SlideShare une entreprise Scribd logo
1  sur  47
Introduction to Networking
Definitions and Terms
Objectives
After completing these slides you will:
• Be able to differentiate between peer-to-peer and server-based networks.
• Be able to identify a network topology.
• Understand the different types of network cabling.
• Be able to explain the differences between various network access methods.
• Understand Ethernet issues.
• Identify logical layers of the internet.
• Be able to explain when a specific network protocol is used.
• Understand the difference between a MAC address and an IP address.
Networking Overview
• A network is two or more devices capable of communicating and
sharing resources between them.
• Two types of networks are LAN and WAN:
– LAN (Local Area Network) – A group of devices sharing resources
in a single area such as a room or a building.
– WAN (Wide Area Network) – Two or more LANs communicating,
often across large distances. The most famous WAN is the Internet.
Types of Local Area Networks
• Two types of LANs are Server-Based and Peer-to-Peer Network:
– Server-Based Network – A basic type of LAN wherein users login to
a controlling computer, called a server and is more secure. The server
contains information about who can connect to the network and to
what shared resources. It also provides some of these resources.
These networks normally consist of 10 or more computers.
– Peer-to-Peer Network – One of two basic types of LANs wherein
each computer user acts as a server. Each computer stores password
and sharing information for its own resources. Usually has fewer than
10 computers.
• NOS (Network Operating System) – Special operating system on a
server containing utilities for managing users, resources, and security.
Types of Local Area Networks
Server-Based Network
Network – Figure # 1
Types of Local Area Networks
Network – Figure # 2
Peer-to Peer Network
Network Topologies
• Network Topology – Maps of how the physical or logical paths of network
devices connect. The three major topologies are star, ring, and bus.
• Star Topology – Most common Ethernet network topology where each device
connects to a central hub or switch.
• Hub – A device used with the Universal Serial Bus or in a star network topology
that allows multiple device connections.
• Switch – In star networks, a Layer 2 central controlling device. A switch looks at
each data frame as it comes through each port.
• Ring Topology – Network that is physically wired like a star network but, logically
in a ring; passes control from one device to the next in a continuous fashion using
a special data packet called a token. Used in Token Ring networks.
• Bus Topology – Network wherein all devices connect to a single cable. If the
cable fails, the network is down.
• Mesh Topology – Network where all devices connect to each other by cabling to
provide link redundancy for maximum fault tolerance. Most likely in WANs.
Network Topologies
Network – Figure # 3
Hub/Switch
Network Topologies
Network – Figure # 4
Star Topology
Network Topologies
Logical Ring Topology
Network – Figure # 5
Network Topologies
Network – Figure # 6
Bus Topology
Network Topologies
Network – Table # 1
Network Topologies
Network Cabling
Cable is normally used as a medium for transporting network data. The most
common types are twisted-pair and fiber-optic, although coax is still used in some
old networks.
• Twisted-Pair Cable – Network cable of eight copper wires twisted into four pairs
to prevent crosstalk.
– UTP (Unshielded Twisted-Pair) – Most common network cable that comes
in different categories for different uses. Categories 3 (voice-grade), 4, and 5
(data). It is unshielded and more susceptible to interference.
– STP (Shielded Twisted-Pair) – Same as UTP cable, but with extra foil to
prevent outside noise from interfering with data on the cable.
• Crosstalk – Where signals from one wire interfere with the signal on an adjacent
wire.
• Plenum cable is treated with Teflon or fire retardant materials to reduce the risk of
fire. It produces less smoke and is less toxic when burning.
Network Cabling
• Fiber-Optic Cable – An expensive network cabling made of plastic or
glass fibers that carry data in the form of light pulses. Most often used to
connect network devices such as switches together into a network
backbone or for connecting networks together in a WAN. More secure
and not affected by crosstalk or other interference like copper cable.
– Single-Mode – A type of fiber-optic cabling that sends one light beam
down the cable. Used for longer distance applications.
– Multi-Mode – A type of fiber-optic cabling that allows multiple light
signals to be sent along the same cable. Used for shorter distances.
• Coaxial Cable – Type of copper network cabling used in older Ethernet
networks as well as mainframe and minicomputer connections. Has a
single, center wire conductor with an outer braided shield.
Network Cabling
Network – Figure # 7
UTP Cable
Network Cabling
Network – Figure # 11
Fiber-Optic Cable
Network Cabling
Network – Figure # 12
Coax Cable with Connector
Access Methods
There are standard rules by which computers on a network must adhere
to in order to communicate. These rules are known as a common access
method.
• CSMA/CD (Carrier Sense Multiple Access/Collision Detect) – A
common access method used by Ethernet.
• Token Passing – The common access method used by fiber and Token
Ring networks.
• CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) – A
common access method used in wireless and Apple networks.
• Token – Small data packet passed from one networked device to
another in a ring topology.
Ethernet Issues and Concepts
• Two types of transmissions used in Ethernet networks:
• Half Duplex – A serial device setting that allows either the sending or the
receiving device to send data, one device at a time. Data can travel both
ways on a cable, but not at the same time.
• Full Duplex – A serial device setting that allows the sending and
receiving device to send data simultaneously. Data can travel both ways
on a cable at the same time.
Layers of the Internet
• One logical view of the Internet has five layers
– Physical Layer – Layer 1 this model defines how bits are sent and
received across the network between two pieces of hardware.
– Data Link Layer – in layer 2 bits are transferred across the network
by encapsulating (grouping) them into frames.
– Network Layer – in layer 3 the segments are sent between the
sender and receiver.
– Transport Layer – in layer 4 breaks a message into segments and
passes to the Network Layer.
– Application Layer – in layer 5 we have network related applications
like telnet, ftp, etc.
Layers of the Internet
• In the Physical layer actual bits are sent either as electrical signals on
wires, or electromagnetic radiation through fiber-optic cables or
transmitted.
• In the Data Link layer the information being transmitted is a frame that
has the actual info (datagram), header and trailer. The frame headers
use MAC addresses to identify source and destination.
• The Data Link layer is implemented in the network adapter (NIC) and is a
combination of hardware, software, and firmware.
• MAC (Media Access Control) is a 48-bit address burned in NIC ROM.
Networking Protocols
• Network Protocol – Specifications that define the network data
communication procedures to follow when sending and receiving data.
– TCP/IP (Transport Control Protocol / Internet Protocol) – the most
common network protocol used by most companies and home users
as a standard protocol. Used to access the Internet.
– IPX/SPX (Internetwork Packet Exchange/Sequenced Packet
Exchange) – original protocol used for connecting to Novell networks.
Now TCP/IP is the standard protocol used.
– NetBEUI (NetBIOS Enhanced User Interface) – is a non-routable
protocol used in simple networks; commonly found on peer-to-peer
networks.
Network Addressing
Network devices have to be able to identify each other in order to
communicate across a network. They do this through various network
addressing schemes.
• MAC Address – One of two types of addresses assigned to network
adapters, used when two devices on same network communicate.
• IP Address – A type of network adapter address used when multiple
networks are linked. It is a 32-bit binary number with groups of eight bits
separated by a dot.
• Network Number – Portion of an IP address that represents which
network the computer is on.
Network Addressing
• Host Number – Portion of an IP address that represents the specific
network device.
• Broadcast Address – IP address used to communicate with all devices
on a particular network.
• Subnet Mask – A number the computer uses to determine which part of
an IP address represents the network and which portion represents the
host.
Network Addressing
Network – Figure # 15
IP Addressing (Network Number and Host Number)
Network Addressing
Network – Figure # 16
IP Addressing (Two Network Example)
Network Addressing
Network – Table #5
IP Address Information
Configuring Networking
Some key terms to understand when configuring computers for networking are:
• UNC (Universal Naming Convention) – A standard way of naming computers
and shared resources on a network. Used at the command prompt to obtain
network shares.
• DHCP (Dynamic Host Configuration Protocol) – A method to automatically
assign IP addresses to network devices from a pool of IP addresses. A computer
requests an address from another device running DHCP, usually a server,
receives it, and joins the network.
• APIPA (Automatic Private IP Addressing) – Assigns an IP address and mask to
the computer when a DHCP server is not available.
• Default Gateway – The IP address of the Layer 3 device, such as a router, that
is directly connected to its immediate network and acts as a doorway or director
to other remote networks.
Configuring Networking
• DNS (Domain Name System) Server – Application on a network server
that translates Internet names (also known as Fully Qualified Domain
Names or hostnames) into IP addresses.
• URL (Universal Resource Locator) – A method of accessing Internet
resources by using a simple, easily remembered name assigned to an IP
address. An example of a URL is: www.scottjonespub.com, which is
much easier to remember than the IP address : 167.160.239.173.
• WINS (Windows Internet Naming Service) Server – Keeps track of IP
addresses assigned to a specific computer name. A user can type in a
computer name to connect and the server will translate it to the
computer’s IP address.
Configuring Networking
Network – Figure #17
Default Gateway
Network Troubleshooting
IPCONFIG – A command used with Windows 98, NT, and 2000 to see
and modify the current IP settings.
• NSLOOKUP – An NT Server and 2000 Server troubleshooting tool that
displays network domain names and their associated IP addresses.
• Tracert – A network troubleshooting command that displays the path a
data packet takes through a network, thus allowing one to see where a
fault occurs in larger networks.
Network Troubleshooting
Network – Figure #18
Sample Network Configuration
Network Troubleshooting
Network – Figure #19
WINIPCFG
Network Troubleshooting
Network – Figure #20
IPCONFIG
Dial-up Networking
There are several ways in which computers can connect to remote
networks:
• DUN (Dial-Up Networking) – A remote computer that dials into the
Internet or a corporation using a modem.
• VPN (Virtual Private Networking) – A remote computer connecting to a
remote network by “tunneling” over an intermediate network, such as the
Internet or a LAN.
• PPP (Point-to-Point Protocol) – A connection-oriented Layer 2 protocol
that encapsulates data for transmission over remote networks. Very
common for home users dialing in to the Internet.
Dial-up Networking
Dial-Up Networking and VPN
Network – Figure #21
Dial-up Networking
Network Connections
Network - Table #7
Internet Software
Once a connection is established to a remote network there are several
program types that are useful for accessing data.
• Browser – A program that views web pages across the Internet. The two
most common are Internet Explorer and Netscape Navigator.
• Proxy Server – Acts as an agent between an application and a real
server for security purposes.
• SMTP (Simple Mail Transport Protocol) – is a protocol used for
sending and receiving email. Settings for configuring email can be
obtained from the network administrator or the ISP being used to connect
to the Internet.
Internet Security
• There are three major points to remember:
– Keep service patches updated on a regular basis.
– The latest anti-virus software should be installed and constantly
updated.
– If the computer connects to the internet, it should be connected
behind a firewall.
• Cookie – A special program written to collect information and store it on
the hard drive. This will contain your preferences when you visit a
website.
• Firewall – Software or hardware that protects one or more computers
from outside attacks.
Network Terminology
• Networking Terms and Acronyms To be Familiar With:
– Backbone Bandwidth Baseband
– Broadband E-mail Fast Ethernet
– FDDI Frame FTP
– HTML HTTP Infrared
– Packet POP SNMP
– TCP Telnet UDP
Wireless Networks Overview
• Wireless Networks – Transmit data over air using either infrared or radio
frequencies. Wireless networks operate at layers 1 and 2 of the OSI
model.
Wireless Networks Types
• There are two main types of wireless networks:
– Ad hoc – also known as peer-to-peer or IBSS (Independent Basic
Service Set) – An ad hoc wireless network is when at least two
devices such as two computers have wireless NICs.
– Infrastructure – Wireless network that connects multiple wireless
network devices through an Access Point.
• Access Point – is similar to a network hub and connects wireless network
devices.
• There are three major types of wireless NICs: PC Card, USB, and PCI.
Wireless Networks Types
• BSS (Basic Service Set) – Configuration when multiple devices connect
to an Access Point.
• ESS (Extended Service Set) – The network design when multiple Access
Points connect to the same main network.
• SSID (Service Set Identifier) - A set of 32 alpha numeric characters used
to differentiate between wireless networks.
• The channel ID (frequency) between the Access Point and the adapter
must match for communication to occur.
Wireless Networks Types
802.11b Frequency Channels
Network – Table #12
Wireless Network Security Overview
• Wireless networks by their nature are insecure.
• All transmissions over air occur in clear text making them easy to
compromise.
Authentication and WEP
• Authentication is the process of determining that a network device or
person has permission to enter the wireless network through the access
point.
• Open Authentication – Allows a wireless network device to send a frame
to the access point with the sender’s identity (MAC address). It is used
when no authentication is required.
• Shared Key Authentication – Requires the use of a shared key to
communicate.
• WEP (Wireless Equivalent Privacy) – Encrypts data when shared key
authentication is used.
• Encryption – the process of converting data into an unreadable format.
Default Settings
• All wireless networks have default passwords and SSIDs. They should
be changed immediately to prevent hackers from gaining access.
• SSID Broadcasting – The access point periodically sends out a beacon
frame that includes the SSID.
Default Access Point Passwords

Contenu connexe

Tendances

Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
Computer communication and networks
Computer communication and networksComputer communication and networks
Computer communication and networksImran Khan
 
data communication
data communicationdata communication
data communicationRajat Singla
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networksRabail Khowaja
 
Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networksVarun Jain
 
1.intro. data communication
1.intro. data communication1.intro. data communication
1.intro. data communicationUttara Tiwari
 
Communication technology
Communication technologyCommunication technology
Communication technologyAbhishek Curtis
 
Data Communication And Networking
Data Communication And NetworkingData Communication And Networking
Data Communication And NetworkingGanesh Meghale
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)IMRAN KHAN
 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devicesAlbert Abbosey
 
Concept of data communication and Network Types
Concept of data communication and  Network TypesConcept of data communication and  Network Types
Concept of data communication and Network TypesToufiqueAhmed13
 
Computer network
Computer networkComputer network
Computer networkRohit Gupta
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networkingSisir Ghosh
 
Data communications
Data communicationsData communications
Data communicationsAshwini
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-conceptsWBUTTUTORIALS
 
Intro of computer_network
Intro of computer_networkIntro of computer_network
Intro of computer_networkAnand Bohara
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of networkAlbert Abbosey
 

Tendances (20)

Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Computer communication and networks
Computer communication and networksComputer communication and networks
Computer communication and networks
 
data communication
data communicationdata communication
data communication
 
Communication and computer networks
Communication and computer networksCommunication and computer networks
Communication and computer networks
 
Computer communications and networks
Computer communications and networksComputer communications and networks
Computer communications and networks
 
1.intro. data communication
1.intro. data communication1.intro. data communication
1.intro. data communication
 
Communication technology
Communication technologyCommunication technology
Communication technology
 
Data Communication And Networking
Data Communication And NetworkingData Communication And Networking
Data Communication And Networking
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)
 
Telecommunication and networks
Telecommunication and networksTelecommunication and networks
Telecommunication and networks
 
Lecture 3 network communication media and devices
Lecture 3 network communication media and devicesLecture 3 network communication media and devices
Lecture 3 network communication media and devices
 
Concept of data communication and Network Types
Concept of data communication and  Network TypesConcept of data communication and  Network Types
Concept of data communication and Network Types
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks
Computer networksComputer networks
Computer networks
 
Overview of data communication and networking
Overview of data communication and networkingOverview of data communication and networking
Overview of data communication and networking
 
Data communications
Data communicationsData communications
Data communications
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
Intro of computer_network
Intro of computer_networkIntro of computer_network
Intro of computer_network
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 

En vedette

Transmission media
Transmission mediaTransmission media
Transmission mediakinish kumar
 
Biological Significance of Gene Expression Data Using Similarity Based Biclus...
Biological Significance of Gene Expression Data Using Similarity Based Biclus...Biological Significance of Gene Expression Data Using Similarity Based Biclus...
Biological Significance of Gene Expression Data Using Similarity Based Biclus...CSCJournals
 
Search engine page rank demystification
Search engine page rank demystificationSearch engine page rank demystification
Search engine page rank demystificationRaja R
 
Cyber mobbing hausarbeit
Cyber mobbing hausarbeitCyber mobbing hausarbeit
Cyber mobbing hausarbeitLui Louie
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routingGaurav Juneja
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)Rasan Samarasinghe
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cableHareem Naz
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsGuru Ji
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

En vedette (17)

Transmission media
Transmission mediaTransmission media
Transmission media
 
Biological Significance of Gene Expression Data Using Similarity Based Biclus...
Biological Significance of Gene Expression Data Using Similarity Based Biclus...Biological Significance of Gene Expression Data Using Similarity Based Biclus...
Biological Significance of Gene Expression Data Using Similarity Based Biclus...
 
Search engine page rank demystification
Search engine page rank demystificationSearch engine page rank demystification
Search engine page rank demystification
 
Cyber mobbing hausarbeit
Cyber mobbing hausarbeitCyber mobbing hausarbeit
Cyber mobbing hausarbeit
 
Subnetting and routing
Subnetting and routingSubnetting and routing
Subnetting and routing
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Guided media
Guided mediaGuided media
Guided media
 
DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)DITEC - Fundamentals in Networking (updated)
DITEC - Fundamentals in Networking (updated)
 
cables
cablescables
cables
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Twisted pair cable
Twisted pair cableTwisted pair cable
Twisted pair cable
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Classless subnetting
Classless subnettingClassless subnetting
Classless subnetting
 
Search Engines
Search EnginesSearch Engines
Search Engines
 
Cybermobbing
CybermobbingCybermobbing
Cybermobbing
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similaire à Ppt on networking

monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2Programmer
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communicationsArunaSekar1
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of NetworkingVivin NL
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkAtika Zaimi
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts reviewPalanivel Kuppusamy
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptxmmmm11111
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsvish21ainds
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer NetworkAvinash Ranjan
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & MediaSoumyakatkam
 

Similaire à Ppt on networking (20)

monotoring Basics2
monotoring Basics2monotoring Basics2
monotoring Basics2
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Introduction to data communications
Introduction to data communicationsIntroduction to data communications
Introduction to data communications
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of Networking
 
Topic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer networkTopic 1.1 basic concepts of computer network
Topic 1.1 basic concepts of computer network
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
9781111306366 ppt ch9
9781111306366 ppt ch99781111306366 ppt ch9
9781111306366 ppt ch9
 
NFPhysical Layer.pptx
NFPhysical Layer.pptxNFPhysical Layer.pptx
NFPhysical Layer.pptx
 
CNP proficiency.pptx
CNP proficiency.pptxCNP proficiency.pptx
CNP proficiency.pptx
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Modue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university examsModue 1 part 1 of computer networks for your university exams
Modue 1 part 1 of computer networks for your university exams
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
08. networking
08. networking08. networking
08. networking
 
Presentation On Computer Network
Presentation On Computer NetworkPresentation On Computer Network
Presentation On Computer Network
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Network Devices & Media
Network Devices & MediaNetwork Devices & Media
Network Devices & Media
 

Ppt on networking

  • 2. Objectives After completing these slides you will: • Be able to differentiate between peer-to-peer and server-based networks. • Be able to identify a network topology. • Understand the different types of network cabling. • Be able to explain the differences between various network access methods. • Understand Ethernet issues. • Identify logical layers of the internet. • Be able to explain when a specific network protocol is used. • Understand the difference between a MAC address and an IP address.
  • 3. Networking Overview • A network is two or more devices capable of communicating and sharing resources between them. • Two types of networks are LAN and WAN: – LAN (Local Area Network) – A group of devices sharing resources in a single area such as a room or a building. – WAN (Wide Area Network) – Two or more LANs communicating, often across large distances. The most famous WAN is the Internet.
  • 4. Types of Local Area Networks • Two types of LANs are Server-Based and Peer-to-Peer Network: – Server-Based Network – A basic type of LAN wherein users login to a controlling computer, called a server and is more secure. The server contains information about who can connect to the network and to what shared resources. It also provides some of these resources. These networks normally consist of 10 or more computers. – Peer-to-Peer Network – One of two basic types of LANs wherein each computer user acts as a server. Each computer stores password and sharing information for its own resources. Usually has fewer than 10 computers. • NOS (Network Operating System) – Special operating system on a server containing utilities for managing users, resources, and security.
  • 5. Types of Local Area Networks Server-Based Network Network – Figure # 1
  • 6. Types of Local Area Networks Network – Figure # 2 Peer-to Peer Network
  • 7. Network Topologies • Network Topology – Maps of how the physical or logical paths of network devices connect. The three major topologies are star, ring, and bus. • Star Topology – Most common Ethernet network topology where each device connects to a central hub or switch. • Hub – A device used with the Universal Serial Bus or in a star network topology that allows multiple device connections. • Switch – In star networks, a Layer 2 central controlling device. A switch looks at each data frame as it comes through each port. • Ring Topology – Network that is physically wired like a star network but, logically in a ring; passes control from one device to the next in a continuous fashion using a special data packet called a token. Used in Token Ring networks. • Bus Topology – Network wherein all devices connect to a single cable. If the cable fails, the network is down. • Mesh Topology – Network where all devices connect to each other by cabling to provide link redundancy for maximum fault tolerance. Most likely in WANs.
  • 8. Network Topologies Network – Figure # 3 Hub/Switch
  • 9. Network Topologies Network – Figure # 4 Star Topology
  • 10. Network Topologies Logical Ring Topology Network – Figure # 5
  • 11. Network Topologies Network – Figure # 6 Bus Topology
  • 12. Network Topologies Network – Table # 1 Network Topologies
  • 13. Network Cabling Cable is normally used as a medium for transporting network data. The most common types are twisted-pair and fiber-optic, although coax is still used in some old networks. • Twisted-Pair Cable – Network cable of eight copper wires twisted into four pairs to prevent crosstalk. – UTP (Unshielded Twisted-Pair) – Most common network cable that comes in different categories for different uses. Categories 3 (voice-grade), 4, and 5 (data). It is unshielded and more susceptible to interference. – STP (Shielded Twisted-Pair) – Same as UTP cable, but with extra foil to prevent outside noise from interfering with data on the cable. • Crosstalk – Where signals from one wire interfere with the signal on an adjacent wire. • Plenum cable is treated with Teflon or fire retardant materials to reduce the risk of fire. It produces less smoke and is less toxic when burning.
  • 14. Network Cabling • Fiber-Optic Cable – An expensive network cabling made of plastic or glass fibers that carry data in the form of light pulses. Most often used to connect network devices such as switches together into a network backbone or for connecting networks together in a WAN. More secure and not affected by crosstalk or other interference like copper cable. – Single-Mode – A type of fiber-optic cabling that sends one light beam down the cable. Used for longer distance applications. – Multi-Mode – A type of fiber-optic cabling that allows multiple light signals to be sent along the same cable. Used for shorter distances. • Coaxial Cable – Type of copper network cabling used in older Ethernet networks as well as mainframe and minicomputer connections. Has a single, center wire conductor with an outer braided shield.
  • 15. Network Cabling Network – Figure # 7 UTP Cable
  • 16. Network Cabling Network – Figure # 11 Fiber-Optic Cable
  • 17. Network Cabling Network – Figure # 12 Coax Cable with Connector
  • 18. Access Methods There are standard rules by which computers on a network must adhere to in order to communicate. These rules are known as a common access method. • CSMA/CD (Carrier Sense Multiple Access/Collision Detect) – A common access method used by Ethernet. • Token Passing – The common access method used by fiber and Token Ring networks. • CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) – A common access method used in wireless and Apple networks. • Token – Small data packet passed from one networked device to another in a ring topology.
  • 19. Ethernet Issues and Concepts • Two types of transmissions used in Ethernet networks: • Half Duplex – A serial device setting that allows either the sending or the receiving device to send data, one device at a time. Data can travel both ways on a cable, but not at the same time. • Full Duplex – A serial device setting that allows the sending and receiving device to send data simultaneously. Data can travel both ways on a cable at the same time.
  • 20. Layers of the Internet • One logical view of the Internet has five layers – Physical Layer – Layer 1 this model defines how bits are sent and received across the network between two pieces of hardware. – Data Link Layer – in layer 2 bits are transferred across the network by encapsulating (grouping) them into frames. – Network Layer – in layer 3 the segments are sent between the sender and receiver. – Transport Layer – in layer 4 breaks a message into segments and passes to the Network Layer. – Application Layer – in layer 5 we have network related applications like telnet, ftp, etc.
  • 21. Layers of the Internet • In the Physical layer actual bits are sent either as electrical signals on wires, or electromagnetic radiation through fiber-optic cables or transmitted. • In the Data Link layer the information being transmitted is a frame that has the actual info (datagram), header and trailer. The frame headers use MAC addresses to identify source and destination. • The Data Link layer is implemented in the network adapter (NIC) and is a combination of hardware, software, and firmware. • MAC (Media Access Control) is a 48-bit address burned in NIC ROM.
  • 22. Networking Protocols • Network Protocol – Specifications that define the network data communication procedures to follow when sending and receiving data. – TCP/IP (Transport Control Protocol / Internet Protocol) – the most common network protocol used by most companies and home users as a standard protocol. Used to access the Internet. – IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) – original protocol used for connecting to Novell networks. Now TCP/IP is the standard protocol used. – NetBEUI (NetBIOS Enhanced User Interface) – is a non-routable protocol used in simple networks; commonly found on peer-to-peer networks.
  • 23. Network Addressing Network devices have to be able to identify each other in order to communicate across a network. They do this through various network addressing schemes. • MAC Address – One of two types of addresses assigned to network adapters, used when two devices on same network communicate. • IP Address – A type of network adapter address used when multiple networks are linked. It is a 32-bit binary number with groups of eight bits separated by a dot. • Network Number – Portion of an IP address that represents which network the computer is on.
  • 24. Network Addressing • Host Number – Portion of an IP address that represents the specific network device. • Broadcast Address – IP address used to communicate with all devices on a particular network. • Subnet Mask – A number the computer uses to determine which part of an IP address represents the network and which portion represents the host.
  • 25. Network Addressing Network – Figure # 15 IP Addressing (Network Number and Host Number)
  • 26. Network Addressing Network – Figure # 16 IP Addressing (Two Network Example)
  • 27. Network Addressing Network – Table #5 IP Address Information
  • 28. Configuring Networking Some key terms to understand when configuring computers for networking are: • UNC (Universal Naming Convention) – A standard way of naming computers and shared resources on a network. Used at the command prompt to obtain network shares. • DHCP (Dynamic Host Configuration Protocol) – A method to automatically assign IP addresses to network devices from a pool of IP addresses. A computer requests an address from another device running DHCP, usually a server, receives it, and joins the network. • APIPA (Automatic Private IP Addressing) – Assigns an IP address and mask to the computer when a DHCP server is not available. • Default Gateway – The IP address of the Layer 3 device, such as a router, that is directly connected to its immediate network and acts as a doorway or director to other remote networks.
  • 29. Configuring Networking • DNS (Domain Name System) Server – Application on a network server that translates Internet names (also known as Fully Qualified Domain Names or hostnames) into IP addresses. • URL (Universal Resource Locator) – A method of accessing Internet resources by using a simple, easily remembered name assigned to an IP address. An example of a URL is: www.scottjonespub.com, which is much easier to remember than the IP address : 167.160.239.173. • WINS (Windows Internet Naming Service) Server – Keeps track of IP addresses assigned to a specific computer name. A user can type in a computer name to connect and the server will translate it to the computer’s IP address.
  • 30. Configuring Networking Network – Figure #17 Default Gateway
  • 31. Network Troubleshooting IPCONFIG – A command used with Windows 98, NT, and 2000 to see and modify the current IP settings. • NSLOOKUP – An NT Server and 2000 Server troubleshooting tool that displays network domain names and their associated IP addresses. • Tracert – A network troubleshooting command that displays the path a data packet takes through a network, thus allowing one to see where a fault occurs in larger networks.
  • 32. Network Troubleshooting Network – Figure #18 Sample Network Configuration
  • 33. Network Troubleshooting Network – Figure #19 WINIPCFG
  • 34. Network Troubleshooting Network – Figure #20 IPCONFIG
  • 35. Dial-up Networking There are several ways in which computers can connect to remote networks: • DUN (Dial-Up Networking) – A remote computer that dials into the Internet or a corporation using a modem. • VPN (Virtual Private Networking) – A remote computer connecting to a remote network by “tunneling” over an intermediate network, such as the Internet or a LAN. • PPP (Point-to-Point Protocol) – A connection-oriented Layer 2 protocol that encapsulates data for transmission over remote networks. Very common for home users dialing in to the Internet.
  • 36. Dial-up Networking Dial-Up Networking and VPN Network – Figure #21
  • 38. Internet Software Once a connection is established to a remote network there are several program types that are useful for accessing data. • Browser – A program that views web pages across the Internet. The two most common are Internet Explorer and Netscape Navigator. • Proxy Server – Acts as an agent between an application and a real server for security purposes. • SMTP (Simple Mail Transport Protocol) – is a protocol used for sending and receiving email. Settings for configuring email can be obtained from the network administrator or the ISP being used to connect to the Internet.
  • 39. Internet Security • There are three major points to remember: – Keep service patches updated on a regular basis. – The latest anti-virus software should be installed and constantly updated. – If the computer connects to the internet, it should be connected behind a firewall. • Cookie – A special program written to collect information and store it on the hard drive. This will contain your preferences when you visit a website. • Firewall – Software or hardware that protects one or more computers from outside attacks.
  • 40. Network Terminology • Networking Terms and Acronyms To be Familiar With: – Backbone Bandwidth Baseband – Broadband E-mail Fast Ethernet – FDDI Frame FTP – HTML HTTP Infrared – Packet POP SNMP – TCP Telnet UDP
  • 41. Wireless Networks Overview • Wireless Networks – Transmit data over air using either infrared or radio frequencies. Wireless networks operate at layers 1 and 2 of the OSI model.
  • 42. Wireless Networks Types • There are two main types of wireless networks: – Ad hoc – also known as peer-to-peer or IBSS (Independent Basic Service Set) – An ad hoc wireless network is when at least two devices such as two computers have wireless NICs. – Infrastructure – Wireless network that connects multiple wireless network devices through an Access Point. • Access Point – is similar to a network hub and connects wireless network devices. • There are three major types of wireless NICs: PC Card, USB, and PCI.
  • 43. Wireless Networks Types • BSS (Basic Service Set) – Configuration when multiple devices connect to an Access Point. • ESS (Extended Service Set) – The network design when multiple Access Points connect to the same main network. • SSID (Service Set Identifier) - A set of 32 alpha numeric characters used to differentiate between wireless networks. • The channel ID (frequency) between the Access Point and the adapter must match for communication to occur.
  • 44. Wireless Networks Types 802.11b Frequency Channels Network – Table #12
  • 45. Wireless Network Security Overview • Wireless networks by their nature are insecure. • All transmissions over air occur in clear text making them easy to compromise.
  • 46. Authentication and WEP • Authentication is the process of determining that a network device or person has permission to enter the wireless network through the access point. • Open Authentication – Allows a wireless network device to send a frame to the access point with the sender’s identity (MAC address). It is used when no authentication is required. • Shared Key Authentication – Requires the use of a shared key to communicate. • WEP (Wireless Equivalent Privacy) – Encrypts data when shared key authentication is used. • Encryption – the process of converting data into an unreadable format.
  • 47. Default Settings • All wireless networks have default passwords and SSIDs. They should be changed immediately to prevent hackers from gaining access. • SSID Broadcasting – The access point periodically sends out a beacon frame that includes the SSID. Default Access Point Passwords