SlideShare une entreprise Scribd logo
1  sur  9
Télécharger pour lire hors ligne
1
Dr. Shahinaz. M. Al-tabbakh
Lecturer of Computer Networks
Faculty of Women for Arts, Sciences and
Edu. Ain Shames university
WHAT IS A NETWORK?
 A network is simply two or more computers
that are linked together.
 The most common types of networks are:
○ Local Area Networks (LANS) and
○ Wide Area Networks (WANS).
 The primary difference between the two is
that a LAN is generally confined to a limited
geographical area, whereas a WAN covers a
large geographical area. Most WANs are
made up of several connected LANs.
TYPES OF NETWORKS
 Local Area Network (LAN) – a network that spans
a small area such as a building or an office.
 Software applications and other resources are stored on a
file server.
 Print servers enable multiple users to share the same
printer.
 Wide Area Network (WAN) – a network that spans a
wide geographical area city or country
 there are several types of networks
 Metropolitan area network (MAN)
 Public access network (PAN)
4
 Metropolitan Area Networks (MANs)
 A metropolitan area network (MAN) is a network
designed for a town or city. MANs are generally not
owned by a single company or organization and are
commonly used to connect multiple LANs.
 Personal Area Networks (PANs)
 A personal area network (PAN) is a network of all
devices in a person’s life. PANs can keep portable
devices synchronized with a desktop PC and
coordinate Internet access and e-mail.
Other Types of Networks
Benefits Of a Computer Network
 Information sharing: Authorized users can use other
computers on the network to access and share information and
data. This could include special group projects, databases, etc.
 Hardware sharing: One device connected to a network,
such as a printer or scanner, can be shared by many users.
 Software sharing: Instead of purchasing and installing a
software program on each computer, it can be installed on the
server. All of the users can then access the program from a single
location.
 Collaborative environment: Users can work
together on group projects by combining the power and capabilities
of diverse equipment.
RISKS OF NETWORK
COMPUTING
 The security of a computer network is
challenged everyday by:
 Equipment malfunctions
 System failures
○ Note: equipment malfunctions and system failures may be
caused by natural disasters such as floods, storms, or fires,
and electrical disturbances
 Computer hackers
 Virus attacks
2
NETWORK ARCHITECTURE
 Network architecture – refers to the way a network is
designed and built. The two major types are:Peer-to-1-
1-peer architecture – Computers connect with each other in a
workgroup to share files, printers, and Internet access. This is
used to connect a small number of computers.
2-With client-server
 Each workstation getting network service is called a client,
while the computers managing the requests for facilities within
the network are called servers.
 There can be several different servers, such as a mail server,
Web server, print server, etc.
 Sending data to a server is called uploading; retrieving data
from a server is called downloading
NETWORK ARCHITECTURE
 Network architecture – refers to the way a network is
designed and built. The two major types are:Peer-to-1-
1-peer architecture – Computers connect with each other in a
workgroup to share files, printers, and Internet access. This is
used to connect a small number of computers.
2-With client-server
 Each workstation getting network service is called a client,
while the computers managing the requests for facilities within
the network are called servers.
 There can be several different servers, such as a mail server,
Web server, print server, etc.
 Sending data to a server is called uploading; retrieving data
from a server is called downloading
COMMUNICATIONS MEDIA
 Communications Channel
 To transfer data from one computer to another
requires some type of link through which the data
can be transmitted. This link is known as the
communications channel.
 To send data through the channel requires some
type of transmission media, which may be either
physical or wireless.
PHYSICAL MEDIA
 Twisted-pair cable – consists of two independently
insulated wires twisted around each other (least
expensive type of cable—the kind that is used in many telephone
systems)(UTP,STP)
 Coaxial cable – consists of an insulated center wire
grounded by a shield of braided wire (the primary type of
cabling used by the cable television industry; it is more expensive than
twisted pair) Coax cables are used to attach antennas to wireless
devices
 Fiber-optic cable – contains hundreds of clear
fiberglass or plastic fibers (threads) (made from thin,
flexible glass tubing; bandwidth is greater, so it can carry more data; it
is lighter than metal wires and is less susceptible to interference; it is
expensive)
Assignment
WRITE A RHREE PAGES FOR DATA
TRANSMISSION IN OPTIC FIBERS
STRUCTURE+MECHNISM.
Coaxial cable
Twisted-pair cable
Shielded Twisted-pair cable
3
WIRELESS MEDIA
 Microwave system – transmits data via high-frequency
radio signals through the atmosphere.Satellite system
 Radio wave cellular communication,wireless LAN
 Infrared technology – transmits data as infrared light
waves from one device to another, providing wireless
links between PCs and peripherals. WI-FI
Note: The type selected is determined by the type of
network, the size of the network, and the cost.
Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003.
HOW ARE NETWORKS
CATEGORIZED?
 Networks are usually classified using three
properties:
○ Topology
○ Protocol
○ Architecture
NETWORK
TOPOLOGIES
 Network Topology (or layout) – refers to the
way computers and peripherals are
configured to form networks
 Bus topology – all computers are linked by
a single line of cable
 Star topology – multiple computers and
peripheral devices are linked to a central
computer, called a host
 Ring topology – each computer or
workstation is connected to two other
computers, with the entire network forming
a circle
 Hybrid topology – combine network layout
types to meet their needs
NETWORK
TOPOLOGIES
NETWORK/COMMUNICATION PROTOCOLS
A protocol is simply an agreed-on set of rules and procedures
for transmitting data between two or more devices.
PROTOCOL SUIT
 Successful communication between hosts on a network
requires the interaction of many different protocols.
 A group of inter-related protocols that are necessary to
perform a communication function is called a protocol
suite.
 These protocols are implemented in software and hardware
that is loaded on each host and network device.
ROLE OF THE COMM PROTOCOLS
 The format or structure of the message.
 The process by which networking devices share information
about pathways with other networks(routing).
 How and when error and system messages are passed between
devices.
 The setup and termination of data transfer sessions.
TCP/IP and OSI models are the primary models
used when discussing network functionality.
Ultimately, designers of network protocols, services, or devices
are required to communicate to the industry by relating their
product or service to either the OSI model or the TCP/IP model,
or to both.
4
A complete communication process for TCP/IP
includes these steps:
1. Creation of data at the application layer of the originating
source end device
2. Segmentation and encapsulation of data as it passes down
the protocol stack in the source end device
3. Generation of the data onto the media at the network access
layer of the stack
4. Transportation of the data through the internetwork, which
consists of media and any intermediary devices
5. Reception of the data at the network access layer of the
destination end device
6. Decapsulation and reassembly of the data as it passes up the
stack in the destination device
7. Passing this data to the destination application at the
Application layer of the destination end device
•Layer seven, is the top layer of both the OSI and four
for TCP/IP suit.
•It is the layer that provides the interface between the
applications we use to communicate and the underlying
network over which our messages are transmitted.
•Provide services that directly support user application
such as data base , email and file transfer.
•Application layer protocols are used to exchange data
between programs running on the source and
destination hosts.
Application layer
•There are many Application layer protocols and
new protocols are always being developed.
•Hypertext Transfer Protocol (HTTP) is used to transfer Web
pages files of the World Wide Web.
•Simple Mail Transfer Protocol (SMTP) is used for the transfer
of mail messages and attachments.
Application layer
Presentation Layer
The Presentation layer has three primary functions:
•Coding and conversion of Application layer data to ensure that
data from the source device can be interpreted by the appropriate
application on the destination device.
•Compression of the data in a manner that can be decompressed
by the destination device.
•Encryption of the data for transmission and the decryption of data
upon receipt by the destination.
•Among the well-known graphic image formats are Graphics
Interchange Format (GIF), Joint Photographic Experts Group
(JPEG), and Tagged Image File Format (TIFF). GIF and JPEG are
compression and coding standards for graphic images, and TIFF
is a standard coding format for graphic images.
The Session Layer
As the name of the Session layer implies create and exchange
of information to maintain dialogs between source and
destination applications.
Allows addition of check points i.e. synchronization points in to
stream of data . In the case of crash the transmission of data can
be retransmitted from the check point in spite of retransmitting it
from the start.
The Session layer handles the exchange of information to initiate
dialogs, keep them active, and to restart sessions that are
disrupted or idle for a long period of time.
5
Transport layer(TCP LAYER)
1- creating a sessions between the applications. These
connections prepare the applications to communicate with
each other before any data is transmitted.
2-It divides each message into packets at the source and
reassembles them at the destination.(segmentation and
multiplexing)
3- port number is used in the transport layer header to indicate to
which application that piece of data is associated.
4-transport layer guarantee transmission of data from one end to
another without error
5-Ordered data reconstruction, Connection-oriented conversations
Reliable delivery
EACH FUNCTION IS SUPPORTED BY CERTAIN PROTOCOL
TCP AND UDP
 The two most common Transport layer
protocols of TCP/IP protocol suite are
Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP).
Both protocols manage the
communication of multiple applications.
The differences between the two are the
specific functions that each protocol
implements.
THE NETWORK LAYER (IP LAYER)
1. It encapsulates the segments (adding headers) to becomes a
packet and splitting it to smaller packets if the packet is
larger than largest data frame.
2. The network layer is concerned with controlling the
operation of the subnet.
3. A ROUTER is used to determining how packets are routed
from source to destination.(path selection)
4. If one path is busy, then the router will select another path for
the packets to travel. So really, the packets can all have
different paths and find their way to the final destination.
5. decapsulation
THE NETWORK LAYER(IP LAYER)
The router has millions of IP addressing built into the
software, and knows where to send the packets.
IP stands for Internet Protocol and is basically an address
that the packets will be sent to.
An example would be 216.27.61.137
THE NETWORK LAYER
If you look at the IP Address, the number are broken
into different categories.
216. 27.61.137
Classification Hosts
216. 27.61.137
Octets
6
Every machine on the Internet has a unique
identifying number, called an IP Address.
A typical IP address looks like this:
216.27.61.137
But computers communicate in binary form.
The same IP address in binary:
11011000.00011011.00111101.10001001
216.27.61.137
If you add all the positions together, you get 32,
which is why IP addresses are considered
32-bit numbers
Combine the four octets and you get 232 or a possible
4,294,967,296 unique values.
11011000.00011011.00111101.10001001
Subnetting
•Network administrators need to devise the
internetwork addressing scheme to accommodate
the maximum number of hosts for each network.
The number of hosts in each division should allow
for growth in the number of hosts.
Data link layer
•The OSI Data Link layer prepares Network layer packets for
placement onto the physical media that transports data. be it
copper, fiber, or the atmosphere.
•Interface between above layers and physical layers
•It divides the data packets received from the N.L into
manageable data units called frames
•Adds header to the frames to define the physical address of
the sender and receiver of the frame.
•Error control by adding a trailer at the end of the frame . It
uses mechanism to prevent duplication of frames.
Data link layer
Media Access control
•Putting frames on to the media
•Regulating the placement of data frames onto the media is
known as media access control .
•These methods are defined by sophisticated protocols,
which require mechanisms that introduce overhead onto the
network.
•The method of media access control used depends on:
•Media sharing - If and how the nodes share the media
•Topology - How the connection between the nodes appears
to the Data Link layer
DLL
•There are two basic media access control methods for shared
media:
•Controlled - Each node has its own time to use the medium
•Contention-based - All nodes compete for the use of the
medium
•In point-to-point connections, the Data Link layer has to
consider whether the communication is half-duplex or full-
duplex.
7
EXAMPLE OF AN ETHERNET BUS
 Ethernet LANs use a bus
topology.
 All stations are connected to
a single long cable.
 Any station can send a
signal along the cable,
which all other stations will
receive. Unlike ring
topologies, the cable doesn't
close a loop.
Networks for Beginners: http://compnetworking.about.com/
TOKEN RING NETWORK
 A token passing ring LAN is a
group of computers connected in a
loop. The group uses a token
passing access mechanism.
 A computer wishing to send data
should first receive
permission. When it gets control
of the network it may transmit a
frame. Each frame transmitted on
the ring is transmitted from one
computer to the next, until it
ultimately returns to the initiator of
the transmission.
Networks for Beginners: http://compnetworking.about.com/
Encapsulation
Data
Segmen
tsPacket
Frame
Bits
Data
Data
PHYSICAL LAYER
The three fundamental functions of the Physical layer are:
1. Data encoding
2. Signaling
3. The physical components
•Encoding is a method of converting a stream of data bits
into a predefined "code. Codes are groupings of bits used
to provide a predictable pattern that can be recognized by
both the sender and the receive
•The Physical layer must generate the electrical, optical, or
wireless signals that represent the "1" and "0" on the
media. The method of representing the bits is called the
signaling method.
Physical Layer
Describe the role of signaling in the physical media
 Explain that network communication at this
layer consists of individual bits encoded onto
the Physical layer and describe the basic
encoding techniques
8
PHYSICAL COMPONENTS
•Identify several media characteristics defined by Physical layer
standards
•Describe the impact interference has on throughput and the role
of proper cabling in reducing interference
•Identify the basic characteristics of UTP cable, STP,FIBER
Physical layer
 Identify the characteristics used to categorize
connectors, describe some common uses for the
same connectors, and identify the consequences
for misapplying a connector in a given situation
• Identify the basic characteristics of STP and Coaxial
cable
• Identify the characteristics used
to categorize connectors
•Describe the role of radio waves when using air as the media
and the increased need for security in wireless communications
INTERNET PROTOCOLS
Networks for Beginners: http://compnetworking.about.com/
 Hubs Hub provide connection to all ports (i.e. in one
port and out all other ports).
 Passive hub – no signal regeneration
 Active hub – provide signal regeneration(physical layer)
 Switches are similar to hubs, but send data to only
the appropriate output node, not all network nodes.
This increases the efficiency of the network.(good
band width utilization) (DLL)
 Routers are used in large WANs—like the Internet—
to pass packets along to their destinations. They
decide the most efficient path to send the packets
over the network.(Network layer)
depend on the knowledge of ip address, protocol
dependent. tcp/ip---------router----------tcp/ip
Network devices
9
49
Gateways and Bridges
 Gateway
is a collection of hardware and software resources that
enables devices on one network to communicate
with devices on another, dissimilar network.
Bridge
 When the two networks being linked are based on
similar technology—such as a LAN in one city and a
LAN in another—a device called a bridge is used to
connect them.
 Repeaters
are devices that amplify signals along a network.
Network devices, cont’d
Hub versus Switch

Contenu connexe

Tendances

Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and NetworksChAwais15
 
Computer network
Computer networkComputer network
Computer networkRohit Gupta
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networksViku1985
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--networkDuy Hoang Nguyen
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkOnline
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networkingNAGASHREE C
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Hasibul Islam Nirob
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network typesMolayChakraBorty
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networksSSGMCE SHEGAON
 

Tendances (20)

Data Communication and Networks
Data Communication and NetworksData Communication and Networks
Data Communication and Networks
 
Dcn concepts
Dcn conceptsDcn concepts
Dcn concepts
 
Computer network
Computer networkComputer network
Computer network
 
Networks
NetworksNetworks
Networks
 
Computer network
Computer networkComputer network
Computer network
 
Data comm and networking
Data comm and networkingData comm and networking
Data comm and networking
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Chapter 1 introduction to computer networks
Chapter 1 introduction to computer networksChapter 1 introduction to computer networks
Chapter 1 introduction to computer networks
 
OSI &TCP/IP Model
OSI &TCP/IP ModelOSI &TCP/IP Model
OSI &TCP/IP Model
 
Computer networks--network
Computer networks--networkComputer networks--network
Computer networks--network
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
A seminar on networks and networking
A seminar on networks and networkingA seminar on networks and networking
A seminar on networks and networking
 
Note: Introduction to Computer Networks
Note: Introduction to Computer Networks Note: Introduction to Computer Networks
Note: Introduction to Computer Networks
 
Computer Network its application & network types
Computer Network its application & network typesComputer Network its application & network types
Computer Network its application & network types
 
Computer network
Computer networkComputer network
Computer network
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Unit-1 intro to communication networks
Unit-1 intro to communication networksUnit-1 intro to communication networks
Unit-1 intro to communication networks
 

Similaire à Understanding Computer Networks

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking FundamentalsManjit Chavda
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptmv9499596
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
NetworkingfundamentalsSithu PM
 
Network resources
Network resourcesNetwork resources
Network resourcesRohit Kumar
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORTRajat Kumar
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Khondoker Sadia
 

Similaire à Understanding Computer Networks (20)

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Networking Fundamentals
Networking  FundamentalsNetworking  Fundamentals
Networking Fundamentals
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
computer networks
computer networks computer networks
computer networks
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Networking fundamentals (1)
Networking fundamentals (1)Networking fundamentals (1)
Networking fundamentals (1)
 
Networkingfundamentals
NetworkingfundamentalsNetworkingfundamentals
Networkingfundamentals
 
Network resources
Network resourcesNetwork resources
Network resources
 
Note1
Note1Note1
Note1
 
Fg c
Fg cFg c
Fg c
 
IP ADDRESSING AND SUBNETTING REPORT
IP ADDRESSING AND SUBNETTING  REPORTIP ADDRESSING AND SUBNETTING  REPORT
IP ADDRESSING AND SUBNETTING REPORT
 
Computer network 1
Computer network 1Computer network 1
Computer network 1
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Understanding Computer Networks

  • 1. 1 Dr. Shahinaz. M. Al-tabbakh Lecturer of Computer Networks Faculty of Women for Arts, Sciences and Edu. Ain Shames university WHAT IS A NETWORK?  A network is simply two or more computers that are linked together.  The most common types of networks are: ○ Local Area Networks (LANS) and ○ Wide Area Networks (WANS).  The primary difference between the two is that a LAN is generally confined to a limited geographical area, whereas a WAN covers a large geographical area. Most WANs are made up of several connected LANs. TYPES OF NETWORKS  Local Area Network (LAN) – a network that spans a small area such as a building or an office.  Software applications and other resources are stored on a file server.  Print servers enable multiple users to share the same printer.  Wide Area Network (WAN) – a network that spans a wide geographical area city or country  there are several types of networks  Metropolitan area network (MAN)  Public access network (PAN) 4  Metropolitan Area Networks (MANs)  A metropolitan area network (MAN) is a network designed for a town or city. MANs are generally not owned by a single company or organization and are commonly used to connect multiple LANs.  Personal Area Networks (PANs)  A personal area network (PAN) is a network of all devices in a person’s life. PANs can keep portable devices synchronized with a desktop PC and coordinate Internet access and e-mail. Other Types of Networks Benefits Of a Computer Network  Information sharing: Authorized users can use other computers on the network to access and share information and data. This could include special group projects, databases, etc.  Hardware sharing: One device connected to a network, such as a printer or scanner, can be shared by many users.  Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.  Collaborative environment: Users can work together on group projects by combining the power and capabilities of diverse equipment. RISKS OF NETWORK COMPUTING  The security of a computer network is challenged everyday by:  Equipment malfunctions  System failures ○ Note: equipment malfunctions and system failures may be caused by natural disasters such as floods, storms, or fires, and electrical disturbances  Computer hackers  Virus attacks
  • 2. 2 NETWORK ARCHITECTURE  Network architecture – refers to the way a network is designed and built. The two major types are:Peer-to-1- 1-peer architecture – Computers connect with each other in a workgroup to share files, printers, and Internet access. This is used to connect a small number of computers. 2-With client-server  Each workstation getting network service is called a client, while the computers managing the requests for facilities within the network are called servers.  There can be several different servers, such as a mail server, Web server, print server, etc.  Sending data to a server is called uploading; retrieving data from a server is called downloading NETWORK ARCHITECTURE  Network architecture – refers to the way a network is designed and built. The two major types are:Peer-to-1- 1-peer architecture – Computers connect with each other in a workgroup to share files, printers, and Internet access. This is used to connect a small number of computers. 2-With client-server  Each workstation getting network service is called a client, while the computers managing the requests for facilities within the network are called servers.  There can be several different servers, such as a mail server, Web server, print server, etc.  Sending data to a server is called uploading; retrieving data from a server is called downloading COMMUNICATIONS MEDIA  Communications Channel  To transfer data from one computer to another requires some type of link through which the data can be transmitted. This link is known as the communications channel.  To send data through the channel requires some type of transmission media, which may be either physical or wireless. PHYSICAL MEDIA  Twisted-pair cable – consists of two independently insulated wires twisted around each other (least expensive type of cable—the kind that is used in many telephone systems)(UTP,STP)  Coaxial cable – consists of an insulated center wire grounded by a shield of braided wire (the primary type of cabling used by the cable television industry; it is more expensive than twisted pair) Coax cables are used to attach antennas to wireless devices  Fiber-optic cable – contains hundreds of clear fiberglass or plastic fibers (threads) (made from thin, flexible glass tubing; bandwidth is greater, so it can carry more data; it is lighter than metal wires and is less susceptible to interference; it is expensive) Assignment WRITE A RHREE PAGES FOR DATA TRANSMISSION IN OPTIC FIBERS STRUCTURE+MECHNISM. Coaxial cable Twisted-pair cable Shielded Twisted-pair cable
  • 3. 3 WIRELESS MEDIA  Microwave system – transmits data via high-frequency radio signals through the atmosphere.Satellite system  Radio wave cellular communication,wireless LAN  Infrared technology – transmits data as infrared light waves from one device to another, providing wireless links between PCs and peripherals. WI-FI Note: The type selected is determined by the type of network, the size of the network, and the cost. Fuller, Floyd, Computers: Understanding Technology: EMC Paradigm, 2003. HOW ARE NETWORKS CATEGORIZED?  Networks are usually classified using three properties: ○ Topology ○ Protocol ○ Architecture NETWORK TOPOLOGIES  Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks  Bus topology – all computers are linked by a single line of cable  Star topology – multiple computers and peripheral devices are linked to a central computer, called a host  Ring topology – each computer or workstation is connected to two other computers, with the entire network forming a circle  Hybrid topology – combine network layout types to meet their needs NETWORK TOPOLOGIES NETWORK/COMMUNICATION PROTOCOLS A protocol is simply an agreed-on set of rules and procedures for transmitting data between two or more devices. PROTOCOL SUIT  Successful communication between hosts on a network requires the interaction of many different protocols.  A group of inter-related protocols that are necessary to perform a communication function is called a protocol suite.  These protocols are implemented in software and hardware that is loaded on each host and network device. ROLE OF THE COMM PROTOCOLS  The format or structure of the message.  The process by which networking devices share information about pathways with other networks(routing).  How and when error and system messages are passed between devices.  The setup and termination of data transfer sessions. TCP/IP and OSI models are the primary models used when discussing network functionality. Ultimately, designers of network protocols, services, or devices are required to communicate to the industry by relating their product or service to either the OSI model or the TCP/IP model, or to both.
  • 4. 4 A complete communication process for TCP/IP includes these steps: 1. Creation of data at the application layer of the originating source end device 2. Segmentation and encapsulation of data as it passes down the protocol stack in the source end device 3. Generation of the data onto the media at the network access layer of the stack 4. Transportation of the data through the internetwork, which consists of media and any intermediary devices 5. Reception of the data at the network access layer of the destination end device 6. Decapsulation and reassembly of the data as it passes up the stack in the destination device 7. Passing this data to the destination application at the Application layer of the destination end device •Layer seven, is the top layer of both the OSI and four for TCP/IP suit. •It is the layer that provides the interface between the applications we use to communicate and the underlying network over which our messages are transmitted. •Provide services that directly support user application such as data base , email and file transfer. •Application layer protocols are used to exchange data between programs running on the source and destination hosts. Application layer •There are many Application layer protocols and new protocols are always being developed. •Hypertext Transfer Protocol (HTTP) is used to transfer Web pages files of the World Wide Web. •Simple Mail Transfer Protocol (SMTP) is used for the transfer of mail messages and attachments. Application layer Presentation Layer The Presentation layer has three primary functions: •Coding and conversion of Application layer data to ensure that data from the source device can be interpreted by the appropriate application on the destination device. •Compression of the data in a manner that can be decompressed by the destination device. •Encryption of the data for transmission and the decryption of data upon receipt by the destination. •Among the well-known graphic image formats are Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), and Tagged Image File Format (TIFF). GIF and JPEG are compression and coding standards for graphic images, and TIFF is a standard coding format for graphic images. The Session Layer As the name of the Session layer implies create and exchange of information to maintain dialogs between source and destination applications. Allows addition of check points i.e. synchronization points in to stream of data . In the case of crash the transmission of data can be retransmitted from the check point in spite of retransmitting it from the start. The Session layer handles the exchange of information to initiate dialogs, keep them active, and to restart sessions that are disrupted or idle for a long period of time.
  • 5. 5 Transport layer(TCP LAYER) 1- creating a sessions between the applications. These connections prepare the applications to communicate with each other before any data is transmitted. 2-It divides each message into packets at the source and reassembles them at the destination.(segmentation and multiplexing) 3- port number is used in the transport layer header to indicate to which application that piece of data is associated. 4-transport layer guarantee transmission of data from one end to another without error 5-Ordered data reconstruction, Connection-oriented conversations Reliable delivery EACH FUNCTION IS SUPPORTED BY CERTAIN PROTOCOL TCP AND UDP  The two most common Transport layer protocols of TCP/IP protocol suite are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols manage the communication of multiple applications. The differences between the two are the specific functions that each protocol implements. THE NETWORK LAYER (IP LAYER) 1. It encapsulates the segments (adding headers) to becomes a packet and splitting it to smaller packets if the packet is larger than largest data frame. 2. The network layer is concerned with controlling the operation of the subnet. 3. A ROUTER is used to determining how packets are routed from source to destination.(path selection) 4. If one path is busy, then the router will select another path for the packets to travel. So really, the packets can all have different paths and find their way to the final destination. 5. decapsulation THE NETWORK LAYER(IP LAYER) The router has millions of IP addressing built into the software, and knows where to send the packets. IP stands for Internet Protocol and is basically an address that the packets will be sent to. An example would be 216.27.61.137 THE NETWORK LAYER If you look at the IP Address, the number are broken into different categories. 216. 27.61.137 Classification Hosts 216. 27.61.137 Octets
  • 6. 6 Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this: 216.27.61.137 But computers communicate in binary form. The same IP address in binary: 11011000.00011011.00111101.10001001 216.27.61.137 If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers Combine the four octets and you get 232 or a possible 4,294,967,296 unique values. 11011000.00011011.00111101.10001001 Subnetting •Network administrators need to devise the internetwork addressing scheme to accommodate the maximum number of hosts for each network. The number of hosts in each division should allow for growth in the number of hosts. Data link layer •The OSI Data Link layer prepares Network layer packets for placement onto the physical media that transports data. be it copper, fiber, or the atmosphere. •Interface between above layers and physical layers •It divides the data packets received from the N.L into manageable data units called frames •Adds header to the frames to define the physical address of the sender and receiver of the frame. •Error control by adding a trailer at the end of the frame . It uses mechanism to prevent duplication of frames. Data link layer Media Access control •Putting frames on to the media •Regulating the placement of data frames onto the media is known as media access control . •These methods are defined by sophisticated protocols, which require mechanisms that introduce overhead onto the network. •The method of media access control used depends on: •Media sharing - If and how the nodes share the media •Topology - How the connection between the nodes appears to the Data Link layer DLL •There are two basic media access control methods for shared media: •Controlled - Each node has its own time to use the medium •Contention-based - All nodes compete for the use of the medium •In point-to-point connections, the Data Link layer has to consider whether the communication is half-duplex or full- duplex.
  • 7. 7 EXAMPLE OF AN ETHERNET BUS  Ethernet LANs use a bus topology.  All stations are connected to a single long cable.  Any station can send a signal along the cable, which all other stations will receive. Unlike ring topologies, the cable doesn't close a loop. Networks for Beginners: http://compnetworking.about.com/ TOKEN RING NETWORK  A token passing ring LAN is a group of computers connected in a loop. The group uses a token passing access mechanism.  A computer wishing to send data should first receive permission. When it gets control of the network it may transmit a frame. Each frame transmitted on the ring is transmitted from one computer to the next, until it ultimately returns to the initiator of the transmission. Networks for Beginners: http://compnetworking.about.com/ Encapsulation Data Segmen tsPacket Frame Bits Data Data PHYSICAL LAYER The three fundamental functions of the Physical layer are: 1. Data encoding 2. Signaling 3. The physical components •Encoding is a method of converting a stream of data bits into a predefined "code. Codes are groupings of bits used to provide a predictable pattern that can be recognized by both the sender and the receive •The Physical layer must generate the electrical, optical, or wireless signals that represent the "1" and "0" on the media. The method of representing the bits is called the signaling method. Physical Layer Describe the role of signaling in the physical media  Explain that network communication at this layer consists of individual bits encoded onto the Physical layer and describe the basic encoding techniques
  • 8. 8 PHYSICAL COMPONENTS •Identify several media characteristics defined by Physical layer standards •Describe the impact interference has on throughput and the role of proper cabling in reducing interference •Identify the basic characteristics of UTP cable, STP,FIBER Physical layer  Identify the characteristics used to categorize connectors, describe some common uses for the same connectors, and identify the consequences for misapplying a connector in a given situation • Identify the basic characteristics of STP and Coaxial cable • Identify the characteristics used to categorize connectors •Describe the role of radio waves when using air as the media and the increased need for security in wireless communications INTERNET PROTOCOLS Networks for Beginners: http://compnetworking.about.com/  Hubs Hub provide connection to all ports (i.e. in one port and out all other ports).  Passive hub – no signal regeneration  Active hub – provide signal regeneration(physical layer)  Switches are similar to hubs, but send data to only the appropriate output node, not all network nodes. This increases the efficiency of the network.(good band width utilization) (DLL)  Routers are used in large WANs—like the Internet— to pass packets along to their destinations. They decide the most efficient path to send the packets over the network.(Network layer) depend on the knowledge of ip address, protocol dependent. tcp/ip---------router----------tcp/ip Network devices
  • 9. 9 49 Gateways and Bridges  Gateway is a collection of hardware and software resources that enables devices on one network to communicate with devices on another, dissimilar network. Bridge  When the two networks being linked are based on similar technology—such as a LAN in one city and a LAN in another—a device called a bridge is used to connect them.  Repeaters are devices that amplify signals along a network. Network devices, cont’d Hub versus Switch