SlideShare a Scribd company logo
1 of 31
Download to read offline
Networks Basics


         C Viven Rajendra
         viven@cse.iitb.ac.in
Contents
• What is a network?
• How does it work?
• HUB, Switch, Router.
• Classifying network.
• Proxy, IP, Subnet, DNS.
• WiFi, netmon, simple applications.
Computer Network
• A computer network is a
  group of interconnected
  “network capable
  devices”.
• Components : Network
  Interface Cards, Hubs,
  Switches, Routers and
  galvanic cable.
How does it work?
• What is communicated?
• When is it communicated?
• How is it communicated?
• Example : Talking, torch light communication.
• We need a protocol : Set of rules governing data
  communication.
• TCP/IP is such a protocol.
Basic Hardware Components
•   Network Interface Card (NIC)
•   Hub
•   Switch
•   Router
•   Cable
Network Interface Card
• Allows a network
  capable device access
  to a computer network
  such as the internet.
• The MAC address
  identifies the vendor
  and the serial number
  of the NIC which is
  unique to the card.
Hub
• A network hub or
  repeater hub is a device
  for connecting multiple
  twisted pair or fiber optic
  Ethernet devices
  together.
• When a packet arrives at
  one port, it is copied to
  all the ports of the hub
  for transmission
Switch
• A switch is a device
  that performs
  switching.
• It forwards and filters
  datagrams (chunk of
  data communication)
  between ports based
  on the Mac-Addresses
  in the packets.
Router
• Forward data packets
  between networks
  using headers and
  forwarding tables to
  determine the best path
  to forward the packets.
• Processor, OS,
  memory.
Router
Cables
• Category 5 cable, known
  as Cat 5 or "Cable and
  Telephone", is a twisted
  pair cable.(100 Mbps)
• An optical fiber is a glass
  or plastic fiber that
  carries light along its
  length.(40 Gbps)
Classifying Networks
• On the basis of scale or extent of reach of network :
  LAN, MAN, WAN.
• On the basis of connection method : hardware
  technology : Optical fibre, Ethernet, Wireless LAN.
• Functional relationship: Client-Server, Peer-to-peer.
• On the basis of network topology, Physical layout:
  Mesh, Star, Bus, Ring, Hybrid
Local Area Network (LAN)
• Most current LANs
  run on Ethernet and
  use the IEEE 802.3
  protocol for
  communication.
• IITB LAN is a very
  good example.
Metropolitan Area Network
• Large computer networks usually spanning a city.
Wide Area Network (WAN)
WAN (contd..)
• Covers a broad area (i.e., any network whose
  communications links cross metropolitan,
  regional, or national boundaries).
• The largest and most well-known example of
  a WAN is :
Networking basics
•   What is a Proxy?
•   What is an IP address?
•   What is subnet mask?
•   What is Default gateway?
•   Domain Name System (DNS)
Proxy
• Interface between internal and external
  network(Internet)
• Primary advantages:
  – Security (from outside)
  – Access control ( sites, virus)
  – Efficient network utilization due to caching
Proxy configuration in browsers
•   Institude wide : netmon.iitb.ac.in
•   Port 80 for netmon
•   LDAP username & password for netmon
•   Proxy not required for
    – *.iitb.ac.in
    – 10.0.0.0/8
• Automatic proxy configuration URL:
    – http://www.cc.iitb.ac.in/autoproxy.pac
Proxy configuration in browsers
Proxy configuration in browsers
Proxy configuration in browsers
IP address
• An Internet Protocol (IP) address is a numerical
  identification that is assigned to devices
  participating in a computer network utilizing the
  Internet Protocol for communication between its
  nodes.
• The format of an IP address is a 32-bit numeric
  address written as four numbers separated by
  periods. Each number can be zero to 255.
• Mine is 10.2.201.72
Subnet mask
• A portion of the network's computers and
  network devices that have a common,
  designated IP address routing prefix.
• A mask used to determine what subnet an IP
  address belongs to.
• An IP address has two components, the
  network address and the host address
• Hostel-2 subnet is 255.255.0.0, so allowed
  ip-addresses are 10.2.xxx.xxx
Default gateway
• A node (a router) on a computer network that
  serves as an access point to another network.
• Viewed simply as an entry point and an exit
  point in a network.
• A default gateway is used by a host when an
  IP packet's destination address belongs to
  someplace outside the local subnet.
• Hostel-2 has a computer : 10.2.250.1
Default gateway contd..
Domain Name System (DNS)
• Associates various information with domain
  names;
• It serves as the "phone book" for the Internet
  by translating human-readable computer
  hostnames, e.g. www.google.com, into IP
  addresses, e.g. 208.77.188.166, which
  networking equipment needs to deliver
  information
DNS Example
Suggested Material
• Kurose, Ross : Computer Networking: A
  Top-Down Approach.
• WikiPedia – Computer Network :
  http://en.wikipedia.org/wiki/Computer_netw
  ork
• Subnet mask : http://www.tech-
  faq.com/subnet-mask.shtml
Demo
•   SSH
•   Putty
•   Secure shell
•   Pine
•   IITB newsgroup
Thank You

More Related Content

What's hot (20)

98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
MVA slides lesson 4
MVA slides lesson 4MVA slides lesson 4
MVA slides lesson 4
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
HUB Device
HUB Device HUB Device
HUB Device
 
Computer networks basic network_hardware_1
Computer networks basic network_hardware_1Computer networks basic network_hardware_1
Computer networks basic network_hardware_1
 
Topic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpipTopic 2.3 network addressing for tcpip
Topic 2.3 network addressing for tcpip
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network Devices
Network  DevicesNetwork  Devices
Network Devices
 
Network devices
Network devicesNetwork devices
Network devices
 
Vision
VisionVision
Vision
 
Network devices
Network devicesNetwork devices
Network devices
 
IPV4 addresses
IPV4 addressesIPV4 addresses
IPV4 addresses
 
Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.Internet Protocol (IP) And Different Networking Devices.
Internet Protocol (IP) And Different Networking Devices.
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
Wireless communications
Wireless communicationsWireless communications
Wireless communications
 
Network switch
Network switchNetwork switch
Network switch
 

Similar to Power point presentation

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptxKushalSrivastava23
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingssuser06ea42
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdfCS Knowledge
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial junaidahmedsaba
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptxssuser07362a
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptxtthind
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjAmitDeshai
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 

Similar to Power point presentation (20)

09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Lesson 3 - Networking
Lesson 3 - NetworkingLesson 3 - Networking
Lesson 3 - Networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
ch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computingch5-Fog Networks and Cloud Computing
ch5-Fog Networks and Cloud Computing
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Networking Basic Refresh.pdf
Networking Basic Refresh.pdfNetworking Basic Refresh.pdf
Networking Basic Refresh.pdf
 
SOHO Network Setup Tutorial
SOHO Network Setup Tutorial SOHO Network Setup Tutorial
SOHO Network Setup Tutorial
 
info technology.pptx
info technology.pptxinfo technology.pptx
info technology.pptx
 
what is Networking and types of computer .pptx
what is Networking and types of computer .pptxwhat is Networking and types of computer .pptx
what is Networking and types of computer .pptx
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
IP ADDRESSING.pptx
IP ADDRESSING.pptxIP ADDRESSING.pptx
IP ADDRESSING.pptx
 
chapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhjchapter-4-networking hjgjjgj did hfhhfhj
chapter-4-networking hjgjjgj did hfhhfhj
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Web technology
Web technologyWeb technology
Web technology
 

Recently uploaded

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Recently uploaded (20)

Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Power point presentation

  • 1. Networks Basics C Viven Rajendra viven@cse.iitb.ac.in
  • 2. Contents • What is a network? • How does it work? • HUB, Switch, Router. • Classifying network. • Proxy, IP, Subnet, DNS. • WiFi, netmon, simple applications.
  • 3. Computer Network • A computer network is a group of interconnected “network capable devices”. • Components : Network Interface Cards, Hubs, Switches, Routers and galvanic cable.
  • 4. How does it work? • What is communicated? • When is it communicated? • How is it communicated? • Example : Talking, torch light communication. • We need a protocol : Set of rules governing data communication. • TCP/IP is such a protocol.
  • 5. Basic Hardware Components • Network Interface Card (NIC) • Hub • Switch • Router • Cable
  • 6. Network Interface Card • Allows a network capable device access to a computer network such as the internet. • The MAC address identifies the vendor and the serial number of the NIC which is unique to the card.
  • 7. Hub • A network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic Ethernet devices together. • When a packet arrives at one port, it is copied to all the ports of the hub for transmission
  • 8. Switch • A switch is a device that performs switching. • It forwards and filters datagrams (chunk of data communication) between ports based on the Mac-Addresses in the packets.
  • 9. Router • Forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets. • Processor, OS, memory.
  • 11. Cables • Category 5 cable, known as Cat 5 or "Cable and Telephone", is a twisted pair cable.(100 Mbps) • An optical fiber is a glass or plastic fiber that carries light along its length.(40 Gbps)
  • 12. Classifying Networks • On the basis of scale or extent of reach of network : LAN, MAN, WAN. • On the basis of connection method : hardware technology : Optical fibre, Ethernet, Wireless LAN. • Functional relationship: Client-Server, Peer-to-peer. • On the basis of network topology, Physical layout: Mesh, Star, Bus, Ring, Hybrid
  • 13. Local Area Network (LAN) • Most current LANs run on Ethernet and use the IEEE 802.3 protocol for communication. • IITB LAN is a very good example.
  • 14. Metropolitan Area Network • Large computer networks usually spanning a city.
  • 16. WAN (contd..) • Covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). • The largest and most well-known example of a WAN is :
  • 17. Networking basics • What is a Proxy? • What is an IP address? • What is subnet mask? • What is Default gateway? • Domain Name System (DNS)
  • 18. Proxy • Interface between internal and external network(Internet) • Primary advantages: – Security (from outside) – Access control ( sites, virus) – Efficient network utilization due to caching
  • 19. Proxy configuration in browsers • Institude wide : netmon.iitb.ac.in • Port 80 for netmon • LDAP username & password for netmon • Proxy not required for – *.iitb.ac.in – 10.0.0.0/8 • Automatic proxy configuration URL: – http://www.cc.iitb.ac.in/autoproxy.pac
  • 23. IP address • An Internet Protocol (IP) address is a numerical identification that is assigned to devices participating in a computer network utilizing the Internet Protocol for communication between its nodes. • The format of an IP address is a 32-bit numeric address written as four numbers separated by periods. Each number can be zero to 255. • Mine is 10.2.201.72
  • 24. Subnet mask • A portion of the network's computers and network devices that have a common, designated IP address routing prefix. • A mask used to determine what subnet an IP address belongs to. • An IP address has two components, the network address and the host address • Hostel-2 subnet is 255.255.0.0, so allowed ip-addresses are 10.2.xxx.xxx
  • 25. Default gateway • A node (a router) on a computer network that serves as an access point to another network. • Viewed simply as an entry point and an exit point in a network. • A default gateway is used by a host when an IP packet's destination address belongs to someplace outside the local subnet. • Hostel-2 has a computer : 10.2.250.1
  • 27. Domain Name System (DNS) • Associates various information with domain names; • It serves as the "phone book" for the Internet by translating human-readable computer hostnames, e.g. www.google.com, into IP addresses, e.g. 208.77.188.166, which networking equipment needs to deliver information
  • 29. Suggested Material • Kurose, Ross : Computer Networking: A Top-Down Approach. • WikiPedia – Computer Network : http://en.wikipedia.org/wiki/Computer_netw ork • Subnet mask : http://www.tech- faq.com/subnet-mask.shtml
  • 30. Demo • SSH • Putty • Secure shell • Pine • IITB newsgroup