bandwidth network devices such as Gigabit Ethernet
    are now using lasers with multimode fiber-optic cable
   ANSI/TIA/EIA-568-B recognizes two-fiber (duplex) 62.5/125
    micron multimode fiber; ANSI/TIA/EIA-568-B also
    recognizes 50/125 micron multimode fiber-optic cable
Fiber-Optic
 Single-mode
   Used as backbone cabling and in phone systems
   Light travels straight down the fiber and does not bounce off
    the cable walls
   Supports higher bandwidth and longer distances
   Devices that use single-mode typically use lasers to generate
    the light that travels through the cable
   ANSI/TIA/EIA-568-B recognizes 62.5/125 micron, 50/125
    micron, 8.3/125 micron single-mode optical fiber cables
 Maximum backbone distance using single-mode
 is 3,000 meters; maximum backbone distance
 using multimode is 2,000 meters
Fiber-Optic Connector Types
Fiber-Optic Connector Types
Wireless Networks
 Offer the ability to extend a LAN without the use
  of traditional cabling methods
 Transmissions are made through the air by
  infrared light, laser light, narrow-band radio,
  microwave, or spread-spectrum radio
 Most often in environments where standard
  cabling methods are not possible or wanted
 Not as fast or efficient as standard cabling
  methods
 More susceptible to eavesdropping and
  interference than standard cabling methods
Networking Components
 Connectivity devices
    Allow communications to break the boundaries of local
     networks
    Let your computers talk to other computers in the next
     building, the next city, or the next country
Networking Components
 There are several categories of connectivity
 devices
   Repeaters
   Hubs
   Switches
   Bridges
   Routers
 Make it possible to lengthen networks to almost
 unlimited distances
Repeaters
 Allow a cabling system to extend beyond its
  maximum allowed length by amplifying the
  network voltages
 Very inexpensive
 Operate at the Physical layer of the OSI model
 Only used to regenerate signals between similar
  network segments
 Main disadvantage is that they just amplify signals
   Not only network signals but any noise on the wire
   Used only as a temporary fix
Hubs
 Used to link several computers together
 Most often used on Ethernet networks
 Just multiport repeaters and work at Layer 1 of the
  OSI model just as repeaters do
 Repeat any signal that comes in on one port and copy
  it to the other ports (a process that is also called
  broadcasting)
Hubs
 Two types of hubs
    Passive Hubs
       Connect all ports together electrically
       Do not have their own power source
   Active hubs
       Use electronics to amplify and clean up the signal before it is
        broadcast to the other ports
       Includes a class called intelligent hubs, which can be
        remotely managed on the network
Switches
 Provide centralized connectivity just as hubs do
  (usually on twisted-pair Ethernet networks); often
  look similar, so it's easy to confuse them
 Switches examine the Layer 2 header of the
  incoming packet and forward it properly to the
  right port and only that port
 Greatly reduces overhead and thus performance
  as there is essentially a virtual connection
  between sender and receiver
Indicator Lights
 Nearly every hub or switch has one or more status
 indicator lights
   If there is a connection to that port of the switch, a light
    will light up
   If traffic is crossing the port, the light may flash, or
    there may be a secondary light
 Many devices can also detect a problem in the
  connection
 Bridges and routers will also have similar status
  lights on them, as do network cards
Bridges
 Operate in the Data Link layer of the OSI model
 Join similar topologies and used to divide network
    segments
   Keep traffic on one side from crossing to the other
   Often used to increase performance on a high-traffic
    segment
   Not able to distinguish one protocol from another,
    because higher levels of the OSI model are not available to
    them
   If a bridge is aware of the destination MAC address, it can
    forward packets; otherwise, it forwards the packets to all
    segments
Bridges
 More intelligent than repeaters
 Unable to move data across multiple networks
  simultaneously
 Main disadvantage is that they forward broadcast
  packets
   Broadcasts are addressed to all computers, so the bridge
    just does its job and forwards the packets
   Cannot perform intelligent path selection
Routers
 Highly intelligent devices that connect multiple network
    types
   Route packets across multiple networks
   Use routing tables to store network addresses
   Operate at the Network layer of the OSI model
   Can determine the best path for data to take to get to its
    destination
   Like bridges, they can segment large networks
   Slower than bridges because they analyze every packet
   More expensive
Routers
 Normally used to connect one LAN to another
 Typically, when a WAN is set up, at least two routers
  are used
 Wireless routers have become all the rage for small
  and home networks
   Possess all of the functionality of routers historically
    associated with networking, but they are relatively
    inexpensive
Wired Networks
 A network where you are using a cable to plug
  into a socket in the wall or a connectivity device
  on your table
 Historically, using wires was the only way to
  connect several machines together
 Today, wired options are becoming few and far
  between
 Two broad categories of choices to get online
   Dial-up
   Broadband
Dial-up
 One of the oldest ways of communicating with
  ISPs and remote networks
 Not used much anymore due to limitations on
  modem speed, which top out at 56Kbps
 Cannot compare to speeds possible with DSL and
  cable modems
 Dial-up Internet connections dropped from 74
  percent in 2000 to 15 percent in 2008
   Most of the people who still use dial-up do it because
   it's cheaper than broadband or high-speed isn't
   available where they live
Dial-up
 Biggest advantage to dial-up is that it's cheap and
  relatively easy to configure
 Companies can grant users dial-up access to their
  networks
 ISPs and RAS servers would use the Data Link layer
  Point-to-Point Protocol (PPP) to establish and
  maintain the connection
Broadband
 A connection that is capable of transmitting multiple
  pieces of data simultaneously in order to achieve
  higher data rates
 The opposite of broadband is baseband
 Several different types of broadband Internet access
  are available, including DSL, Cable, fiber-optic, and
  satellite
DSL
DSL
 There are several different forms of DSL,
 including
   High bit-rate DSL (HDSL)
   Symmetric DSL (SDSL)
   Very high bit-rate DSL (VDSL)
   Rate-adaptive DSL (RADSL)
   Asymmetric DSL (ADSL)
 The most popular in home use is ADSL
   It's asymmetrical because it supports faster download
    speeds than upload speeds
DSL
DSL
 First ADSL standard was approved in 1998 and
  offered maximum download speeds of 8Mbps and
  upload speeds of 1Mbps
 The newest standard supports speeds up to
  24Mbps download and 3.5Mbps upload
 Most ADSL communications are full-duplex
 One major advantage that ADSL providers tout is
  that with DSL you do not share bandwidth with
  other customers
Cable Modem
 Provides high-speed Internet access through your
  cable service
 You plug your computer into the cable modem
  using a standard Ethernet cable
 In theory, cable Internet connections are faster
  than DSL connections
   Download speeds up to 30Mbps or 50Mbps and uploads
    of 5Mbps
   A caveat to these speeds is that they are not guaranteed
    and they can vary
Cable Modem
 Speeds vary because you are sharing available
  bandwidth within your distribution network
 Size of the network is usually between 100 and 2,000
  customers
 Access can be slower during peak usage times
Cable Modem
 A simplified example
    Two users are sharing a connection that has a
     maximum capacity of 40Mbps
    Each person gets 20Mbps of bandwidth
    One user gets a boost that allows her to download
     30Mbps
    The other user is left with 10Mbps of available
     bandwidth
Cable Modem
 In practice, the speeds of a cable modem are
  pretty comparable to those of DSL
 Both have pros and cons when it comes to
  reliability and speed of service
 A lot varies by service provider and isn't
  necessarily reflective of the technology
 The choice you make between DSL and cable may
  depend on which company you get the best
  package deal from
Fiber-Optic Cable
 Used mostly for high-speed telecommunications and
  network backbones
 Much more expensive than copper to install and
  operate
 Some phone and media companies are now offering
  fiber-optic Internet connections for home subscribers
Fiber-Optic Cable
 Fiber-to-the-Home (FTTH) service
   As of the time of this writing, the fastest speeds offered
    are 50Mbps download and 20Mbps upload
   FTTH is capable of reaching speeds of 100Mbps, and
    400Mbps implementations are being planned
 Fiber-to-the-Node (FTTN)
   Runs fiber to the phone or cable company's utility box
    near the street and then runs copper from there to your
    house
   Maximum speeds for this type of service are around
    25Mbps
Satellite
 Transmits signals through the air to you as opposed to
    using a cable
   Service provider beams a microwave signal from a dish on
    the ground to an orbiting satellite, which in turn sends the
    signal back down to your receiver
   Receivers are typically small satellite dishes but can also
    be portable satellite modems or portable satellite phones
   Called point-to-multipoint because one satellite can
    provide a signal to a number of receivers
   Used in a variety of applications from telecommunications
    to handheld GPSs to television and radio broadcasts
Satellite
 Considerations to keep in mind regarding satellite
    Installation can be tricky
    Line of sight is required
Satellite
 More considerations
   Latency can be a problem
   Connections are pretty slow
Wireless Networks
 As a technician, you must make sure that their
  computers can connect
 Four methods of wireless communication
   802.11x
   Bluetooth
   Cellular
   Infrared
802.11x
 WLAN standards are created and managed by the
  IEEE
 Most commonly used WLAN standards used
  today are in the IEEE 802.11x family
 IEEE 802.11 was ratified in 1997, and was the first
  standardized WLAN implementation
 Over twenty 802.11 standards defined, but you will
  only see a few in common operation: 802.11a, b,
  and g
 Among all of the wireless technologies covered,
  802.11 is the one best suited for WLANs
802.11x Networks
 Just like an Ethernet network, only wireless
 At the center of the network is a connectivity
  device such as a hub or a router, and all
  computers connect to it
 In order to connect to the wireless hub or router,
  the client needs to know the SSID of the device
 Wireless access points eventually connect back to
  a wired connection with the rest of the network
802.11x Technical Specifications
 802.11x networks use the CSMA/CA access method
    Similar to that of shared Ethernet
    Packet collisions are generally avoided
    If they do happen, the sender waits a random period of
     time (called a back-off time) before transmitting again
802.11x Technical Specifications
 802.11
   Defines WLANs transmitting at 1Mbps or 2Mbps
    bandwidths using the 2.4GHz frequency spectrum
   Uses FHSS or DSSS for data encoding
 802.11a
   Provides WLAN bandwidth of up to 54Mbps in the
    5GHz frequency spectrum
   Uses OFDM, rather than FHSS or DSSS
   Never gained widespread popularity because 802.11b
    devices were significantly cheaper and it's highly
    susceptible to external interference
802.11x Technical Specifications
 802.11b
    Provides for bandwidths of up to 11Mbps in the 2.4GHz frequency
     spectrum
    Also called WiFi or 802.11 high rate
    Uses DSSS for data
 802.11g
    Provides for bandwidths of 54Mbps+ in the 2.4GHz frequency
     spectrum
    Uses OFDM encoding
    Is backward compatible with 802.11b
 Some devices marked as 802.11b/g that can run on either
  network, and can be commingled on the same network
802.11x Technical Specifications
 Interoperability concerns
    Not capable of understanding OFDM transmissions
    To counteract this problem, uses an additional
     signaling mechanism RTS/CTS to provide backward
     compatibility
       The client must first send an RTS signal to the access point
       Once the access point sends a CTS back to the client, the client
        can transmit
       Other clients interpret the CTS signal, they interpret it as a "do
        not send" message and wait for an all-clear to send
802.11x Technical Specifications
More interoperability concerns
   When operating in mixed mode, 802.11g will use the
    less-efficient 802.11b back-off timing
   Slows down the throughput of the 802.11g access point
 The pros of 802.11g/b backward compatibility still far
 outweigh the cons
802.11x Technical Specifications
 802.11n
    At the time of this writing, still in development
    Provides bandwidths from 54Mbps to 600Mbps, but
     more realistic to expect maximum throughput in the
     300Mbps range
    Achieves faster throughput a couple of ways
       MIMO
       Channel bonding
       SDM technologies
802.11x Technical Specifications
 802.11n is backward compatible with 802.11a/b/g
 802.11n hardware is on the market today, but as the
 standard is still not official these devices are called
 "pre-N" devices
   May have compatibility issues between different
    vendors' pre-N products
802.11x Technical Specifications
802.11x Technical Specifications
 Signal modulation techniques used in the 802.11
 standards
   Direct-Sequence Spread Spectrum (DSSS)
   Frequency-Hopping Spread Spectrum (FHSS)
   Orthogonal Frequency Division Multiplexing (OFDM)
802.11x Devices
802.11x Security
 The growth of wireless systems has created several
  opportunities for attackers
 Using SSID configurations doesn't necessarily prevent
  wireless networks from being compromised
WEP
 A security standard for wireless devices
 Encrypts data to provide data security
 Has always been under scrutiny for not being as
 secure as initially intended
WEP
 Vulnerable due to weaknesses in the encryption
  algorithms
 This makes WEP one of the more vulnerable
  protocols available for security
WPA
 An improvement on WEP that was developed in 2003
 Implements some of the standards defined in the
  IEEE 802.11i specification
 Improvement over WPA is WPA2, which implements
  the full 802.11i standard
MAC Filtering
 Can be used on a wireless network to prevent certain
 clients from accessing the network
   You tell your wireless router to only allow access to
    certain MAC addresses
   Your router will allow you to deny service to a set list of
    MAC addresses (and allow all others) or allow service
    only to a set of MAC addresses (and deny all others)
Bluetooth
 Makers of Bluetooth were trying to unite disparate
  technology industries
 First Bluetooth device arrived on the scene in
  2000
 By 2002, there were over 500 Bluetooth certified
  products
 As of 2005 over 5 million Bluetooth chipsets
  shipped each week
 Current Bluetooth specification is Version 2.1+
  Enhanced Data Rate
Bluetooth Networks
 "Bluetooth wireless technology is a short-range
  communications technology intended to replace the
  cables connecting portable and/or fixed devices while
  maintaining high levels of security."
 Operates at low power and low cost and can handle
  simultaneous voice and data transmissions
 One of the unusual features of Bluetooth networks is their
  temporary nature
   This dynamically created network is called a piconet
   A Bluetooth-enabled device can communicate with up to seven
    other devices in one piconet
Bluetooth Networks
 Within the piconet, one device is the master and
 the other seven devices are slaves
   Communication can occur only between the master and
    a slave
   Role of master rotates quickly among the devices in a
    round-robin fashion
   All devices in a piconet can communicate with each
    other directly
   Current Bluetooth specifications allow for connecting
    two or more piconets together in a scatternet
Bluetooth Technical Specifications
 Version 1.2
   Adopted in November 2003
   Supports data transmissions of up to 1Mbps
 Version 2.0+ Enhanced Data Rate (EDR)
   Adopted in November 2004
   Supports data rates up to 3Mbps
 Version 2.1+EDR
   Adopted in July 2007
   Supports data rates up to 3Mbps
 All standards transmit in the 2.4-2.485GHz range
Bluetooth Technical Specifications
Bluetooth Devices
 The first device was a wireless headset for a cell
  phone
 Bluetooth-enabled computer peripherals include
   Keyboards and mice
   Printers
   Digital cameras
   MP3 players
   PDAs and handheld computers
   Cars
Bluetooth Devices
Bluetooth Devices
Infrared
 Longer than light waves but shorter than microwaves
 Most common use of infrared technology is the
  television remote control
 "Walk-up" and "point-to-point"
   You need to be at very close range
   Designed for one-to-one communication
   Requires line of sight
Infrared
Infrared Networks
 A point-to-point network between two devices
 No master or slave
 No hub-type device required
 Point one infrared-enabled device at another and
 transmit
Infrared Technical Specifications
 Current IrDA specifications allow transmission of
  data up to 16Mbps and IrDA claims that 100Mbps
  and 500Mbps standards are on the horizon
 No concerns of interference or signal conflicts
 Atmospheric conditions can play a role in
  disrupting infrared waves
 Security is not an issue
   Data is directional, and you choose when and where to
    send it
Infrared Devices
 Mice
 Keyboards
 Printers
 Keyboards for PDAs
 PDAs
 Cell phones
 Remote control
Cellular (Cellular WAN)
 Industry has revolutionized the way we communicate
 Primarily been developing in the realm of small
  handheld communications devices (phones and the
  BlackBerrys)
 Converging technologies -- cell phones and
  computers
Cellular Networks
 Very complex behind the scenes
 Cell communications require the use of a central
  access point, generally a cell tower, which is
  connected to a main hub
 Very large mesh networks with extensive range
Cellular Technical Specifications
 Two major cell standards in the United States:
  GSM and CDMA
   Not compatible with each other
 GSM uses a variety of bands to transmit
   Most popular are 900MHz and 1800MHz
   400, 450, and 850MHz are also used
 GSM splits up its channels by time division, in a
  process called Time Division Multiple Access
  (TDMA)
Cellular Technical Specifications
 Maximum rate for GSM is about 270 kilobits per
  second (Kbps)
 Maximum functional distance of GSM is about 22
  miles (35 kilometers)
 For security, GSM uses the A5/1 and A5/2 stream
  ciphers
 Newer enhancement to GSM is called General
  Packet Radio Service (GPRS)
   Designed to provide data transmissions over a GSM
    network at up to 171Kbps
Cellular Technical Specifications
 CDMA is considered a superior technology to GSM
 Doesn't break up its channels by time but rather by a code
    inserted into the communicated message
   Transmissions to occur at the same time without
    interference
   Used in GPSs
   CDMA supports download rates of over 3Mbps, with
    upload speeds of nearly 2Mbps
   Works in ranges up to 100 kilometers
   Newer takeoffs of the CDMA technology include W-
    CDMA, CDMA2000, and EVDO
Cellular Devices
 Further developed in the phone industry than the
  computer industry
 Cell phones and BlackBerrys are the most common
  cellular-equipped devices
 Cellular modems are widely available for laptops,
  most of them with a PC Card interface
Virtual Private Networks (VPNs)
 Not necessarily wired or wireless
 Not a LAN or a WAN but rather something in
  between
 Makes computers that are on opposite sides of a
  WAN link think they are on the same safe and secure
  LAN with each other
 The key word for VPNs really is security
Virtual Private Networks (VPNs)
 Device that provides VPN service is called a VPN
 concentrator
   Create virtual private networks for users logging in
    using remote access or for a large site-to-site VPN
 VPNs provide higher data throughput and
 authentication and encryption options

Contenu connexe

Tendances

Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Venkatesh Iyer
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkSudhriti Gupta
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnafahnarokz
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networksSweta Kumari Barnwal
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyDilum Bandara
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks Nicola Cerami
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer NetworksShohanaakterKakon
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environmentkem warren
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED NA000000
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer SystemsUwe Schmidt
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman IhsanSubhan_Virk_UAF
 
P2P Seminar
P2P SeminarP2P Seminar
P2P SeminarCoRehab
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals NotesCLSIG
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server modelBharath Nair
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 

Tendances (20)

Bis Chapter5
Bis Chapter5Bis Chapter5
Bis Chapter5
 
Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks Introduction to Peer-to-Peer Networks
Introduction to Peer-to-Peer Networks
 
P2p Peer To Peer Introduction
P2p Peer To Peer IntroductionP2p Peer To Peer Introduction
P2p Peer To Peer Introduction
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Peer to-peer network
Peer to-peer networkPeer to-peer network
Peer to-peer network
 
Peer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By AhnafPeer to Peer vs Client/Server Network By Ahnaf
Peer to Peer vs Client/Server Network By Ahnaf
 
Wireless networks & cellular wireless networks
Wireless networks & cellular wireless networksWireless networks & cellular wireless networks
Wireless networks & cellular wireless networks
 
Internet Architecture and Design Philosophy
Internet Architecture and Design PhilosophyInternet Architecture and Design Philosophy
Internet Architecture and Design Philosophy
 
Peer to peer Networks
Peer to peer Networks Peer to peer Networks
Peer to peer Networks
 
Introduction to computer Networks
Introduction to computer NetworksIntroduction to computer Networks
Introduction to computer Networks
 
Computing Environment
Computing EnvironmentComputing Environment
Computing Environment
 
Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED Computer Networks By NADEEM AHMED
Computer Networks By NADEEM AHMED
 
Peer-to-Peer Systems
Peer-to-Peer SystemsPeer-to-Peer Systems
Peer-to-Peer Systems
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
P2P Seminar
P2P SeminarP2P Seminar
P2P Seminar
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals Notes
 
peer to peer and client server model
peer to peer and client server modelpeer to peer and client server model
peer to peer and client server model
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 

Similaire à Networking course khurram shahzad

Similaire à Networking course khurram shahzad (20)

Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network & Networking
Network & NetworkingNetwork & Networking
Network & Networking
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
What is a network
What is a networkWhat is a network
What is a network
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Kinds of networks
Kinds of networksKinds of networks
Kinds of networks
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
Computer networks7
Computer networks7Computer networks7
Computer networks7
 
Basic of Networking
Basic of NetworkingBasic of Networking
Basic of Networking
 

Dernier

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 

Dernier (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 

Networking course khurram shahzad

  • 1. Networking Fundamentals Khurram Shahzad. Saudi Arabia +966 50 8654598 http://www.facebook.com/khurramshahzad.goraya  Stand-alone computers were insufficient in a business context  Hard-drive capacities were insufficient  Computers required a local printer  Sharing documents via the sneakernet was cumbersome  E-mail didn't exist  Networks addressed these problems
  • 2. Networking Fundamentals  Computer networks allow computers to link to each other's resources  Networks can increase productivity as well as decrease cash outlay for new hardware and software
  • 3. Networking Fundamentals  Networking today is a a relatively simple plug-and- play process  Wireless network cards can automatically detect and join networks  Of course, not all networks are that simple
  • 4. Networking Fundamentals  Background information needed to understand how networks work  LANs vs. WANs  Primary network components  Network operating systems (NOSs)  Network resource access  Network topologies  Network architectures  Transmitting data on a network
  • 5. LANs vs. WANs  Local area networks (LANs) connect computers in a single office  Wide area networks (WANs) expand the LANs to include networks outside the local environment  Think of a WAN as multiple, disbursed LANs connected together  LANs exist in many homes (wireless networks) and nearly all businesses
  • 8. Local Area Networks (LANs)  The earliest LANs could not cover large distances  Only a few software programs supported them  The first software programs were constrained by file locking  Nowadays, multiple users can access a program at one time
  • 10. Primary Network Components  Three types of components available on a network:  Servers  Clients or workstations  Resources
  • 11. Blurring the Lines  LANs and WANs were often differentiated by their connection speeds in the 1980s and 90s  LANs connected computers with a 10Mbps connection or faster  WANs often connected to each other by very expensive T1 connections (a maximum bandwidth of 1.544Mbps)
  • 12. Blurring the Lines  Today, connections of 1Gbps are fairly common  WAN, while still slower than LAN connectivity, can be several times faster than the T1  Because of the speed increases, categorizing networks based on connection speed is outdated  Today, the most common way to classify a network is based on geographical distance
  • 13. Servers  Core component of the network  Provide a link to the resources needed to perform tasks  Direct client computers  Centralize the control of resources and security  Balance the load on computers  Compartmentalize files
  • 14. Servers  Perform several different critical tasks  File servers  Print servers  Can be multipurpose or single-purpose  Can be dedicated or nondedicated
  • 15. Dedicated Servers  Assigned to provide specific applications or services for the network and nothing else  Requires fewer resources from the computer that is hosting it  Savings in overhead may translate to a certain efficiency  A web server is an example of a dedicated server
  • 16. Nondedicated Servers  Assigned to provide one or more network services and local access  Slightly more flexible in its day-to-day use than a dedicated server  Often serve as a front-end for the administrator  Can act as a workstation as well as a server  Can function well in a peer-to-peer environment
  • 17. Dedicated and Nondedicated  Many networks use both dedicated and nondedicated servers  Offers improved network performance and flexibility
  • 18. Workstations  The computers on which the network users do their work  Connected to a network that offers additional resources  Can range from diskless computer systems to desktop systems  Also known as client computers
  • 19. Workstations  Items needed to make a workstation into a network client  Network interface card (NIC)  Special expansion card  Cabling system  Client software
  • 20. Workstations  To users, being on a network changes a few things:  They can store more information  They can share and receive information from other users  They can use programs that would be too large or complex for their computer  They can use hardware not attached directly to their computer
  • 21. Network Resources  A resource is any item that can be used on a network  Resources can include  Printers and other peripherals  Disk storage and file access  Applications
  • 22. Network Resources  Networks give users more storage space to store files  Storing files on a server allows the administrator to back up user files
  • 23. Network Resources  Files that all users need to access can also be stored on a server  Applications (programs) no longer need to be on every computer in the office
  • 24. Being on a Network Brings Responsibilities  When you are on a network, you need to take responsibility for your actions  You cannot randomly delete files or move documents from server to server  You do not own your e-mail  Printing does not mean that if you send something to print it will print immediately  If your workstation has also been set up as a nondedicated server, you cannot turn it off
  • 25. Network Operating Systems (NOSs)  Networks use a NOS to control the communication with resources and the flow of data across the network  The NOS runs on the server  With today's NOSs, servers are able to monitor memory, CPU time, disk space, and peripherals without a babysitter
  • 26. Network Operating Systems (NOSs)  LANs and WANs allow for a wide range of collaboration  NOSs provide this functionality on a network
  • 27. Network Resource Access  Peer-to-peer and client-server  Questions to ask  What is the size of the organization?  How much security does the company require?  What software or hardware does the resource require?  How much administration does it need?  How much will it cost?  Will this resource meet the needs of the organization today and in the future?  Will additional training be needed?
  • 29. Peer-to-Peer Networks  No centralized administration or control  Every station has unique control over the resources the computer owns  Lack of centralized control can make it difficult to administer the network  The network isn't very secure  May not be easy to locate resources  Users need more training
  • 30. Peer-to-Peer Networks  The right choice for small companies that don't expect future growth  Setting up a peer-to-peer resource model simply because it is cheap and easy to install could be a costly mistake
  • 32. Client-Server Resource Model  Server-based networks are also known as domains  The key characteristic of a domain is that security is centrally administered  When you log in to the network, the login request is passed to the server responsible for security  In a peer-to-peer model, users need a user account set up on each machine  In a domain, all user accounts are stored on the server
  • 33. Client-Server Resource Model  The desired model for companies that are continually growing or that need to initially support a large environment  Server-based networks offer flexibility  Hardware costs may be more, but managing resources becomes less time consuming  Only a few administrators need to be trained  Users are only responsible for their own work environment
  • 34. Resource Access Model  Always take the time to plan your network before installing it  You don't want the type of network you chose to not meet the needs of the company
  • 35. Network Topologies  A way of laying out the network  Can be physical or logical  Five primary topologies  Bus (can be both logical and physical)  Star (physical only)  Ring (can be both logical and physical)  Mesh (can be both logical and physical)  Hybrid (usually physical)
  • 37. Bus Topology  Easy to install  Cheapest to install  Difficult to add a workstation  Expensive to maintain
  • 41. Mesh Topology  Expensive to install and maintain  The advantage you gain is high fault tolerance  Found in WANs to connect multiple sites across WAN links  Routers are used to search multiple routes through the mesh  Becomes inefficient with five or more entities
  • 42. Hybrid Topology  A mix of the other topologies  Most networks today are not only hybrid but heterogeneous  May be more expensive, but it exploits the best features of all the other topologies
  • 44. Network Architectures  Define the structure of the network, including hardware, software, and physical layout  Performance is usually discussed in terms of bandwidth  Major architectures used today are Ethernet and Token Ring
  • 45. Ethernet  Original definition of the IEEE 802.3 model included a bus topology using coaxial cable and baseband signaling  From this model came the first Ethernet architecture  Has several specifications, each one specifying the speed, communication method, and cable  Original Ethernet was given a designation of 10Base5
  • 46. Token Ring  Exactly like the IEEE 802.5 specification  Uses a physical star, logical ring topology  Workstations are cabled to a central device called a multistation access unit (MAU)  Can use shielded or unshielded cable and can transmit data at either 4Mbps or 16Mbps
  • 47. Transmitting Data on a Network  To facilitate communication across a network, computers use a common language called a protocol  Protocols are a language with rules that need to be followed so that both computers understand the right communication behavior  Computers need standards to follow to keep their communication  OSI model  IEEE 802 standards
  • 48. OSI Model  The International Organization for Standardization (ISO) introduced the Open Systems Interconnection (OSI) model  The ISO put together a seven-layer model providing a relationship between the stages of communication  As transmission takes place data passes through the layers
  • 49. OSI Model  The OSI model layers from top to bottom  7. Application layer  6. Presentation layer  5. Session layer  4. Transport layer  3. Network layer  2. Data Link layer  1. Physical layer
  • 50. OSI Model  Application layer  Allows access to network services  The layer at which file and print services operate  Presentation layer  Determines the format of the data  Performs protocol conversion and manages data compression, data translation, and encryption  Character set information is determined at this level
  • 51. OSI Model  Session layer  Allows applications on different computers to establish, maintain, and end a session  Enables network procedures, such as identifying passwords, logons, and network monitoring  Transport layer  Verifies that all packets were received by the destination host on a TCP/IP network  Controls the data flow and troubleshoots any problems with transmitting or receiving datagrams  Provides error checking and reliable, end-to-end communications
  • 52. OSI Model  Network layer  Responsible for logical addressing of messages  At this layer, the data is organized into chunks called packets  Manages traffic through packet switching, routing, and controlling congestion of data  Data Link layer  Arranges data into chunks called frames  Describes the unique physical address (MAC address)  Subdivided into two sections: Media Access Control (MAC) and Logical Link Control (LLC)
  • 53. OSI Model  Physical layer  Describes how the data gets transmitted over a physical medium  Defines how long each piece of data is and the translation of each into the electrical pulses that are sent over the wires  Decides whether data travels unidirectionally or bidirectionally across the hardware  Relates electrical, optical, mechanical, and functional interfaces to the cable
  • 55. IEEE 802 Standards  Designed primarily for enhancements to the bottom three layers of the OSI model  Breaks the Data Link layer into two sublayers  The LLC sublayer manages data link communications  The MAC sublayer watches out for data collisions and assigns physical addresses
  • 56. IEEE 802.3 CSMA/CD (Ethernet)  Ethernet is the most well-known example of the IEEE 802.3 CSMA/CD standard  The original 802.3 CSMA/CD standard  Defines a bus topology network that uses a 50 ohm coaxial baseband cable  Carries transmissions at 10Mbps  Groups data bits into frames and uses the CSMA/ CD cable access method  Currently, the 802.3 standard has been amended to include speeds up to 10Gbps
  • 57. IEEE 802.3 CSMA/CD (Ethernet)  The CSMA/CD acronym illustrates how it works  Carrier Sense (CS) means that computers on the network are listening to the wire at all times  Multiple Access (MA) means that multiple computers have access to the line at the same time  Collision Detection (CD) detects collisions and senders send again  CSMA/CD technology is considered a contention- based access method
  • 58. IEEE 802.3 CSMA/CD (Ethernet)  The only major downside to 802.3 is that with large networks (more than 100 computers on the same cable), the number of collisions increases to the point where more collisions than transmissions are taking place
  • 59. IEEE 802.5 Token Ring  Specifies a physical star, logical ring topology that uses a token-passing technology to put the data on the cable  IBM developed this technology for its mainframe and minicomputer networks
  • 60. IEEE 802.5 Token Ring  A chunk of data called a token circulates the ring  A computer with data to transmit takes a free token off the ring, modifies it, places the token (along with the data) back on the ring  The token travels around the ring  The destination computer takes the token and data off the wire and places the token back on the wire  When the original sender receives the token back, it modifies the token to make it free for use and sends the token back on the ring
  • 61. IEEE 802.5 Token Ring  Main advantage of the token-passing access method is that it eliminates collisions  Whole procedure takes place in a few milliseconds  Scales very well  Not uncommon for Token Ring networks based on the IEEE 802.5 standard to reach hundreds of workstations on a single ring
  • 62. Understanding Networking Protocols  Computers use a protocol as a common language for communication  A protocol is a set of rules that govern communications  Protocols detail what "language" the computers are speaking when they talk over a network  If two computers are going to communicate, they both must be using the same protocol
  • 63. Understanding Networking Protocols  The A+ exam objectives list two common protocols: TCP/IP and NetBIOS  Other common protocols  IPX/SPX  AppleTalk
  • 64. TCP/IP  Most popular network protocol in use today  Named after two of its hardest-working protocols, Transmission Control Protocol (TCP) and Internet Protocol (IP), but contains dozens of protocols  Protocol of the Internet  Robust and flexible  Works on disparate operating systems such as Unix, Linux, and Windows  Flexibility comes from its modular nature
  • 68. IP Addresses  Each device needs to have a unique IP address  Any device with an IP address is referred to as a host  Configure manually or automatically from a DHCP server
  • 69. IP Addresses  A 32-bit hierarchical address that identifies a host on the network  Typically written in dotted-decimal notation, such as 192.168.10.55  Each of the numbers represents eight bits (or one byte) of the address, also known as an octet  The same address written in binary would be 11000000 10101000 00001010 00110111  Numbers will be between 0 and 255
  • 70. IP Addresses  Addresses are said to be hierarchical  Numbers at the beginning of the address identify groups of computers that belong to the same network
  • 71. Parts of the IP Address  Each IP address is made up of two components: the network ID and the host ID  Network portion comes before the host portion  Network portion does not have to be a specific fixed length
  • 72. Parts of the IP Address  Computers differentiate where the network address ends and the host address begins through the subnet mask  A value written just like an IP address and may look something like 255.255.255.0  Any bit that is set to a 1 in the subnet mask makes the corresponding bit in the IP address part of the network address  The number 255 is the highest number you will ever see in IP addressing, and it means that all bits in the octet are set to 1
  • 73. Parts of the IP Address  An example  The subnet mask of 255.255.255.0 indicates that the first three octets are the network portion of the address, and the last octet is the host portion  In the IP address of 192.168.10.55, the network portion is 192.168.10 and the host portion is 55
  • 74. IP Address Classes  Classes of networks are based on their size  Class A - huge companies with thousands of computers  Class C - companies with few computers  Class B - medium-sized companies  Class D and E - reserved  The class of address can be identified by the first octet of the IP address
  • 75. Class A  Designed for very large networks  Default network portion for Class A networks is the first 8 bits  Only 126 Class A network addresses available  Remaining 24 bits of the address allow each Class A network to hold as many as 16,777,214 hosts  All possible Class A networks are in use; no more are available
  • 76. Class B  Designed for medium-sized networks  Default network portion for Class B networks is the first 16 bits  Allows for 16,384 networks, each with as many as 65,534 hosts attached  Class B networks are generally regarded as unavailable
  • 77. Class C  Designed for smaller networks  Default network portion for Class C networks is the first 24 bits  Allows for 2,097,152 networks, but each network can have a maximum of only 254 hosts  Most companies have Class C network addresses  Class C networks are still available
  • 79. Common Ports  Each protocol in the TCP/IP suite that operates at the Process/Application layer uses a port number to identify information it sends or receives  The port number, when combined with the host's IP address, is called a socket
  • 80. Common Ports  65,536 ports numbered from 0 to 65535  Ports 0 through 1023 are called the well-known ports  1024 through 49151 are called the registered ports  Anything from 49152 to 65535 is free to be used by application vendors
  • 82. DHCP and DNS  Both are run off a server and provide key services to network clients  A DHCP server can be configured to automatically provide IP configuration information to clients  IP address  Subnet mask  Default gateway (the "door" to the outside world)  DNS server address
  • 83. DHCP and DNS  DNS resolves hostnames to IP addresses  Allows your computer to get the address of the website you want and traverse the Internet to find it
  • 84. DHCP and DNS  DNS works the same way on an intranet  Instead of helping you find google.com, it may help you find Jenny's print server or Joe's file server
  • 85. Other Protocols  There probably aren't any reasons why you would want to use a different protocol  Only knock on TCP/IP is that it can be more difficult to configure than other protocols  Only other protocol called out on the A+ Essentials exam objectives is NetBIOS
  • 86. NetBEUI/NetBIOS  NetBIOS is an acronym formed from network basic input/output system  Is a Session layer network protocol  Provides an interface with a consistent set of commands for requesting lower-level network services to transmit information from node to node
  • 87. NetBEUI/NetBIOS  NetBEUI is an acronym formed from NetBIOS Extended User Interface  An implementation and extension of IBM's NetBIOS transport protocol from Microsoft  Shipped with all versions of Microsoft's operating systems and is generally considered to have a lot of overhead  Has no networking layer and therefore no routing capability
  • 88. NetBEUI/NetBIOS  These protocols make up a very fast protocol suite that most people call NetBEUI/NetBIOS  Good for small LANs  Allows users to find and use the network services they need easily  Because it contains no Network layer protocol, it cannot be routed and thus cannot be used on a WAN
  • 89. IPX/SPX  Default communication protocol for versions of the Novell NetWare operating system before NetWare 5  A communication protocol similar to TCP/IP  Used primarily in LANs  Two main protocols in IPX/SPX are IPX and SPX  SPX provides similar functions to TCP  IPX provides functions similar to the TCP/IP suite protocols IP and UDP
  • 91. AppleTalk  Not just a protocol - it is a proprietary network architecture for Macintosh computers  Uses a Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) technology to put data on the cable  Unlike Ethernet, which uses a CSMA/CD method (where the CD stands for Collision Detection), it uses smart interface cards to detect traffic before it tries to send data  A CSMA/CA card listens to the wire
  • 92. AppleTalk  Big selling point of AppleTalk  Simple and cheap  Came installed on Macintosh computers  Assigned itself an address  Problems  Slow  Limited in capacity  Had to license it from Apple  Today, TCP/IP is the default networking protocol on Macs
  • 93. Network Interface Cards (NICs)  Physical interface between computer and cabling  Prepares, sends, and controls flow of data  Considerations when choosing a NIC  Preparing data  Sending and controlling data  Configuration  Drivers  Compatibility  Performance
  • 94. Preparing Data  In the computer, data moves along buses in parallel  The NIC translates the data from the computer into signals that can flow easily along the cable  It translates digital signals into electrical signals (and in the case of fiber-optic NICs, to optical signals)
  • 95. Sending and Controlling Data  For two computers to send and receive data, the cards must agree on several things  Maximum size of the data frames  Amount of data sent before giving confirmation  Time needed between transmissions  Amount of time to wait before sending confirmation  Amount of data a card can hold  Speed at which data transmits
  • 96. Sending and Controlling Data  To successfully send data on the network, all NICs need to use the same media access method  If you try to use cards of different types neither of them would be able to communicate with the other unless you had a separate hardware device between them that could translate
  • 97. Sending and Controlling Data  NICs can send data using either full-duplex or half-duplex mode  Half-duplex means that between the sender and receiver, only one can transmit at any one time  In full-duplex communication, a computer can send and receive data simultaneously  Main advantage of full-duplex over half-duplex communication is performance  NICs can operate twice as fast (200Mbps) in full-duplex mode as they do normally in half-duplex mode (100Mbps)
  • 98. NIC Configuration  The NIC's configuration may include  Manufacturer's hardware address  IRQ address  Base I/O port address  Base memory address  Each card must have a unique MAC address  If two cards on the same network have the same MAC address, neither one will be able to communicate  IEEE has established a standard for hardware addresses
  • 99. NIC Drivers  For the computer to use the NIC, it is very important to install the proper device drivers  Drivers communicate directly with the network redirector and adapter  Operate in the Media Access Control sublayer of the Data Link layer of the OSI model
  • 100. PC Bus Type  Choose NIC that fits the bus type of your PC  If you have more than one type of bus in your PC use a NIC that fits into the fastest type  More and more computers are using network cards that have either PC Card or USB interfaces
  • 101. Network Interface Card Performance  Most important goal of the network adapter card is to optimize network performance and minimize the amount of time needed to transfer data packets across the network  Ensure you get the fastest card you can for the type of network you're on
  • 102. Cabling and Connectors  Cable properly moves the data to its intended destination  Four main types of cabling methods  Coaxial cable  Twisted-pair cable  Fiber-optic cable  Wireless
  • 104. Coaxial  Available in various specifications that are rated according to the RG Type system  Distance and cost are considerations when selecting coax cable  The thicker the copper, the farther a signal can travel -- and with that comes a higher cost and a less-flexible cable
  • 109. Twisted Pair  Category 1: voice-only transmissions, two twisted pairs  Category 2: 4Mbps, four twisted pairs  Category 3: 10Mbps, four twisted pairs  Category 4: 16Mbps, four twisted pairs  Category 5: 100Mbps, four twisted pairs of copper wire  Category 5e: up to 1Gbps, four twisted pairs of copper wire, but they are physically separated and contain more twists per foot than Category 5  Category 6: up to 1Gbps and beyond, four twisted pairs of copper wire, and they are oriented differently than in Category 5 or 5e
  • 113. Fiber-Optic  Referred to as either single-mode or multimode fiber  Mode refers to the bundles of light that enter the fiber-optic cable  Single-mode  Uses only a single mode of light to propagate  Multimode  Allows multiple modes of light to propagate  Light bounces off the cable walls as it travels through the cable, which causes the signal to weaken more quickly
  • 114. Fiber-Optic  Multimode  Most often used as horizontal cable  Permits multiple modes of light to propagate through the cable, which shortens cable distances and delivers a less available bandwidth  Devices that use multimode fiber-optic cable typically use light-emitting diodes (LEDs)  Higher bandwidth network devices such as Gigabit Ethernet are now using lasers with multimode fiber-optic cable  ANSI/TIA/EIA-568-B recognizes two-fiber (duplex) 62.5/125 micron multimode fiber; ANSI/TIA/EIA-568-B also recognizes 50/125 micron multimode fiber-optic cable
  • 115. Fiber-Optic  Single-mode  Used as backbone cabling and in phone systems  Light travels straight down the fiber and does not bounce off the cable walls  Supports higher bandwidth and longer distances  Devices that use single-mode typically use lasers to generate the light that travels through the cable  ANSI/TIA/EIA-568-B recognizes 62.5/125 micron, 50/125 micron, 8.3/125 micron single-mode optical fiber cables  Maximum backbone distance using single-mode is 3,000 meters; maximum backbone distance using multimode is 2,000 meters
  • 118. Wireless Networks  Offer the ability to extend a LAN without the use of traditional cabling methods  Transmissions are made through the air by infrared light, laser light, narrow-band radio, microwave, or spread-spectrum radio  Most often in environments where standard cabling methods are not possible or wanted  Not as fast or efficient as standard cabling methods  More susceptible to eavesdropping and interference than standard cabling methods
  • 119. Networking Components  Connectivity devices  Allow communications to break the boundaries of local networks  Let your computers talk to other computers in the next building, the next city, or the next country
  • 120. Networking Components  There are several categories of connectivity devices  Repeaters  Hubs  Switches  Bridges  Routers  Make it possible to lengthen networks to almost unlimited distances
  • 121. Repeaters  Allow a cabling system to extend beyond its maximum allowed length by amplifying the network voltages  Very inexpensive  Operate at the Physical layer of the OSI model  Only used to regenerate signals between similar network segments  Main disadvantage is that they just amplify signals  Not only network signals but any noise on the wire  Used only as a temporary fix
  • 122. Hubs  Used to link several computers together  Most often used on Ethernet networks  Just multiport repeaters and work at Layer 1 of the OSI model just as repeaters do  Repeat any signal that comes in on one port and copy it to the other ports (a process that is also called broadcasting)
  • 123. Hubs  Two types of hubs  Passive Hubs  Connect all ports together electrically  Do not have their own power source  Active hubs  Use electronics to amplify and clean up the signal before it is broadcast to the other ports  Includes a class called intelligent hubs, which can be remotely managed on the network
  • 124. Switches  Provide centralized connectivity just as hubs do (usually on twisted-pair Ethernet networks); often look similar, so it's easy to confuse them  Switches examine the Layer 2 header of the incoming packet and forward it properly to the right port and only that port  Greatly reduces overhead and thus performance as there is essentially a virtual connection between sender and receiver
  • 125. Indicator Lights  Nearly every hub or switch has one or more status indicator lights  If there is a connection to that port of the switch, a light will light up  If traffic is crossing the port, the light may flash, or there may be a secondary light  Many devices can also detect a problem in the connection  Bridges and routers will also have similar status lights on them, as do network cards
  • 126. Bridges  Operate in the Data Link layer of the OSI model  Join similar topologies and used to divide network segments  Keep traffic on one side from crossing to the other  Often used to increase performance on a high-traffic segment  Not able to distinguish one protocol from another, because higher levels of the OSI model are not available to them  If a bridge is aware of the destination MAC address, it can forward packets; otherwise, it forwards the packets to all segments
  • 127. Bridges  More intelligent than repeaters  Unable to move data across multiple networks simultaneously  Main disadvantage is that they forward broadcast packets  Broadcasts are addressed to all computers, so the bridge just does its job and forwards the packets  Cannot perform intelligent path selection
  • 128. Routers  Highly intelligent devices that connect multiple network types  Route packets across multiple networks  Use routing tables to store network addresses  Operate at the Network layer of the OSI model  Can determine the best path for data to take to get to its destination  Like bridges, they can segment large networks  Slower than bridges because they analyze every packet  More expensive
  • 129. Routers  Normally used to connect one LAN to another  Typically, when a WAN is set up, at least two routers are used  Wireless routers have become all the rage for small and home networks  Possess all of the functionality of routers historically associated with networking, but they are relatively inexpensive
  • 130. Wired Networks  A network where you are using a cable to plug into a socket in the wall or a connectivity device on your table  Historically, using wires was the only way to connect several machines together  Today, wired options are becoming few and far between  Two broad categories of choices to get online  Dial-up  Broadband
  • 131. Dial-up  One of the oldest ways of communicating with ISPs and remote networks  Not used much anymore due to limitations on modem speed, which top out at 56Kbps  Cannot compare to speeds possible with DSL and cable modems  Dial-up Internet connections dropped from 74 percent in 2000 to 15 percent in 2008  Most of the people who still use dial-up do it because it's cheaper than broadband or high-speed isn't available where they live
  • 132. Dial-up  Biggest advantage to dial-up is that it's cheap and relatively easy to configure  Companies can grant users dial-up access to their networks  ISPs and RAS servers would use the Data Link layer Point-to-Point Protocol (PPP) to establish and maintain the connection
  • 133. Broadband  A connection that is capable of transmitting multiple pieces of data simultaneously in order to achieve higher data rates  The opposite of broadband is baseband  Several different types of broadband Internet access are available, including DSL, Cable, fiber-optic, and satellite
  • 134. DSL
  • 135. DSL  There are several different forms of DSL, including  High bit-rate DSL (HDSL)  Symmetric DSL (SDSL)  Very high bit-rate DSL (VDSL)  Rate-adaptive DSL (RADSL)  Asymmetric DSL (ADSL)  The most popular in home use is ADSL  It's asymmetrical because it supports faster download speeds than upload speeds
  • 136. DSL
  • 137. DSL  First ADSL standard was approved in 1998 and offered maximum download speeds of 8Mbps and upload speeds of 1Mbps  The newest standard supports speeds up to 24Mbps download and 3.5Mbps upload  Most ADSL communications are full-duplex  One major advantage that ADSL providers tout is that with DSL you do not share bandwidth with other customers
  • 138. Cable Modem  Provides high-speed Internet access through your cable service  You plug your computer into the cable modem using a standard Ethernet cable  In theory, cable Internet connections are faster than DSL connections  Download speeds up to 30Mbps or 50Mbps and uploads of 5Mbps  A caveat to these speeds is that they are not guaranteed and they can vary
  • 139. Cable Modem  Speeds vary because you are sharing available bandwidth within your distribution network  Size of the network is usually between 100 and 2,000 customers  Access can be slower during peak usage times
  • 140. Cable Modem  A simplified example  Two users are sharing a connection that has a maximum capacity of 40Mbps  Each person gets 20Mbps of bandwidth  One user gets a boost that allows her to download 30Mbps  The other user is left with 10Mbps of available bandwidth
  • 141. Cable Modem  In practice, the speeds of a cable modem are pretty comparable to those of DSL  Both have pros and cons when it comes to reliability and speed of service  A lot varies by service provider and isn't necessarily reflective of the technology  The choice you make between DSL and cable may depend on which company you get the best package deal from
  • 142. Fiber-Optic Cable  Used mostly for high-speed telecommunications and network backbones  Much more expensive than copper to install and operate  Some phone and media companies are now offering fiber-optic Internet connections for home subscribers
  • 143. Fiber-Optic Cable  Fiber-to-the-Home (FTTH) service  As of the time of this writing, the fastest speeds offered are 50Mbps download and 20Mbps upload  FTTH is capable of reaching speeds of 100Mbps, and 400Mbps implementations are being planned  Fiber-to-the-Node (FTTN)  Runs fiber to the phone or cable company's utility box near the street and then runs copper from there to your house  Maximum speeds for this type of service are around 25Mbps
  • 144. Satellite  Transmits signals through the air to you as opposed to using a cable  Service provider beams a microwave signal from a dish on the ground to an orbiting satellite, which in turn sends the signal back down to your receiver  Receivers are typically small satellite dishes but can also be portable satellite modems or portable satellite phones  Called point-to-multipoint because one satellite can provide a signal to a number of receivers  Used in a variety of applications from telecommunications to handheld GPSs to television and radio broadcasts
  • 145. Satellite  Considerations to keep in mind regarding satellite  Installation can be tricky  Line of sight is required
  • 146. Satellite  More considerations  Latency can be a problem  Connections are pretty slow
  • 147. Wireless Networks  As a technician, you must make sure that their computers can connect  Four methods of wireless communication  802.11x  Bluetooth  Cellular  Infrared
  • 148. 802.11x  WLAN standards are created and managed by the IEEE  Most commonly used WLAN standards used today are in the IEEE 802.11x family  IEEE 802.11 was ratified in 1997, and was the first standardized WLAN implementation  Over twenty 802.11 standards defined, but you will only see a few in common operation: 802.11a, b, and g  Among all of the wireless technologies covered, 802.11 is the one best suited for WLANs
  • 149. 802.11x Networks  Just like an Ethernet network, only wireless  At the center of the network is a connectivity device such as a hub or a router, and all computers connect to it  In order to connect to the wireless hub or router, the client needs to know the SSID of the device  Wireless access points eventually connect back to a wired connection with the rest of the network
  • 150. 802.11x Technical Specifications  802.11x networks use the CSMA/CA access method  Similar to that of shared Ethernet  Packet collisions are generally avoided  If they do happen, the sender waits a random period of time (called a back-off time) before transmitting again
  • 151. 802.11x Technical Specifications  802.11  Defines WLANs transmitting at 1Mbps or 2Mbps bandwidths using the 2.4GHz frequency spectrum  Uses FHSS or DSSS for data encoding  802.11a  Provides WLAN bandwidth of up to 54Mbps in the 5GHz frequency spectrum  Uses OFDM, rather than FHSS or DSSS  Never gained widespread popularity because 802.11b devices were significantly cheaper and it's highly susceptible to external interference
  • 152. 802.11x Technical Specifications  802.11b  Provides for bandwidths of up to 11Mbps in the 2.4GHz frequency spectrum  Also called WiFi or 802.11 high rate  Uses DSSS for data  802.11g  Provides for bandwidths of 54Mbps+ in the 2.4GHz frequency spectrum  Uses OFDM encoding  Is backward compatible with 802.11b  Some devices marked as 802.11b/g that can run on either network, and can be commingled on the same network
  • 153. 802.11x Technical Specifications  Interoperability concerns  Not capable of understanding OFDM transmissions  To counteract this problem, uses an additional signaling mechanism RTS/CTS to provide backward compatibility  The client must first send an RTS signal to the access point  Once the access point sends a CTS back to the client, the client can transmit  Other clients interpret the CTS signal, they interpret it as a "do not send" message and wait for an all-clear to send
  • 154. 802.11x Technical Specifications More interoperability concerns  When operating in mixed mode, 802.11g will use the less-efficient 802.11b back-off timing  Slows down the throughput of the 802.11g access point  The pros of 802.11g/b backward compatibility still far outweigh the cons
  • 155. 802.11x Technical Specifications  802.11n  At the time of this writing, still in development  Provides bandwidths from 54Mbps to 600Mbps, but more realistic to expect maximum throughput in the 300Mbps range  Achieves faster throughput a couple of ways  MIMO  Channel bonding  SDM technologies
  • 156. 802.11x Technical Specifications  802.11n is backward compatible with 802.11a/b/g  802.11n hardware is on the market today, but as the standard is still not official these devices are called "pre-N" devices  May have compatibility issues between different vendors' pre-N products
  • 158. 802.11x Technical Specifications  Signal modulation techniques used in the 802.11 standards  Direct-Sequence Spread Spectrum (DSSS)  Frequency-Hopping Spread Spectrum (FHSS)  Orthogonal Frequency Division Multiplexing (OFDM)
  • 160. 802.11x Security  The growth of wireless systems has created several opportunities for attackers  Using SSID configurations doesn't necessarily prevent wireless networks from being compromised
  • 161. WEP  A security standard for wireless devices  Encrypts data to provide data security  Has always been under scrutiny for not being as secure as initially intended
  • 162. WEP  Vulnerable due to weaknesses in the encryption algorithms  This makes WEP one of the more vulnerable protocols available for security
  • 163. WPA  An improvement on WEP that was developed in 2003  Implements some of the standards defined in the IEEE 802.11i specification  Improvement over WPA is WPA2, which implements the full 802.11i standard
  • 164. MAC Filtering  Can be used on a wireless network to prevent certain clients from accessing the network  You tell your wireless router to only allow access to certain MAC addresses  Your router will allow you to deny service to a set list of MAC addresses (and allow all others) or allow service only to a set of MAC addresses (and deny all others)
  • 165. Bluetooth  Makers of Bluetooth were trying to unite disparate technology industries  First Bluetooth device arrived on the scene in 2000  By 2002, there were over 500 Bluetooth certified products  As of 2005 over 5 million Bluetooth chipsets shipped each week  Current Bluetooth specification is Version 2.1+ Enhanced Data Rate
  • 166. Bluetooth Networks  "Bluetooth wireless technology is a short-range communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security."  Operates at low power and low cost and can handle simultaneous voice and data transmissions  One of the unusual features of Bluetooth networks is their temporary nature  This dynamically created network is called a piconet  A Bluetooth-enabled device can communicate with up to seven other devices in one piconet
  • 167. Bluetooth Networks  Within the piconet, one device is the master and the other seven devices are slaves  Communication can occur only between the master and a slave  Role of master rotates quickly among the devices in a round-robin fashion  All devices in a piconet can communicate with each other directly  Current Bluetooth specifications allow for connecting two or more piconets together in a scatternet
  • 168. Bluetooth Technical Specifications  Version 1.2  Adopted in November 2003  Supports data transmissions of up to 1Mbps  Version 2.0+ Enhanced Data Rate (EDR)  Adopted in November 2004  Supports data rates up to 3Mbps  Version 2.1+EDR  Adopted in July 2007  Supports data rates up to 3Mbps  All standards transmit in the 2.4-2.485GHz range
  • 170. Bluetooth Devices  The first device was a wireless headset for a cell phone  Bluetooth-enabled computer peripherals include  Keyboards and mice  Printers  Digital cameras  MP3 players  PDAs and handheld computers  Cars
  • 173. Infrared  Longer than light waves but shorter than microwaves  Most common use of infrared technology is the television remote control  "Walk-up" and "point-to-point"  You need to be at very close range  Designed for one-to-one communication  Requires line of sight
  • 175. Infrared Networks  A point-to-point network between two devices  No master or slave  No hub-type device required  Point one infrared-enabled device at another and transmit
  • 176. Infrared Technical Specifications  Current IrDA specifications allow transmission of data up to 16Mbps and IrDA claims that 100Mbps and 500Mbps standards are on the horizon  No concerns of interference or signal conflicts  Atmospheric conditions can play a role in disrupting infrared waves  Security is not an issue  Data is directional, and you choose when and where to send it
  • 177. Infrared Devices  Mice  Keyboards  Printers  Keyboards for PDAs  PDAs  Cell phones  Remote control
  • 178. Cellular (Cellular WAN)  Industry has revolutionized the way we communicate  Primarily been developing in the realm of small handheld communications devices (phones and the BlackBerrys)  Converging technologies -- cell phones and computers
  • 179. Cellular Networks  Very complex behind the scenes  Cell communications require the use of a central access point, generally a cell tower, which is connected to a main hub  Very large mesh networks with extensive range
  • 180. Cellular Technical Specifications  Two major cell standards in the United States: GSM and CDMA  Not compatible with each other  GSM uses a variety of bands to transmit  Most popular are 900MHz and 1800MHz  400, 450, and 850MHz are also used  GSM splits up its channels by time division, in a process called Time Division Multiple Access (TDMA)
  • 181. Cellular Technical Specifications  Maximum rate for GSM is about 270 kilobits per second (Kbps)  Maximum functional distance of GSM is about 22 miles (35 kilometers)  For security, GSM uses the A5/1 and A5/2 stream ciphers  Newer enhancement to GSM is called General Packet Radio Service (GPRS)  Designed to provide data transmissions over a GSM network at up to 171Kbps
  • 182. Cellular Technical Specifications  CDMA is considered a superior technology to GSM  Doesn't break up its channels by time but rather by a code inserted into the communicated message  Transmissions to occur at the same time without interference  Used in GPSs  CDMA supports download rates of over 3Mbps, with upload speeds of nearly 2Mbps  Works in ranges up to 100 kilometers  Newer takeoffs of the CDMA technology include W- CDMA, CDMA2000, and EVDO
  • 183. Cellular Devices  Further developed in the phone industry than the computer industry  Cell phones and BlackBerrys are the most common cellular-equipped devices  Cellular modems are widely available for laptops, most of them with a PC Card interface
  • 184. Virtual Private Networks (VPNs)  Not necessarily wired or wireless  Not a LAN or a WAN but rather something in between  Makes computers that are on opposite sides of a WAN link think they are on the same safe and secure LAN with each other  The key word for VPNs really is security
  • 185. Virtual Private Networks (VPNs)  Device that provides VPN service is called a VPN concentrator  Create virtual private networks for users logging in using remote access or for a large site-to-site VPN  VPNs provide higher data throughput and authentication and encryption options