This document provides an overview of networking fundamentals including network history, topologies, protocols, and devices. It discusses the evolution of networks from standalone computers connecting via modems to today's large networks. It describes common network topologies like bus, star, and ring. The document outlines the OSI and TCP/IP models and explains the functions of common networking devices like hubs, bridges, routers, and gateways. It also covers wired media like coaxial cable and fiber optic cable as well as wireless networking standards.
The document outlines the schedule and resources for a Network Technology postgraduate module. It includes 1 hour of lectures and 3 hours of lab sessions/tutorials per week. Assessments are scheduled for January and May 2013, and students can confirm dates via the university account. Additional resources are available at a provided web link. The module objectives are to understand how networks impact daily life, identify network components, opportunities/challenges of converged networks, and characteristics of network architectures like fault tolerance, scalability, quality of service and security.
The document provides an introduction to system administration. It discusses what system administration entails, including managing computers, hardware, software, operating systems, applications, networks, and users. It outlines the duties of a system administrator, such as applying updates, installing/configuring hardware/software, managing user accounts, performing backups and troubleshooting issues. It also describes the duties of a datacenter engineer, which involves server installation, monitoring, maintenance and issue resolution. The document discusses different types of administrators and users as well as operating systems that support system administration like Windows, Unix and Linux.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
This document discusses networking basics, including the two main types of networks (circuit-switched and packet-switched), how data is transmitted over networks using baseband and broadband signaling, common factors that can distort transmissions like attenuation and interference, different types of transmission media like copper cables, fiber optic, and wireless, and the function of the network interface card.
Chapter 1 introduction to computer networksViku1985
The document introduces computer networks and their types, including LAN, CAN, MAN and WAN. It describes client/server configuration and the 7-layer OSI model. It also covers network selection criteria and standards organizations that develop network standards. Case studies provide examples of using different network types in business scenarios.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
The document outlines the schedule and resources for a Network Technology postgraduate module. It includes 1 hour of lectures and 3 hours of lab sessions/tutorials per week. Assessments are scheduled for January and May 2013, and students can confirm dates via the university account. Additional resources are available at a provided web link. The module objectives are to understand how networks impact daily life, identify network components, opportunities/challenges of converged networks, and characteristics of network architectures like fault tolerance, scalability, quality of service and security.
The document provides an introduction to system administration. It discusses what system administration entails, including managing computers, hardware, software, operating systems, applications, networks, and users. It outlines the duties of a system administrator, such as applying updates, installing/configuring hardware/software, managing user accounts, performing backups and troubleshooting issues. It also describes the duties of a datacenter engineer, which involves server installation, monitoring, maintenance and issue resolution. The document discusses different types of administrators and users as well as operating systems that support system administration like Windows, Unix and Linux.
This document provides an overview of networking fundamentals including defining computer networks, types of networks like peer-to-peer and client/server, local and wide area networks, network interface cards, physical components like cabling and devices, and network architectures like Ethernet and Token Ring. Key points covered include how networks allow file sharing, printing, and communication between devices, examples of networking media and common devices, and standards for networking protocols and architectures.
This document discusses networking basics, including the two main types of networks (circuit-switched and packet-switched), how data is transmitted over networks using baseband and broadband signaling, common factors that can distort transmissions like attenuation and interference, different types of transmission media like copper cables, fiber optic, and wireless, and the function of the network interface card.
Chapter 1 introduction to computer networksViku1985
The document introduces computer networks and their types, including LAN, CAN, MAN and WAN. It describes client/server configuration and the 7-layer OSI model. It also covers network selection criteria and standards organizations that develop network standards. Case studies provide examples of using different network types in business scenarios.
SSH is a protocol for secure remote access to a machine over untrusted networks.
SSH is a replacement for telnet, rsh, rlogin and can replace ftp.
Uses Encryption.
SSH is not a shell like Unix Bourne shell and C shell (wildcard expansion and command interpreter)
Protocols And IP suite PPT
Contents are
History
TCP/IP Suite Layer
a} Network Interface
b} Internet Layer
c} Transport Layer
d} Application Layer
3.Comparison of OSI and IP
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
This document discusses different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It provides details on:
- LANs connect computers within a single building or campus, while MANs connect sites within a city and WANs connect multiple cities, countries, or continents.
- The ARPANET project in the 1960s, considered the precursor to the Internet, demonstrated the feasibility of packet switched WANs for military communications.
- Key differences between WANs and LANs include scalability and that WANs can connect many more computers and networks over greater distances.
The document describes the TCP/IP protocol stack and its layers, including the application, transport, internet, and link layers. It explains the roles and functions of each layer, such as how the application layer provides access to network resources, the transport layer prepares data for transport, and the internet layer handles logical addressing and routing. Key protocols like IP, TCP, UDP, and Ethernet are also discussed in relation to how they operate within the TCP/IP model and enable communication across networks and the internet.
This document discusses data integrity and how to preserve it. It defines data integrity as the completeness, accuracy, and consistency of data throughout its lifecycle. Data integrity ensures the validity and accuracy of data and is different from data security which protects data. Threats to data integrity include human error, transfer errors, security issues, attacks, and hardware problems. Tools are recommended to check for duplicate files and remove them to maintain integrity. Backups are also important to prevent data loss. The document outlines features of data integrity like accessibility and reliability of data. It provides a checklist for input and data validation, duplicate removal, and access controls to preserve integrity.
A network switch is a networking hardware device that connects devices on a computer network by using packet switching to receive and forward data to the destination device. It learns the MAC addresses of connected devices and forwards traffic only to the relevant ports, unlike a hub which floods traffic to all ports. Common network topologies include bus, star, ring and mesh configurations which connect devices in different patterns and have advantages and disadvantages for scalability and fault tolerance.
This document provides an overview of common Linux networking commands such as ifconfig, route, traceroute, nslookup, arp, dig, and netstat that are used to configure network interfaces, display routing tables, trace network routes, lookup domain names, manage address resolution, query DNS servers, and view network statistics. It also discusses how to use ifconfig to assign IP addresses to interfaces, route to view routing tables, arp to manage the address resolution cache, and dig for more powerful DNS lookups than nslookup.
P2P networks allow computers to share resources without a centralized server by directly connecting peers in a decentralized manner. Peers act as both suppliers and consumers of resources with access rights governed by individual machine permissions. Popular examples of P2P systems include file sharing apps like Napster and BitTorrent as well as voice chat services like Skype. While P2P networks provide advantages like low costs and ease of use, they can also be less secure and introduce challenges in maintaining version control and duplicates.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Computers are connected in a network to exchange information or resources with each other. Two or more computer are connected through network media called computer media.
There are a number of network devices or media that are involved to form computer network.
Computer loaded with Linux Operation System can also be a part of network whether it is a small or large network by multitasking and multi user natures.
Maintaining of system and network up and running is a task of System / Network Administrator’s job. In this article we are going to review frequently used network configuration and troubleshoot commands in Linux.
A server is a computer program that provides services to other computer programs and users. There are different types of servers including stand-alone servers which are not part of a domain or workgroup, domain servers which have server operating systems and active directory installed to act as domain controllers, and member servers which have server operating systems installed and are joined to a domain but do not have active directory.
Ping and traceroute are utilities used to test network connectivity and troubleshoot networking issues. Ping sends ICMP echo request packets to a host and reports response times, allowing users to check if a host is reachable. Traceroute works similarly but with incremental time-to-live values to identify each hop between the source and destination. Both tools are useful for diagnosing problems like delays, outages, and identifying failed network components.
Ethernet, Fast Ethernet, and Gigabit Ethernet interfaces provide physical connectivity at speeds of 10 Mbps, 100 Mbps, and 1000 Mbps respectively and use common Ethernet standards. Serial interfaces connect to external networks like ISPs for technologies like Frame Relay and T1/T3, while FDDI operates at 100 Mbps using token passing to prevent collisions.
A Wide Area Network (WAN) connects two or more local area networks over long distances using telecommunication technologies. It spans over 30 miles and consists of many interconnected nodes. WANs transmit voice, video, and data across distances using various connection types like leased lines, circuit switching over PSTN/ISDN, and packet switching like Frame Relay and ATM. Popular public WAN options include the Internet accessed via broadband or VPN tunnels.
This document provides an introduction to common ports and protocols. It discusses how ports specify the protocol or service being accessed and can be thought of as extensions, while protocols are the languages that applications use to communicate. It then lists and describes several common protocols and their assigned ports, including FTP (20-21), SMTP (25), HTTP (80), DNS (53), and SSH (22).
Hub, switch, router, bridge & and repeaterMaksudujjaman
This document provides descriptions of various networking devices including hubs, switches, routers, bridges, and repeaters. It explains that hubs connect multiple devices but do not filter data or determine the best path for data packets. Switches maintain a list of network addresses and transmit data packets to the correct port, allowing for faster transmission speeds than hubs. Routers route data packets based on IP addresses and connect local and wide area networks. Bridges divide large networks into smaller segments and connect different network types/architectures. Repeaters regenerate weak signals to extend transmission distances but do not amplify signals.
The document provides an overview of different versions of the Windows operating system from Windows 1.0 to the latest Windows 8.1. It describes the early versions such as Windows 1.0, 2.0 and 3.0 and highlights improvements in later versions including Windows 95, 98, 2000, ME, XP, Vista, 7, 8 and 8.1. Key features and specifications of each version are outlined such as supported RAM, hard drive space, new interface designs and additional apps. The document serves as a reference for the evolution of the Windows OS over time.
Overlay networks are computer networks built on top of another network. They add missing functionality to the underlying network without requiring a complete redesign. Some key benefits are that they avoid overburdening the base network and allow features like content routing to be performed at higher layers. However, overlay networks are also highly decentralized and can cause security, privacy, and communication issues between layers. Popular examples include peer-to-peer networks and virtual private networks.
This document provides an overview of IT infrastructure architecture and networking building blocks and concepts. It discusses the evolution from mainframe computers to local area networks and the internet. The key networking concepts covered include the OSI reference model, physical layer components like cables, patch panels and network interface cards, as well as datalink layer protocols like Ethernet and Wi-Fi.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
The document summarizes the evolution of computer networking from early networks like ARPANET in 1969 to the modern Internet. It discusses key concepts like distributed processing, network criteria of performance, reliability and security. It also covers network transmission technologies including unicast, broadcast and multicast. Different types of networks are defined, from local area networks (LANs) to wide area networks (WANs). Common network devices like hubs, switches and routers are also explained.
This document is a project report on computer networking submitted by Manas Chatterjee to the Advanced Regional Telecom Training Center. It includes a certificate verifying Manas completed the project under the guidance of R.K. Ram. The report covers topics such as types of networks, networking models, IP addressing, and basic networking components and concepts.
This document summarizes the server configuration and Active Directory setup at a school. It describes the primary and secondary ESXi servers that run domain controllers, file servers, backup servers, and terminal servers. It explains how the domain controllers manage computers and users across different domains, including the staff1, student1, and root ocaat1 domains. It provides instructions for adding user accounts, setting up group policies, configuring the DHCP and DNS servers, and establishing file sharing permissions.
This document discusses different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It provides details on:
- LANs connect computers within a single building or campus, while MANs connect sites within a city and WANs connect multiple cities, countries, or continents.
- The ARPANET project in the 1960s, considered the precursor to the Internet, demonstrated the feasibility of packet switched WANs for military communications.
- Key differences between WANs and LANs include scalability and that WANs can connect many more computers and networks over greater distances.
The document describes the TCP/IP protocol stack and its layers, including the application, transport, internet, and link layers. It explains the roles and functions of each layer, such as how the application layer provides access to network resources, the transport layer prepares data for transport, and the internet layer handles logical addressing and routing. Key protocols like IP, TCP, UDP, and Ethernet are also discussed in relation to how they operate within the TCP/IP model and enable communication across networks and the internet.
This document discusses data integrity and how to preserve it. It defines data integrity as the completeness, accuracy, and consistency of data throughout its lifecycle. Data integrity ensures the validity and accuracy of data and is different from data security which protects data. Threats to data integrity include human error, transfer errors, security issues, attacks, and hardware problems. Tools are recommended to check for duplicate files and remove them to maintain integrity. Backups are also important to prevent data loss. The document outlines features of data integrity like accessibility and reliability of data. It provides a checklist for input and data validation, duplicate removal, and access controls to preserve integrity.
A network switch is a networking hardware device that connects devices on a computer network by using packet switching to receive and forward data to the destination device. It learns the MAC addresses of connected devices and forwards traffic only to the relevant ports, unlike a hub which floods traffic to all ports. Common network topologies include bus, star, ring and mesh configurations which connect devices in different patterns and have advantages and disadvantages for scalability and fault tolerance.
This document provides an overview of common Linux networking commands such as ifconfig, route, traceroute, nslookup, arp, dig, and netstat that are used to configure network interfaces, display routing tables, trace network routes, lookup domain names, manage address resolution, query DNS servers, and view network statistics. It also discusses how to use ifconfig to assign IP addresses to interfaces, route to view routing tables, arp to manage the address resolution cache, and dig for more powerful DNS lookups than nslookup.
P2P networks allow computers to share resources without a centralized server by directly connecting peers in a decentralized manner. Peers act as both suppliers and consumers of resources with access rights governed by individual machine permissions. Popular examples of P2P systems include file sharing apps like Napster and BitTorrent as well as voice chat services like Skype. While P2P networks provide advantages like low costs and ease of use, they can also be less secure and introduce challenges in maintaining version control and duplicates.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Computers are connected in a network to exchange information or resources with each other. Two or more computer are connected through network media called computer media.
There are a number of network devices or media that are involved to form computer network.
Computer loaded with Linux Operation System can also be a part of network whether it is a small or large network by multitasking and multi user natures.
Maintaining of system and network up and running is a task of System / Network Administrator’s job. In this article we are going to review frequently used network configuration and troubleshoot commands in Linux.
A server is a computer program that provides services to other computer programs and users. There are different types of servers including stand-alone servers which are not part of a domain or workgroup, domain servers which have server operating systems and active directory installed to act as domain controllers, and member servers which have server operating systems installed and are joined to a domain but do not have active directory.
Ping and traceroute are utilities used to test network connectivity and troubleshoot networking issues. Ping sends ICMP echo request packets to a host and reports response times, allowing users to check if a host is reachable. Traceroute works similarly but with incremental time-to-live values to identify each hop between the source and destination. Both tools are useful for diagnosing problems like delays, outages, and identifying failed network components.
Ethernet, Fast Ethernet, and Gigabit Ethernet interfaces provide physical connectivity at speeds of 10 Mbps, 100 Mbps, and 1000 Mbps respectively and use common Ethernet standards. Serial interfaces connect to external networks like ISPs for technologies like Frame Relay and T1/T3, while FDDI operates at 100 Mbps using token passing to prevent collisions.
A Wide Area Network (WAN) connects two or more local area networks over long distances using telecommunication technologies. It spans over 30 miles and consists of many interconnected nodes. WANs transmit voice, video, and data across distances using various connection types like leased lines, circuit switching over PSTN/ISDN, and packet switching like Frame Relay and ATM. Popular public WAN options include the Internet accessed via broadband or VPN tunnels.
This document provides an introduction to common ports and protocols. It discusses how ports specify the protocol or service being accessed and can be thought of as extensions, while protocols are the languages that applications use to communicate. It then lists and describes several common protocols and their assigned ports, including FTP (20-21), SMTP (25), HTTP (80), DNS (53), and SSH (22).
Hub, switch, router, bridge & and repeaterMaksudujjaman
This document provides descriptions of various networking devices including hubs, switches, routers, bridges, and repeaters. It explains that hubs connect multiple devices but do not filter data or determine the best path for data packets. Switches maintain a list of network addresses and transmit data packets to the correct port, allowing for faster transmission speeds than hubs. Routers route data packets based on IP addresses and connect local and wide area networks. Bridges divide large networks into smaller segments and connect different network types/architectures. Repeaters regenerate weak signals to extend transmission distances but do not amplify signals.
The document provides an overview of different versions of the Windows operating system from Windows 1.0 to the latest Windows 8.1. It describes the early versions such as Windows 1.0, 2.0 and 3.0 and highlights improvements in later versions including Windows 95, 98, 2000, ME, XP, Vista, 7, 8 and 8.1. Key features and specifications of each version are outlined such as supported RAM, hard drive space, new interface designs and additional apps. The document serves as a reference for the evolution of the Windows OS over time.
Overlay networks are computer networks built on top of another network. They add missing functionality to the underlying network without requiring a complete redesign. Some key benefits are that they avoid overburdening the base network and allow features like content routing to be performed at higher layers. However, overlay networks are also highly decentralized and can cause security, privacy, and communication issues between layers. Popular examples include peer-to-peer networks and virtual private networks.
This document provides an overview of IT infrastructure architecture and networking building blocks and concepts. It discusses the evolution from mainframe computers to local area networks and the internet. The key networking concepts covered include the OSI reference model, physical layer components like cables, patch panels and network interface cards, as well as datalink layer protocols like Ethernet and Wi-Fi.
This document provides an overview of IP routing and routing protocols. It begins with a high-level explanation of how routing works on the internet through IP addressing and packet forwarding. It then discusses the history of routing, from static routing in early networks to the development of dynamic routing protocols. The rest of the document outlines key interior gateway protocols like OSPF and IS-IS, exterior gateway protocols like BGP, and concepts like autonomous systems and routing policy.
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
The document summarizes the evolution of computer networking from early networks like ARPANET in 1969 to the modern Internet. It discusses key concepts like distributed processing, network criteria of performance, reliability and security. It also covers network transmission technologies including unicast, broadcast and multicast. Different types of networks are defined, from local area networks (LANs) to wide area networks (WANs). Common network devices like hubs, switches and routers are also explained.
This document is a project report on computer networking submitted by Manas Chatterjee to the Advanced Regional Telecom Training Center. It includes a certificate verifying Manas completed the project under the guidance of R.K. Ram. The report covers topics such as types of networks, networking models, IP addressing, and basic networking components and concepts.
This document provides an overview of computer networks. It begins by defining a network as two or more connected computers and describes the main types as local area networks (LANs) and wide area networks (WANs). LANs are confined to a limited geographical area while WANs cover a larger area and are often composed of multiple connected LANs. The document then discusses specific network types like LANs, WANs, MANs, and PANs. It also outlines the benefits of networks like information sharing, hardware sharing, software sharing, and collaborative environments. However, it notes networks also face risks from equipment malfunctions, system failures, computer hackers, and virus attacks. The document concludes by discussing network
This document provides an overview of computer networks. It defines a network as consisting of two or more connected computers that can share resources and information. Networks allow sharing of hardware, software, files and administration. There are different types of networks classified by transmission medium (wired vs wireless), size (LAN, WAN, MAN), management (peer-to-peer, client/server), and topology. Common transmission media are twisted pair cables, coaxial cables, and fiber optic cables. Local area networks connect computers within a building while wide area networks connect locations further apart like across cities. Protocols like TCP/IP and domains names are used to transmit data packets across interconnected networks.
The document discusses various network models including peer-to-peer networks where computers operate as equals, client-server networks where some computers provide services to others, and hybrid networks that combine aspects of different models. It also describes two-tier and three-tier client-server architectures, with three-tier adding an application server layer to improve efficiency and security over the two-tier approach. Finally, it introduces network reference models like OSI and TCP/IP that define standards for network communication.
This document provides an overview of computer networks and local area network (LAN) protocols. It discusses the uses of computer networks for business applications, home networks, mobile users, and some social issues. It then describes the structure of LANs and the key protocols involved, including the medium access control and logical link control sublayers. Specific LAN standards covered include Ethernet, IEEE 802.3, wireless LANs, bridges, switches, and virtual LANs.
This document provides an introduction to computer networks. It defines key network concepts like local area networks (LANs), wide area networks (WANs), and the different physical network topologies including bus, star, ring, mesh, and hybrid networks. It discusses network performance metrics like throughput and delay. It also covers network criteria such as reliability, security, and standards organizations that help networks communicate. Examples of different network configurations are provided to illustrate LANs, WANs, and the various physical topologies.
Computer networks allow interconnected devices to communicate. They have advantages like resource sharing and cost savings but also disadvantages such as reduced productivity if poorly managed or servers fail. Early networks included ARPANET in 1969 and NSFNET in the 1980s, leading to the modern Internet. Networks transmit data via circuits, packets, or messages using techniques like circuit switching, packet switching, and message switching. Components include nodes, servers, clients, hardware, software and communication channels. Networks can be LANs, MANs, WANs or PANs depending on their area of coverage. Wired networks use media like twisted pair, coaxial or fiber optic cables while wireless uses radio waves.
Here are the number of broadcast and collision domains for each case:
1. A single switch with 10 connected devices:
- Broadcast domain: 1
- Collision domain: 10 (each switch port is its own collision domain)
2. Two switches connected by a single trunk link with 10 devices on each switch:
- Broadcast domain: 2 (each switch is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
3. A router connecting two switches, each with 10 devices:
- Broadcast domain: 3 (each physical network segment is its own broadcast domain)
- Collision domain: 20 (each switch port is its own collision domain)
Here are the number of broadcast and collision domains for each case:
1. A single switch with 10 connected devices:
- Broadcast domain: 1
- Collision domain: 10 (each switch port is its own collision domain)
2. Two switches connected by a single trunk link with 10 devices on each switch:
- Broadcast domain: 2
- Collision domain: 20 (each switch port is its own collision domain)
3. A router connected to two switches, with 10 devices on each switch:
- Broadcast domain: 3
- Collision domain: 20 (each switch port is its own collision domain)
This document provides an overview of data communication networks and the Internet. It discusses the history of computer networks from the 1960s focusing on efficient and reliable transmission. It also describes the basic components of a communication network including devices, media, and structures like point-to-point and broadcast networks. The document then introduces the ISO-OSI reference model and its seven layer architecture for standardizing network communication. It concludes with descriptions of connection-oriented and connectionless communication services.
The document discusses computer networks and communication. It begins with an introduction to how computer networks were developed in the 1960s to enable fast and real-time data transfer for scientific research. It then defines what a network is and discusses various types of networks including LANs, WANs, MANs, peer-to-peer networks, and examples like Ethernet. It also covers network topologies, the ISO-OSI reference model, and considerations for networking like cost, training, security and more.
A computer network allows devices to be interconnected through various topologies and components. Devices can be connected locally through a LAN or over longer distances via a WAN. Key aspects of networks include the physical infrastructure of cables and wireless technologies, hardware components like hubs and switches, protocols for communication, and models for distributed systems and client-server architectures. Additionally, networks enable digital technologies like the Internet, intranets for internal organizational use, and extranets for controlled external partnerships.
This document provides an overview of advanced networking concepts. It begins with learning objectives around data communication, network devices, protocols, topologies and network types. It then defines key networking components like switches, routers, and firewalls. It discusses different network topologies, media like Ethernet and wireless, and various network types including LAN, WAN, SAN and more. The document is intended to help readers understand fundamental networking concepts.
This document provides an overview of computer networks. It begins by discussing how computer networks have changed daily life through services like watching cable TV, using ATMs, emailing, and more. A network is defined as two or more connected autonomous computers. The goals of networking are sharing resources, improved communication, and reduced communication costs. Networks have senders, receivers, messages, transmission mediums, and protocols. Early networks included ARPANET and NSFNET. The internet evolved from these and allows globally connected services. Network topologies like star, bus, and types of devices like hubs, switches, and routers are also summarized.
This document provides an overview of computer network fundamentals, including data transmission modes, network topologies, and network categories. It discusses the three main data transmission modes - simplex, half-duplex, and full-duplex - and describes their characteristics and examples. The document also defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and explores their key applications and advantages and disadvantages.
The document discusses networking and telecommunications. It provides an overview of network basics including why organizations use networks, advantages of networks over standalone computers, and common network types including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also covers network architectures, topologies, protocols, media, and security considerations.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
Explore the essential graphic design tools and software that can elevate your creative projects. Discover industry favorites and innovative solutions for stunning design results.
International Upcycling Research Network advisory board meeting 4Kyungeun Sung
Slides used for the International Upcycling Research Network advisory board 4 (last one). The project is based at De Montfort University in Leicester, UK, and funded by the Arts and Humanities Research Council.
Discovering the Best Indian Architects A Spotlight on Design Forum Internatio...Designforuminternational
India’s architectural landscape is a vibrant tapestry that weaves together the country's rich cultural heritage and its modern aspirations. From majestic historical structures to cutting-edge contemporary designs, the work of Indian architects is celebrated worldwide. Among the many firms shaping this dynamic field, Design Forum International stands out as a leader in innovative and sustainable architecture. This blog explores some of the best Indian architects, highlighting their contributions and showcasing the most famous architects in India.
2. Data networks
• Businesses needed a solution that would
successfully address the following three
problems:
– How to avoid duplication of equipment and
resources
– How to communicate efficiently
– How to set up and manage a network
3. Network history
• In the 1980s users with stand-alone computers started to share files
using modems to connect to other computers. This was referred to as
point-to-point, or dial-up communication
• Bulletin boards became the central point of communication in a dial-
up connection. Drawbacks to this type of system were:
– That there was very little direct communication
– Availability was limited to only with those who knew about the
location of the bulletin board
– Required one modem per connection. If five people connected
simultaneously it would require five modems connected to five
separate phone lines
• From the 1960s-1990s, the DoD developed large, reliable, WANs for
military and scientific reasons.
• In 1990, the DoDs WAN eventually became the Internet
4. In Our Highway Analogy...
• What is flowing?
– Traffic
• What different forms flow?
– Cars, Trucks, Buses, etc.
• What rules govern flow?
– Traffic Laws & Rules of Courtesy
• Where does the flow occur?
– Streets
5. In Computer Networks...
• What is flowing?
– Data
• What different forms flow?
– Text, Video, Audio
• What rules govern flow?
– Standards & Protocols
• Where does the flow occur?
– Wires, Fiber, Atmosphere
6.
7. End-user devices provide users with
a connection to the network.
Also referred to as hosts.
Allow users to share, create, and
obtain information.
Network devices provide
transport for data between end-
user devices.
Provide cable connections,
extensions, concentration.
Conversion of data formats,
and management of data
transfers
Networking Terminology
9. Logical Topology
Logical topology defines how media is accessed by hosts
1. Broadcast means that each host sends its data to all other
hosts on the network medium.
Non-deterministic - there is no order that the stations must
follow to use the network. First come, first served.
Example:
2. Token Passing controls network access by passing
an electronic token sequentially to each host.
When a host receives the token, that host can send
data on the network.
If the host has no data to send, it passes the token to
the next host and the process repeats itself.
Examples:
Ethernet
Token Ring, FDDI
10.
11. Network protocols
• Protocol suites are collections of protocols that enable
network communication from one host through the
network to another host.
• Protocols control all aspects of data communication such
as:
– How the physical network is built
– How computers connect to the network
– How the data is formatted for transmission
– How that data is sent
– How to deal with errors
12. LAN
MAN
WAN
SAN
VPN
Operate within limited geographical area
Allow multi-access to high bandwidth media
Control network privately under local administration
Provide full-time connectivity to local services
Connect physically adjacent devices
Spans a metropolitan area such as a city or suburban area
Usually consists of LANs in a common geographic area
Example: a bank with multiple branches may utilize a MAN
Operate over a large geographical area
Allow access over serial interfaces operating at lower speeds
Provide full-time and part-time connectivity
Connect devices separated over wide areas
High-performance network to move data to/from storage areas
Separate, dedicated network avoids traffic conflict
Private network constructed within public network such as Internet
Access VPNs, Intranet VPNs, Extranet VPNs
13. Metropolitan-area networks (MANs)
• A MAN is a network that spans a metropolitan area such as a city or
suburban area.
• Usually consists of 2 or more LANs in a common geographic area.
• Ex: a bank with multiple branches may utilize a MAN.
• Typically, a service provider is used to connect two or more LAN sites
using private communication lines or optical services.
14. Storage-area networks (SANs)
• A SAN is a dedicated, high-performance network used to move data
between servers and storage resources.
• Separate, dedicated network, that avoids any traffic conflict between
clients and servers
• SANs offer the following features:
– Performance – allows concurrent access of disk or tape arrays
by two or more servers at high speeds
– Availability – have disaster tolerance built in, because data can
be mirrored using a SAN up to 10km or 6.2 miles away.
– Scalability – Like a LAN/WAN, it can use a variety of
technologies. This allows easy relocation of backup data,
operations, file migration, and data replication between
systems.
16. Virtual private network (VPN)
• A VPN is a private network that is constructed within a
public network such as the Internet.
• It offers secure, reliable connectivity over a shared public
network infrastructure such as the Internet.
17. Benefits of VPNs
• Three main types of VPNs:
– Access VPNs – provide remote access to a mobile worker and a
SOHO to the hq of the Intranet or Extranet over a shared
infrastructure. Access VPNs use analog, dialup, ISDN, DSL, cable
technologies
– Intranet VPNs – link regional and remote offices to the hq of the
internal network over a shared infrastructure using dedicated
connections. They allow access only to the employees of the
enterprise.
– Extranet VPNs – link business partners to the hq of the network
over a shared infrastructure using dedicated connections. They
allow access to users outside the enterprise
19. Bandwidth
• Bandwidth is limited by physics and technology
• Bandwidth is not free
• Bandwidth requirements are growing at a rapid rate
• Bandwidth is critical to network performance
20. Throughput
Throughput refers to actual measured bandwidth, at a specific
time of day, using specific Internet routes, and while a specific
set of data is transmitted on the network.
Often far less than the maximum possible digital bandwidth.
Factors that determine throughput:
Internetworking devices
Type of data being transferred
Network topology
Number of users on the network
User computer
Server computer
Power conditions
T = Time S = Size
BW = Bandwidth
P = Throughput
21. Using layers to analyze problems in a flow of
materials
• The concept of layers is used to describe
communication from one computer to another
• The information that travels on a network is
generally referred to as data or a packet
• A packet is a logically grouped unit of information
that moves between computer systems.
• As the data passes between layers, each layer adds
additional information that enables effective
communication with the corresponding layer on the
other computer.
22. Networking Models
• The historical and technical standard of the
Internet is the TCP/IP model
• The U.S. Department of Defence created the
TCP/IP reference model, to design a network
that could survive any conditions, including a
nuclear war
Application layer handles issues of representation,
encoding, and dialog control.
Transport layer deals with the quality of service issues
of reliability, flow control, and error correction
Internet layer is to divide TCP segments into packets
and send them from any network. Best path determination
and packet switching occur at this layer
Network Access layer (aka host-to-network layer)
concerned with all components, both physical and logical,
that are required to make a physical link
24. Transport layer
TCP and UDP
•Segmenting upper-layer
application data
•Sending segments from one end
device to another end device
TCP only
•Establishing end-to-end operations
•Flow control provided by sliding
windows
•Reliability provided by sequence
numbers and acknowledgme
25. Internet layer
The purpose of the Internet layer is to select the best path through
the network for packets to travel
IP provides connectionless, best-effort delivery routing of packets.
Internet Control Message Protocol (ICMP) provides control and
messaging capabilities.
ARP resolves MAC address, for known IP addresses.
Reverse Address Resolution Protocol (RARP) determines IP
addresses when the MAC address is known
26. Network access layer
The network access layer defines
the procedures for interfacing with
the network hardware and
accessing the transmission
medium.
Drivers for software applications,
modem cards and other devices
operate at the network access layer
27. OSI Model
• The OSI reference model was released in 1984 to help network
builders implement networks that could communicate
(interoperability)
• The OSI reference model is the primary model for network
communications
• The process of moving information between computers is
divided into seven smaller and more manageable steps
• Reduces complexity
• Standardizes interfaces
• Facilitates modular engineering
• Ensures interoperable technology
• Accelerates evolution
• Simplifies teaching and learning
29. OSI Top 3 Layers – Application issues
3/24/2023 NESCOT CATC 29
Application
provides network services to the user's applications
file, print, message, database and application services
HTTP, SMTP, FTP
Presentation
responsible for manipulating data’s appearance as needed
by the Application layer
Data encryption, compression and translation services
JPEG, MIDI, QuickTime, EBCDIC to ASCII
Session
establish and maintain communication between two hosts
Dialogue control
NFS, SQL, RPC
30. OSI Lower 4 Layers – Data Transport issues
Transport
PDU – Segment
the transport layer establishes, maintains, and tears down virtual circuits
Windowing
TCP and UDP
Network
PDU - Packet
Routing
Data packets and route update packets
connectivity and path selection between two hosts
Data-Link
PDU - Frame
physical addressing, network topology, network access, error notification,
ordered delivery of frames, and flow control
Ethernet LCC and MAC layers
Physical
PDU – bits
Cabling, standards
31. TCP/IP Vs OSI
Similarities of the OSI and TCP/IP models:
•Both have layers
•Both have application layers, though they include very different services
•Both have comparable transport and network layers
•Packet-switched, not circuit-switched, technology is assumed
•Networking professionals need to know both models
32. Differences of the OSI and TCP/IP models:
•TCP/IP combines the presentation and session layer
into its application layer
•TCP/IP combines the OSI data link and physical layers
into one layer
•TCP/IP appears simpler because it has fewer layers
•TCP/IP transport layer using UDP does not always
guarantee reliable delivery of packets as the transport
layer in the OSI model does
39. Bridge
• Divide a large network into smaller segment
• Isolating and controlling the link problems
(e.g. congestion)
• Regenerate signal + Checking Physical Address
and forward only to the specified segment
44. Routers
• Act like stations on a network
• Multi-home
• Definition (Goal)
– “Learning how to get from here to there."
– “Process of discovering, selecting, and employing
paths from one place to another (or to many
others) in a network” [from David M. Piscitello, Bellcore and A. Lyman Chapin, BBN]
45. Routing Principle
• Goal: Arriving at the destination
• Considerations:
– Direct route (shortest)
– Reliable route
– Cheap route
– Safe route
– Scenic route
56. STP
Costs more and harder to install
than UTP
Must be grounded at both ends
Reduces both internal and
external sources of interference
UTP
Relies on cancellation effect
produced by the twisting to limit
signal degradation caused by
EMI and RFI
Easier to install, thinner and less
expensive
57. Straight-Through, Rollover and Crossover Cables
Straight-Through
Used for up-links
Crossover
Used for linking devices
at the same level
Rollover
Used for connecting a
terminal to the console
port
Cross 1 with 3 and 2 with 6
58. Optical Media
Radio, microwaves, radar, visible light, x-rays, and gamma rays
are all types of electromagnetic waves
The wavelength of the light in optical fiber is either 850 nm,
1310 nm, or 1550 nm
In a vacuum light travels at 300,000 kps - light travels at slower
speeds through air, water, and glass
59. Two conditions must be met to prevent loss due to refraction
and achieve Total Internal Reflection:
1. The core of the optical fiber has to have a larger index of
refraction than the cladding.
2. The angle of incidence must be greater than the critical angle
for the core and its cladding.
Orange jacket
Kevlar
Plastic buffer
Cladding
Core
The numerical aperture
of a core is the range of
angles of incident light
rays entering the fiber that
will be completely
reflected
60.
61. Other Optical Components
There are two types of light sources:
1. Light Emitting Diode (LED) producing infrared light with
wavelengths of either 850nm or 1310 nm
Used with multimode fiber in LANs.
2. LASER producing a thin beam of intense infrared light with
wavelengths of 1310nm or 1550 nm
Used with single-mode fiber over longer distance
Extra care should be exercised to prevent eye injury
Fibre-optic receivers are called PIN photodiodes (p-intrinsic-n diodes)
On single-mode fiber, the ST (Straight Tip)
connector is frequently used.
With multimode fiber the SC connector
(Subscriber Connector ) is used
62. Wireless Media
IEEE Standards for Wireless
802.11
Includes Direct Sequence Spread Spectrum. DSSS
applies to wireless devices operating within a 1 to 2 Mbps
range
802.11b
Wi-Fi™ - Increased transmission capabilities to 11 Mbps
Typically speeds 2 to 4 Mbps
All 802.11b systems are backward compliant
Operate within 2.4 GHZ transmission band
802.11a
Operate within 5 GHZ transmission band
No interoperability with 802.11b
Capable of throughput of 54 Mbps (typically 20-26 Mbps)
802.11g
Same throughout as 802.11a
Backwards compatibility for 802.11b
Uses Othogonal Frequency Division Multiplexing (OFDM)
63. Wireless Devices and Topologies
Wireless network may consist of as few as two devices equipped with
wireless NICs
Access Point (AP) are installed to act as central hubs for the WLAN and to
solve NIC compatibility issues
APs are equipped with antennae and provide wireless connectivity over a specified area
referred to as a cell
64. • Three types of frames are used in wireless communication:
control, management, and data
• WLANs use CSMA/CA
(Carrier Sense Multiple Access/Collision Avoidance)
• WLAN authentication authenticates the device, not the user
• Authentication and Association types
Unauthenticated and unassociated
Authenticated and unassociated - The node has been
authenticated on the network but has not yet associated with
the access point
Authenticated and associated
• Wireless security can be difficult to achieve. Tools include:
EAP-MD5 Challenge,LEAP (Cisco), User authentication,
Encryption, Data authentication
• VPN technology effectively closes the wireless network