SlideShare uma empresa Scribd logo
1 de 87
IT Essentials I v. 3.1
Module 10
Networking Fundamentals

© 2004, Cisco Systems, Inc. All rights reserved.

2
Module 10
Networking Fundamentals
10.1 – Introduction to PC Networking
10.2 – Types of Networks
10.3 – Adding a Network Interface Card (NIC)
10.4 – Physical Components of a Network
10.5 – LAN Architectures
10.6 – Networking Protocols and the OSI Model
10.7 – TCP/IP Utilities
10.8 – Connecting to the Internet
Introduction to PC Networking
Defining a Computer Network
• A computer network allows
users to communicate with
other users on the same
network by transmitting data
on the cables used to connect
them.
• A computer network is defined
as having two or more devices
(such as workstations,
printers, or servers) that are
linked together for the purpose
of sharing information,
resources, or both.
• Network links are made using
copper cables, fiber-optic
cables, or wireless
Defining a Computer Network
• A network consists of
many overlapping
systems, such as cabling,
addressing schemes, or
applications.
• The layers work together
to transmit and receive
data.
• The Open Systems
Interconnection (OSI)
reference model, was
created to define these
multiple layers.
File, Print, and Application Services
• Computer networks offer file
and print services.
• In networks, different
computers take on specialized
roles or functions.
• Once connected, one or more
computers in the network can
function as network file
servers.
• The server is a repository for
files that can be accessed and
shared across the network by
many users.
File, Print, and Application Services
• All network operating
systems offer file and print
services.
• Sharing information,
collaborating on projects,
and providing access to
input and output devices
are common services of
computer networks.
Mail Services
• E-mail services work like the
postal system, with one computer
taking on the function of post
office.
• The user e-mail account operates
like a post office box, where mail
is held for the user until it is
picked up over the network by an
e-mail client program running in
the user system.
• The e-mail is sent from the client
computer to the server, which
acts as the post office. The server
sends it to the e-mail address.
Directory and Name Services
• To enable users and
systems on the network to
find the services they
require, computer networks
make use of directories and
name services.
Directory and Name Services
• Directory and name
services make a network
easier to use.
• After the initial setup of the
directory or name service,
this translation takes place
transparently.
• In addition to their ease of
use, they also make the
network more flexible.
The Internet
• The Internet is a
worldwide public network
of networks,
interconnecting thousands
of smaller networks to
form one large “web” of
communication.
• The Internet functions like
a highway to facilitate
exchange between
geographically separated
users, organizations, and
branches of companies.
The Internet
• The phrase “information
superhighway” describes
the benefit of the Internet to
business and private
communication.
• The Internet breaks down
barriers of time and space,
enabling the sharing of
information around the
globe almost
instantaneously.
Network Administration
• The ongoing task of network administration is to
maintain and adapt the network to changing
conditions.
• Network administrator responsibilities include:
– Setting up new user accounts and services
– Monitoring network performance
– Repairing network failures
Simplex, Half-Duplex,
and Full-Duplex Transmission
• Simplex transmission is a
single one-way baseband
transmission.
• It is also called
unidirectional because
the signal travels in only
one direction.
• An example of simplex
transmission is the signal
sent from the cable TV
station to the home
television.
Simplex, Half-Duplex,
and Full-Duplex Transmission
• This means that only one
side can transmit at a time.
• Two-way radios, such as
Citizens Band (CB) and
police/emergency
communications mobile
radios, work with halfduplex transmissions.
Simplex, Half-Duplex,
and Full-Duplex Transmission
• Traffic can travel in both
directions at the same time.
• A regular telephone
conversation is an example
of full-duplex
communication. Both
parties can talk at the same
time, and the person talking
on the other end can still be
heard by the other party
while they are talking.
Types of Networks
Overview
• By using local-area network (LAN) and wide-area
network (WAN) technologies, many computers are
interconnected to provide services to their users.
• In providing services, networked computers take on
different roles or functions in relation to each other.
• Some types of applications require computers to
function as equal partners. Other types of
applications distribute work so that one computer
functions to serve a number of others in an unequal
relationship.
Peer-to-Peer Networks
• In a peer-to-peer network,
the networked computers
act as equal partners, or
peers, to each other.
• As peers, each computer
can take on the client
function or the server
function alternately.
Client/Server Networks
• In a client/server network
arrangement, network
services are located in a
dedicated computer whose
only function is to respond to
the requests of clients.
• The server contains the file,
print, application, security,
and other services in a
central computer that is
continuously available to
respond to client requests.
Local-Area Networks (LANs)
• A local-area network (LAN)
can connect many
computers in a relatively
small geographical area
such as a home, an office,
or a campus.
• It allows users to access
high bandwidth media like
the Internet and allows
users to share devices such
as printers.
Local-Area Networks (LANs)
• The general shape or layout
of a LAN is called its
topology.
• Topology defines the
structure of the network.
This includes the physical
topology which is the actual
layout of the wire or media,
and the logical topology
which is how the media is
accessed by the hosts.
Wide-Area Networks (WANs)
• A WAN, as the name implies, is
designed to work over a larger
area than a LAN.
• A WAN uses point-to-point or
point to multipoint, serial
communications lines.
• Point-to-point lines connect only
two locations, one on each side
of the line. Point-to-multipoint
lines connect one location on
one side of the line to multiple
locations on the other side.
Wide-Area Networks (WANs)
• The following are some of the more
common WAN technologies:
–
–
–
–
–
–

Modems
Integrated Services Digital Network (ISDN)
Digital subscriber line (DSL)
Frame Relay
Asynchronous Transfer Mode (ATM)
The T (US) and E (Europe) Carrier series (T1,
E1, T3, E3, and so on)
– Synchronous Optical Network (SONET)
Wide-Area Networks (WANs)
• Connections across WAN lines
may be temporary or
permanent.
• Telephone or dialup lines, might
make a temporary connection to
a remote network from a
computer in a home or small
office.
• In both temporary and
permanent cases, computers
that connect over wide area
circuits must use a modem or
channel service unit/data
service unit (CSU/DSU) at each
end of the connection.
Wide-Area Networks (WANs)
• The public telephone system,
sometimes referred to as plain
old telephone service (POTS), is
a circuit-switched
communications network.
• When a telephone call is placed
in this type of network, only one
physical path is used between
the telephones for the duration
of that call.
• This pathway is maintained for
the exclusive use of the call,
until the connection is ended
and the telephone is hung up.
Wide-Area Networks (WANs)
• In a packet-switched
network, each individual
packet of data can take a
different route and no
dedicated pathway or circuit
is established.
Adding a Network Interface Card (NIC)
What is a NIC?
• A network interface card
(NIC) is a device that plugs
into a motherboard and
provides ports for the
network cable connections.
• It is the computer interface
with the LAN.
• The NIC communicates with
the network through serial
connections and
communicates with the
computer through parallel
connections.
Setting the IP Address
•
•

•

In a (TCP/IP)-based LAN, PCs
use an IP address to identify
each other.
These addresses allow
computers that are attached to
the network to locate each
other.
IP addresses for hosts on a
LAN can be assigned in two
ways:
1. Manually assigned by the
network administrator
2. Assigned by a Dynamic Host
Configuration Protocol
(DHCP) server
DHCP Servers
• The most common and efficient
way for computers on a large
network to obtain an IP address
is through a Dynamic Host
Configuration Protocol (DHCP)
server.
• DHCP is a software utility that
runs on a computer and is
designed to assign IP addresses
to PCs.
• When the DHCP server receives
a request from a host, it selects
IP address information from a set
of predefined addresses that are
stored in its database.
Default Gateway
• A computer located on one
network segment that is
trying to talk to another
computer on a different
segment sends the data
through a default gateway.
• The default gateway is the
“near side” interface of the
router, the interface on the
router to which the network
segment or wire of the local
computer is attached.
Domain Name System
• Most hosts are identified on the
Internet by friendly computer
names known as domain
names.
• The Domain Name System
(DNS) is used to translate
computer names such as
cisco.com to their
corresponding unique IP
address.
• The DNS server keeps records
that map computer (host)
names and their corresponding
IP address. These record types
are all combined in the DNS
table.
Physical Components of a Network
Network Topologies
• The network topology
defines the way in which
computers, printers, and
other devices are connected.
A network topology
describes the layout of the
wire and devices as well as
the paths used by data
transmissions.
• Commonly referred to as a
linear bus, all the devices on
a bus topology are
connected by one single
cable.
Network Topologies
• The star topology is the most
commonly used architecture in
Ethernet LANs.
• When installed, the star topology
resembles spokes in a bicycle
wheel.
• Larger networks use the
extended star topology. When
used with network devices that
filter frames or packets, like
bridges, switches, and routers,
this topology significantly
reduces the traffic on the wires
by sending packets only to the
wires of the destination host.
Network Topologies
• A frame travels around the ring,
stopping at each node. If a node
wants to transmit data, it adds
the data as well as the
destination address to the frame.
• The frame then continues around
the ring until it finds the
destination node, which takes
the data out of the frame.
– Single ring – All the devices on the
network share a single cable
– Dual ring – The dual ring topology
allows data to be sent in both
directions although only one ring is
used at a time.
Network Topologies
• The mesh topology
connects all devices
(nodes) to each other for
redundancy and fault
tolerance.
• It is used in WANs to
interconnect LANs and for
mission critical networks
like those used by
governments.
• Implementing the mesh
topology is expensive and
difficult.
Physical versus Logical Topology
• Networks have both a
physical and logical
topology:
– Physical topology –the
layout of the devices and
media.
– Logical topology – the
paths that signals travel
from one point on the
network to another.
– The way in which data
accesses media and
transmits packets across it.
Networking Media
• Networking media can be
defined simply as the means by
which signals (data) are sent
from one computer to another
(either by cable or wireless
means).
• Coaxial cable is a copper-cored
cable surrounded by a heavy
shielding and is used to connect
computers in a network.
• There are several types of
coaxial cable, including thicknet,
thinnet, RG-59 (standard cable
for cable TV), and RG-6 (used in
video distribution).
Networking Media
• Twisted-pair is a type of cabling
that is used for telephone
communications and most
modern Ethernet networks.
• A pair of wires forms a circuit
that can transmit data. The pairs
are twisted to provide protection
against crosstalk, the noise
generated by adjacent pairs.
• There are two basic types,
shielded twisted-pair (STP) and
unshielded twisted-pair (UTP).
Networking Media
• UTP comes in several categories that are based on
the number of wires and number of twists in those
wires.
• Category 3 is the wiring used primarily for telephone
connections.
• Category 5 and Category 5e are currently the most
common Ethernet cables used.
Networking Media
• Fiber-optic cable is a
networking medium capable
of conducting modulated
light transmissions.
• Fiber-optic refers to cabling
that has a core of strands of
glass or plastic (instead of
copper), through which light
pulses carry signals.
• Signals that represent data
are converted into beams of
light.
Networking Media
• If the cost of running cables is
too high or computers need
to be movable without being
tethered to cables, wireless is
an alternative method of
connecting a LAN.
• Wireless networks use radio
frequency (RF), laser,
infrared (IR), and
satellite/microwaves to carry
signals from one computer to
another without a permanent
cable connection.
Common Networking Devices
• A hub is a device that is
used to extend an Ethernet
wire to allow more devices
to communicate with each
other.
• Hubs are most commonly
used in Ethernet 10BASE-T
or 100BASE-T networks,
although there are other
network architectures that
use them.
Common Networking Devices
• Bridges connect network
segments.
• The basic functionality of the
bridge resides in its ability to
make intelligent decisions about
whether to pass signals on to
the next segment of a network.
• A switch is a more sophisticated
device than a bridge, although
the basic function of the switch
is deceptively simple.
• Ethernet switches are becoming
popular connectivity solutions
because they increase network
performance.
Common Networking Devices
• Routers are slower than
bridges and switches, but
make “smart” decisions on
how to route (or send)
packets received on one
port to a network on
another port.
• Routers contain tables of
network addresses along
with optimal destination
routes to other networks.
Server Components
• Server components are
those components that are
used exclusively with the
network server. End users
depend on the server to
provide the services
required.
• To keep the server running
at it is optimal performance,
a higher level of preventive
maintenance must be
maintained.
LAN Architectures
Ethernet
• The Ethernet architecture is based on the IEEE 802.3
standard. The IEEE 802.3 standard specifies that a
network implements the Carrier Sense Multiple
Access with Collision Detection (CSMA/CD) access
control method.
• Standard transfer rates are 10 Mbps or 100 Mbps,
but new standards provide for gigabit Ethernet, which
are capable of attaining speeds up to 1 Gbps over
fiber-optic cable or other high-speed media.
Ethernet
• 10BASE-T uses a star
topology.
• The 10 stands for the
common transmission
speed of 10 MBps, the
"BASE" stands for
baseband mode, and the
"T" stands for twisted pair
cabling.
Ethernet
• 100BASE-X comes in
several different varieties.
• It can be implemented over
4-pair Category 3, 4, or 5
UTP (100BASE-T).
• It can also be implemented
over 4-pair Category 5 UTP
or Shielded Twisted Pair
(STP) (100BASE-TX), or as
Ethernet over 2-strand fiberoptic cable (100BASE-FX).
Ethernet
• 1000BASE-T is Gigabit Ethernet.
• This architecture supports data transfer rates of 1
Gbps.
Token Ring
• The Token Ring standards are
defined in IEEE 802.5.
• A Token Ring network uses a
token (that is, a special signal)
to control access to the cable.
– A token is initially generated
when the first computer on the
network comes online.
– When a computer wants to
transmit, it waits for and then
takes control of the token when
it comes its way.
– The token can travel in either
direction around the ring, but
only in one direction at a time.
Fiber Distributed Data Interface (FDDI)
• FDDI is a type of Token
Ring network.
• It runs on fiber-optic cable,
and thus combines highspeed performance with the
advantages of the tokenpassing ring topology.
• It runs at 100 Mbps, and its
topology is a dual ring.
• The outer ring is called the
primary ring and the inner
ring is called the secondary
ring.
Networking Protocols and the OSI Model
OSI Model Overview
• The Open Systems
Interconnection (OSI)
reference model is an
industry standard
framework that is used to
divide the functions of
networking into seven
distinct layers.
• Each layer provides
specific services to the
layers above and below it
in order for the network to
work effectively.
OSI Model Overview
• A message begins at the top
application layer and moves
down the OSI layers to the
bottom physical layer.
• As the message descends,
each successive OSI model
layer adds a header to it.
• A header is layer-specific
information that basically
explains what functions the
layer carried out.
• Conversely, at the receiving
end, headers are striped from
the message as it travels up the
corresponding layers.
What is a Protocol?
• Protocol is a controlled
sequence of messages that
is exchanged between two
or more systems to
accomplish a given task.
• Protocol specifications
define this sequence
together with the format or
layout of the messages that
are exchanged.
Transmission Control Protocol/Internet
Protocol
• The Transmission Control
Protocol/Internet Protocol
(TCP/IP) suite of protocols
has become the dominant
standard for internetworking.
• TCP/IP represents a set
of public standards that
specify how packets of
information are
exchanged between
computers over one or
more networks.
Transmission Control Protocol/Internet
Protocol
Internetwork Packet
Exchange/Sequenced Packet Exchange
• Internetwork Packet
Exchange/Sequenced
Packet Exchange
(IPX/SPX) is the
protocol suite employed
originally by Novell®.
• It delivers functions
similar to those included
in TCP/IP.
NetBEUI
• NetBIOS Extended User Interface (NetBEUI) is a
protocol used primarily on small Windows NT
networks.
• NetBEUI is a simple protocol that lacks many of the
features that enable protocol suites such as
TCP/IP to be used on networks of almost any size.
AppleTalk
• AppleTalk is comprised of
a e set of protocols that
span the seven layers of
the OSI reference model.
• AppleTalk protocols were
designed to run over the
major LAN types, notably
Ethernet and Token Ring,
and also Apple's own
LAN physical topology,
LocalTalk.
TCP/IP Utilities
Overview
• TCP/IP is a complex
collection of protocols.
• Most vendors implement
the suite to include a variety
of utilities for viewing
configuration information
and troubleshooting
problems.
Ping
• Ping works by sending an ICMP echo request to the
destination computer.
• The receiving computer then sends back an ICMP
echo reply message
• It is also possible to use Ping to find the IP address of
a host when the name is known.
ARP, RARP, NSLOOKUP
• Address Resolution Protocol
(ARP) is the means by which
networked computers map
Internet Protocol (IP)
addresses to physical
hardware (MAC) addresses
that are recognized in a local
network.
• Machines that do not know
their IP addresses use
Reverse Address Resolution
Protocol (RARP).
• It is used to obtain IP address
information based on the
physical or MAC address.
ARP, RARP, NSLOOKUP
• Nslookup returns the IP address for a given
hostname.
• It will also do the reverse and find the host name
for a specified IP address.
Netstat/tpcon
• The netstat command is used in Windows and
UNIX/Linux to display TCP/IP connection and protocol
information.
• The netstat command provides a list of connections
that are currently active.
• Netstat statistics can be useful in troubleshooting
TCP/IP connectivity problems.
Nbtstat
• The Microsoft TCP/IP
stacks included in
Windows operating
systems provide the
nbtstat utility, which is
used to display NetBIOS
information.
Ipconfig, winipcfg, config, and ifconfig
• TCP/IP configuration
information can be
displayed using different
utilities
• Ipconfig – Windows NT
and Windows 2000
(command-line)
• Winipcfg –- Windows 95,
98, and ME (graphical
interface)
• Ifconfig – UNIX and Linux
(command-line
Tracert, iptrace, and traceroute
• It is often useful to trace the
route a packet takes on its
journey from source
computer to destination host.
• TCP/IP stacks include a
route tracing utility that
enables users to identify the
routers through which the
message passes.
• The options depend on the
operating system:
– Tracert
– Iptrace
– Traceroute
Connecting to the Internet
Synchronous and Asynchronous Serial
lines
• Synchronous serial
transmission – Data bits are
sent together with a
synchronizing clock pulse. Builtin timing mechanism
coordinates the clocks of the
sending and receiving devices.
• Asynchronous serial
transmission – Data bits are
sent without a synchronizing
clock pulse. Uses a start bit at
the beginning of each message.
When the receiving device gets
the start bit, it can synchronize
its internal clock with the sender
clock.
Modems
• The modem is an electronic
device that is used for
computer communications
through telephone lines.
• It allows data transfer
between one computer and
another.
• There are four main types
of modems:
–
–
–
–

Expansion cards
PCMCIA
External modems
Built-in modems
Dial-Up Networking,
Modem Standards, AT Commands
• When computers use the
public telephone system or
network to communicate, it is
called Dial-Up Networking
(DUN).
• All modems require software to
control the communication
session.
• The set of commands that
most modem software uses
are known as the Hayescompatible command set. The
Hayes command set is based
on a group of instructions that
always begins with a set of
attention characters (AT).
ISPs and Internet Backbone Providers
• Services of an Internet Service Provider (ISP) are
required to surf the Internet.
• An ISP is a company that connects computers to
the Internet and World Wide Web.
• The actual connection to the Internet is tiered.
• The ISP may link to a larger regional ISP, which in
turn might connect to one of a number of
nationwide computer centers.
ISPs and Internet Backbone Providers
• The current U.S. Internet
infrastructure consists of a
commercial backbone and a
high-speed service known as
the Very High-Speed Backbone
Network Service (vBNS).
• The vBNS connects five
supercomputer networks across
the country:
– UUNET - a division of
WorldCom
– Cable & Wireless USA
– Sprint
– AT&T
– BBN Planet
ISPs and Internet Backbone Providers
• The ISP that cannot connect
directly to the national
backbone is charged a fee to
connect to a regional
provider that links to the
national backbone through a
Network Access Point (NAP).
• Not all the Internet traffic
goes through NAPs.
• Some ISPs that are in the
same geographic area make
their own interconnections
and peering agreements.
Digital Subscriber Line (DSL)
• Digital Subscriber Line (DSL) is an always-on
technology. This means there is no need to dial up
each time to connect to the Internet.
• DSL comes in several varieties:
–
–
–
–

Asymmetric DSL (ADSL)
High Data Rate DSL (HDSL)
Symmetric DSL (SDSL)
Very High Data Rate DSL (VDSL)
Cable Modems
• A cable modem acts like a
LAN interface by connecting
a computer to the Internet.
• The cable modem connects
a computer to the cable
company network through
the same coaxial cabling
that feeds cable TV (CATV)
signals to a television set.
Cable Modem versus
DSL Internet Technologies
• When it comes to
comparing cable modem
and DSL Internet
technologies, both have
their pros and cons.
ISDN
• Another alternative to using
analog telephones lines to
establish a connection is ISDN.
• Speed is one advantage ISDN
has over telephone line
connections.
• ISDN uses a pair of 64Kbps
digital lines to connect, which
provides a total of 128Kbps
throughput.
• A telephone line connects at a
maximum speed of 56Kbps, and
in some areas, doesn’t even
reach that.
Satellite
• Satellite is an option for users in
rural areas or with no other
access to high speed Internet
service.
• Satellite Internet does not require
a phone line or cable. Two‑ way
communication, for upload and
download, is achieved with the
use of a satellite dish.
• Download speed is up to 500
kbps while the upload speed is
one‑ tenth of that of that.
Networking

Mais conteúdo relacionado

Mais procurados

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingPriya Manik
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networksNicholas Riungu
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317Khondoker Sadia
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt downloadzanetorserwaah
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Studentrprajat007
 
I Introduction To Data Communications
I  Introduction To Data CommunicationsI  Introduction To Data Communications
I Introduction To Data CommunicationsDon Bosco BSIT
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Prof. Maulik Trivedi
 
Cn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuCn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuJay Patel
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networkingSameer Sharma
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 

Mais procurados (20)

Computing 9
Computing 9Computing 9
Computing 9
 
Networks
NetworksNetworks
Networks
 
Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics) Information Networks - (Covered all the Important Topics)
Information Networks - (Covered all the Important Topics)
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Types of Networks
Types of NetworksTypes of Networks
Types of Networks
 
Introduction to computer networks
Introduction to computer networksIntroduction to computer networks
Introduction to computer networks
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
Class work 2,computer_network_317
Class work 2,computer_network_317Class work 2,computer_network_317
Class work 2,computer_network_317
 
Networking.
Networking.Networking.
Networking.
 
Introduction to computer networks ppt download
Introduction to computer networks   ppt downloadIntroduction to computer networks   ppt download
Introduction to computer networks ppt download
 
Networking
NetworkingNetworking
Networking
 
Lesson 1 introduction
Lesson 1 introductionLesson 1 introduction
Lesson 1 introduction
 
Computer Networks for Computer Science Student
Computer Networks for Computer Science StudentComputer Networks for Computer Science Student
Computer Networks for Computer Science Student
 
Networks
NetworksNetworks
Networks
 
I Introduction To Data Communications
I  Introduction To Data CommunicationsI  Introduction To Data Communications
I Introduction To Data Communications
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester
 
Cn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtuCn 04,32,36-Cn all chapters1- computer networks- gtu
Cn 04,32,36-Cn all chapters1- computer networks- gtu
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Computer network
Computer networkComputer network
Computer network
 

Semelhante a Networking

network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxmbombongafu
 
Computer network
Computer networkComputer network
Computer networkRahul Das
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdfNehaam3
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and NetworkingSajitha Pathirana
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of networkAlbert Abbosey
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information TechnologySagar Mehta
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptxAnkita Shirke
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptxandree45846
 
Computer communication network
Computer communication networkComputer communication network
Computer communication networkhimz676987
 

Semelhante a Networking (20)

network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
Computer network
Computer networkComputer network
Computer network
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
CNE CHP1.pdf
CNE CHP1.pdfCNE CHP1.pdf
CNE CHP1.pdf
 
Computer networks
Computer networksComputer networks
Computer networks
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Networking
NetworkingNetworking
Networking
 
14.-NETWORKS.pptx
14.-NETWORKS.pptx14.-NETWORKS.pptx
14.-NETWORKS.pptx
 
Networking
NetworkingNetworking
Networking
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 

Mais de FLYMAN TECHNOLOGY LIMITED

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFLYMAN TECHNOLOGY LIMITED
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)FLYMAN TECHNOLOGY LIMITED
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5FLYMAN TECHNOLOGY LIMITED
 

Mais de FLYMAN TECHNOLOGY LIMITED (20)

Flyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction PresentationFlyman Technology Limited Introduction Presentation
Flyman Technology Limited Introduction Presentation
 
Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)Flyman Technology Limited (Mzumbe University Tanzania)
Flyman Technology Limited (Mzumbe University Tanzania)
 
Flyman Technology Limited Tanzania
Flyman Technology Limited TanzaniaFlyman Technology Limited Tanzania
Flyman Technology Limited Tanzania
 
Saadani national park 2015
Saadani national park 2015Saadani national park 2015
Saadani national park 2015
 
Uuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asiliUuzaji wa mazao ya kuku wa asili
Uuzaji wa mazao ya kuku wa asili
 
Entrepreneurship manual BIT
Entrepreneurship manual BITEntrepreneurship manual BIT
Entrepreneurship manual BIT
 
Security chapter6
Security chapter6Security chapter6
Security chapter6
 
introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5introduction to the document object model- Dom chapter5
introduction to the document object model- Dom chapter5
 
Dhtml chapter2
Dhtml chapter2Dhtml chapter2
Dhtml chapter2
 
internet intranet and extranet
internet intranet and extranetinternet intranet and extranet
internet intranet and extranet
 
introduction to web application development
introduction to web application developmentintroduction to web application development
introduction to web application development
 
Marketing management
Marketing managementMarketing management
Marketing management
 
Marketing communications
Marketing communicationsMarketing communications
Marketing communications
 
Marketing analysis
Marketing analysisMarketing analysis
Marketing analysis
 
Market segmentation
Market segmentationMarket segmentation
Market segmentation
 
Consumer markets
Consumer marketsConsumer markets
Consumer markets
 
ENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUALENTREPRENEURSHIP MANUAL
ENTREPRENEURSHIP MANUAL
 
THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!THINGS NOT TO DO IN A JOB INTERVIEW!
THINGS NOT TO DO IN A JOB INTERVIEW!
 
TAXATION CONCEPTS
TAXATION CONCEPTSTAXATION CONCEPTS
TAXATION CONCEPTS
 
Html tutorial
Html tutorialHtml tutorial
Html tutorial
 

Último

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Último (20)

DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Networking

  • 1.
  • 2. IT Essentials I v. 3.1 Module 10 Networking Fundamentals © 2004, Cisco Systems, Inc. All rights reserved. 2
  • 3. Module 10 Networking Fundamentals 10.1 – Introduction to PC Networking 10.2 – Types of Networks 10.3 – Adding a Network Interface Card (NIC) 10.4 – Physical Components of a Network 10.5 – LAN Architectures 10.6 – Networking Protocols and the OSI Model 10.7 – TCP/IP Utilities 10.8 – Connecting to the Internet
  • 4. Introduction to PC Networking
  • 5. Defining a Computer Network • A computer network allows users to communicate with other users on the same network by transmitting data on the cables used to connect them. • A computer network is defined as having two or more devices (such as workstations, printers, or servers) that are linked together for the purpose of sharing information, resources, or both. • Network links are made using copper cables, fiber-optic cables, or wireless
  • 6. Defining a Computer Network • A network consists of many overlapping systems, such as cabling, addressing schemes, or applications. • The layers work together to transmit and receive data. • The Open Systems Interconnection (OSI) reference model, was created to define these multiple layers.
  • 7. File, Print, and Application Services • Computer networks offer file and print services. • In networks, different computers take on specialized roles or functions. • Once connected, one or more computers in the network can function as network file servers. • The server is a repository for files that can be accessed and shared across the network by many users.
  • 8. File, Print, and Application Services • All network operating systems offer file and print services. • Sharing information, collaborating on projects, and providing access to input and output devices are common services of computer networks.
  • 9. Mail Services • E-mail services work like the postal system, with one computer taking on the function of post office. • The user e-mail account operates like a post office box, where mail is held for the user until it is picked up over the network by an e-mail client program running in the user system. • The e-mail is sent from the client computer to the server, which acts as the post office. The server sends it to the e-mail address.
  • 10. Directory and Name Services • To enable users and systems on the network to find the services they require, computer networks make use of directories and name services.
  • 11. Directory and Name Services • Directory and name services make a network easier to use. • After the initial setup of the directory or name service, this translation takes place transparently. • In addition to their ease of use, they also make the network more flexible.
  • 12. The Internet • The Internet is a worldwide public network of networks, interconnecting thousands of smaller networks to form one large “web” of communication. • The Internet functions like a highway to facilitate exchange between geographically separated users, organizations, and branches of companies.
  • 13. The Internet • The phrase “information superhighway” describes the benefit of the Internet to business and private communication. • The Internet breaks down barriers of time and space, enabling the sharing of information around the globe almost instantaneously.
  • 14. Network Administration • The ongoing task of network administration is to maintain and adapt the network to changing conditions. • Network administrator responsibilities include: – Setting up new user accounts and services – Monitoring network performance – Repairing network failures
  • 15. Simplex, Half-Duplex, and Full-Duplex Transmission • Simplex transmission is a single one-way baseband transmission. • It is also called unidirectional because the signal travels in only one direction. • An example of simplex transmission is the signal sent from the cable TV station to the home television.
  • 16. Simplex, Half-Duplex, and Full-Duplex Transmission • This means that only one side can transmit at a time. • Two-way radios, such as Citizens Band (CB) and police/emergency communications mobile radios, work with halfduplex transmissions.
  • 17. Simplex, Half-Duplex, and Full-Duplex Transmission • Traffic can travel in both directions at the same time. • A regular telephone conversation is an example of full-duplex communication. Both parties can talk at the same time, and the person talking on the other end can still be heard by the other party while they are talking.
  • 19. Overview • By using local-area network (LAN) and wide-area network (WAN) technologies, many computers are interconnected to provide services to their users. • In providing services, networked computers take on different roles or functions in relation to each other. • Some types of applications require computers to function as equal partners. Other types of applications distribute work so that one computer functions to serve a number of others in an unequal relationship.
  • 20. Peer-to-Peer Networks • In a peer-to-peer network, the networked computers act as equal partners, or peers, to each other. • As peers, each computer can take on the client function or the server function alternately.
  • 21. Client/Server Networks • In a client/server network arrangement, network services are located in a dedicated computer whose only function is to respond to the requests of clients. • The server contains the file, print, application, security, and other services in a central computer that is continuously available to respond to client requests.
  • 22. Local-Area Networks (LANs) • A local-area network (LAN) can connect many computers in a relatively small geographical area such as a home, an office, or a campus. • It allows users to access high bandwidth media like the Internet and allows users to share devices such as printers.
  • 23. Local-Area Networks (LANs) • The general shape or layout of a LAN is called its topology. • Topology defines the structure of the network. This includes the physical topology which is the actual layout of the wire or media, and the logical topology which is how the media is accessed by the hosts.
  • 24. Wide-Area Networks (WANs) • A WAN, as the name implies, is designed to work over a larger area than a LAN. • A WAN uses point-to-point or point to multipoint, serial communications lines. • Point-to-point lines connect only two locations, one on each side of the line. Point-to-multipoint lines connect one location on one side of the line to multiple locations on the other side.
  • 25. Wide-Area Networks (WANs) • The following are some of the more common WAN technologies: – – – – – – Modems Integrated Services Digital Network (ISDN) Digital subscriber line (DSL) Frame Relay Asynchronous Transfer Mode (ATM) The T (US) and E (Europe) Carrier series (T1, E1, T3, E3, and so on) – Synchronous Optical Network (SONET)
  • 26. Wide-Area Networks (WANs) • Connections across WAN lines may be temporary or permanent. • Telephone or dialup lines, might make a temporary connection to a remote network from a computer in a home or small office. • In both temporary and permanent cases, computers that connect over wide area circuits must use a modem or channel service unit/data service unit (CSU/DSU) at each end of the connection.
  • 27. Wide-Area Networks (WANs) • The public telephone system, sometimes referred to as plain old telephone service (POTS), is a circuit-switched communications network. • When a telephone call is placed in this type of network, only one physical path is used between the telephones for the duration of that call. • This pathway is maintained for the exclusive use of the call, until the connection is ended and the telephone is hung up.
  • 28. Wide-Area Networks (WANs) • In a packet-switched network, each individual packet of data can take a different route and no dedicated pathway or circuit is established.
  • 29. Adding a Network Interface Card (NIC)
  • 30. What is a NIC? • A network interface card (NIC) is a device that plugs into a motherboard and provides ports for the network cable connections. • It is the computer interface with the LAN. • The NIC communicates with the network through serial connections and communicates with the computer through parallel connections.
  • 31. Setting the IP Address • • • In a (TCP/IP)-based LAN, PCs use an IP address to identify each other. These addresses allow computers that are attached to the network to locate each other. IP addresses for hosts on a LAN can be assigned in two ways: 1. Manually assigned by the network administrator 2. Assigned by a Dynamic Host Configuration Protocol (DHCP) server
  • 32. DHCP Servers • The most common and efficient way for computers on a large network to obtain an IP address is through a Dynamic Host Configuration Protocol (DHCP) server. • DHCP is a software utility that runs on a computer and is designed to assign IP addresses to PCs. • When the DHCP server receives a request from a host, it selects IP address information from a set of predefined addresses that are stored in its database.
  • 33. Default Gateway • A computer located on one network segment that is trying to talk to another computer on a different segment sends the data through a default gateway. • The default gateway is the “near side” interface of the router, the interface on the router to which the network segment or wire of the local computer is attached.
  • 34. Domain Name System • Most hosts are identified on the Internet by friendly computer names known as domain names. • The Domain Name System (DNS) is used to translate computer names such as cisco.com to their corresponding unique IP address. • The DNS server keeps records that map computer (host) names and their corresponding IP address. These record types are all combined in the DNS table.
  • 36. Network Topologies • The network topology defines the way in which computers, printers, and other devices are connected. A network topology describes the layout of the wire and devices as well as the paths used by data transmissions. • Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
  • 37. Network Topologies • The star topology is the most commonly used architecture in Ethernet LANs. • When installed, the star topology resembles spokes in a bicycle wheel. • Larger networks use the extended star topology. When used with network devices that filter frames or packets, like bridges, switches, and routers, this topology significantly reduces the traffic on the wires by sending packets only to the wires of the destination host.
  • 38. Network Topologies • A frame travels around the ring, stopping at each node. If a node wants to transmit data, it adds the data as well as the destination address to the frame. • The frame then continues around the ring until it finds the destination node, which takes the data out of the frame. – Single ring – All the devices on the network share a single cable – Dual ring – The dual ring topology allows data to be sent in both directions although only one ring is used at a time.
  • 39. Network Topologies • The mesh topology connects all devices (nodes) to each other for redundancy and fault tolerance. • It is used in WANs to interconnect LANs and for mission critical networks like those used by governments. • Implementing the mesh topology is expensive and difficult.
  • 40. Physical versus Logical Topology • Networks have both a physical and logical topology: – Physical topology –the layout of the devices and media. – Logical topology – the paths that signals travel from one point on the network to another. – The way in which data accesses media and transmits packets across it.
  • 41. Networking Media • Networking media can be defined simply as the means by which signals (data) are sent from one computer to another (either by cable or wireless means). • Coaxial cable is a copper-cored cable surrounded by a heavy shielding and is used to connect computers in a network. • There are several types of coaxial cable, including thicknet, thinnet, RG-59 (standard cable for cable TV), and RG-6 (used in video distribution).
  • 42. Networking Media • Twisted-pair is a type of cabling that is used for telephone communications and most modern Ethernet networks. • A pair of wires forms a circuit that can transmit data. The pairs are twisted to provide protection against crosstalk, the noise generated by adjacent pairs. • There are two basic types, shielded twisted-pair (STP) and unshielded twisted-pair (UTP).
  • 43. Networking Media • UTP comes in several categories that are based on the number of wires and number of twists in those wires. • Category 3 is the wiring used primarily for telephone connections. • Category 5 and Category 5e are currently the most common Ethernet cables used.
  • 44. Networking Media • Fiber-optic cable is a networking medium capable of conducting modulated light transmissions. • Fiber-optic refers to cabling that has a core of strands of glass or plastic (instead of copper), through which light pulses carry signals. • Signals that represent data are converted into beams of light.
  • 45. Networking Media • If the cost of running cables is too high or computers need to be movable without being tethered to cables, wireless is an alternative method of connecting a LAN. • Wireless networks use radio frequency (RF), laser, infrared (IR), and satellite/microwaves to carry signals from one computer to another without a permanent cable connection.
  • 46. Common Networking Devices • A hub is a device that is used to extend an Ethernet wire to allow more devices to communicate with each other. • Hubs are most commonly used in Ethernet 10BASE-T or 100BASE-T networks, although there are other network architectures that use them.
  • 47. Common Networking Devices • Bridges connect network segments. • The basic functionality of the bridge resides in its ability to make intelligent decisions about whether to pass signals on to the next segment of a network. • A switch is a more sophisticated device than a bridge, although the basic function of the switch is deceptively simple. • Ethernet switches are becoming popular connectivity solutions because they increase network performance.
  • 48. Common Networking Devices • Routers are slower than bridges and switches, but make “smart” decisions on how to route (or send) packets received on one port to a network on another port. • Routers contain tables of network addresses along with optimal destination routes to other networks.
  • 49. Server Components • Server components are those components that are used exclusively with the network server. End users depend on the server to provide the services required. • To keep the server running at it is optimal performance, a higher level of preventive maintenance must be maintained.
  • 51. Ethernet • The Ethernet architecture is based on the IEEE 802.3 standard. The IEEE 802.3 standard specifies that a network implements the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) access control method. • Standard transfer rates are 10 Mbps or 100 Mbps, but new standards provide for gigabit Ethernet, which are capable of attaining speeds up to 1 Gbps over fiber-optic cable or other high-speed media.
  • 52. Ethernet • 10BASE-T uses a star topology. • The 10 stands for the common transmission speed of 10 MBps, the "BASE" stands for baseband mode, and the "T" stands for twisted pair cabling.
  • 53. Ethernet • 100BASE-X comes in several different varieties. • It can be implemented over 4-pair Category 3, 4, or 5 UTP (100BASE-T). • It can also be implemented over 4-pair Category 5 UTP or Shielded Twisted Pair (STP) (100BASE-TX), or as Ethernet over 2-strand fiberoptic cable (100BASE-FX).
  • 54. Ethernet • 1000BASE-T is Gigabit Ethernet. • This architecture supports data transfer rates of 1 Gbps.
  • 55. Token Ring • The Token Ring standards are defined in IEEE 802.5. • A Token Ring network uses a token (that is, a special signal) to control access to the cable. – A token is initially generated when the first computer on the network comes online. – When a computer wants to transmit, it waits for and then takes control of the token when it comes its way. – The token can travel in either direction around the ring, but only in one direction at a time.
  • 56. Fiber Distributed Data Interface (FDDI) • FDDI is a type of Token Ring network. • It runs on fiber-optic cable, and thus combines highspeed performance with the advantages of the tokenpassing ring topology. • It runs at 100 Mbps, and its topology is a dual ring. • The outer ring is called the primary ring and the inner ring is called the secondary ring.
  • 57. Networking Protocols and the OSI Model
  • 58. OSI Model Overview • The Open Systems Interconnection (OSI) reference model is an industry standard framework that is used to divide the functions of networking into seven distinct layers. • Each layer provides specific services to the layers above and below it in order for the network to work effectively.
  • 59. OSI Model Overview • A message begins at the top application layer and moves down the OSI layers to the bottom physical layer. • As the message descends, each successive OSI model layer adds a header to it. • A header is layer-specific information that basically explains what functions the layer carried out. • Conversely, at the receiving end, headers are striped from the message as it travels up the corresponding layers.
  • 60. What is a Protocol? • Protocol is a controlled sequence of messages that is exchanged between two or more systems to accomplish a given task. • Protocol specifications define this sequence together with the format or layout of the messages that are exchanged.
  • 61. Transmission Control Protocol/Internet Protocol • The Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols has become the dominant standard for internetworking. • TCP/IP represents a set of public standards that specify how packets of information are exchanged between computers over one or more networks.
  • 63. Internetwork Packet Exchange/Sequenced Packet Exchange • Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX) is the protocol suite employed originally by Novell®. • It delivers functions similar to those included in TCP/IP.
  • 64. NetBEUI • NetBIOS Extended User Interface (NetBEUI) is a protocol used primarily on small Windows NT networks. • NetBEUI is a simple protocol that lacks many of the features that enable protocol suites such as TCP/IP to be used on networks of almost any size.
  • 65. AppleTalk • AppleTalk is comprised of a e set of protocols that span the seven layers of the OSI reference model. • AppleTalk protocols were designed to run over the major LAN types, notably Ethernet and Token Ring, and also Apple's own LAN physical topology, LocalTalk.
  • 67. Overview • TCP/IP is a complex collection of protocols. • Most vendors implement the suite to include a variety of utilities for viewing configuration information and troubleshooting problems.
  • 68. Ping • Ping works by sending an ICMP echo request to the destination computer. • The receiving computer then sends back an ICMP echo reply message • It is also possible to use Ping to find the IP address of a host when the name is known.
  • 69. ARP, RARP, NSLOOKUP • Address Resolution Protocol (ARP) is the means by which networked computers map Internet Protocol (IP) addresses to physical hardware (MAC) addresses that are recognized in a local network. • Machines that do not know their IP addresses use Reverse Address Resolution Protocol (RARP). • It is used to obtain IP address information based on the physical or MAC address.
  • 70. ARP, RARP, NSLOOKUP • Nslookup returns the IP address for a given hostname. • It will also do the reverse and find the host name for a specified IP address.
  • 71. Netstat/tpcon • The netstat command is used in Windows and UNIX/Linux to display TCP/IP connection and protocol information. • The netstat command provides a list of connections that are currently active. • Netstat statistics can be useful in troubleshooting TCP/IP connectivity problems.
  • 72. Nbtstat • The Microsoft TCP/IP stacks included in Windows operating systems provide the nbtstat utility, which is used to display NetBIOS information.
  • 73. Ipconfig, winipcfg, config, and ifconfig • TCP/IP configuration information can be displayed using different utilities • Ipconfig – Windows NT and Windows 2000 (command-line) • Winipcfg –- Windows 95, 98, and ME (graphical interface) • Ifconfig – UNIX and Linux (command-line
  • 74. Tracert, iptrace, and traceroute • It is often useful to trace the route a packet takes on its journey from source computer to destination host. • TCP/IP stacks include a route tracing utility that enables users to identify the routers through which the message passes. • The options depend on the operating system: – Tracert – Iptrace – Traceroute
  • 75. Connecting to the Internet
  • 76. Synchronous and Asynchronous Serial lines • Synchronous serial transmission – Data bits are sent together with a synchronizing clock pulse. Builtin timing mechanism coordinates the clocks of the sending and receiving devices. • Asynchronous serial transmission – Data bits are sent without a synchronizing clock pulse. Uses a start bit at the beginning of each message. When the receiving device gets the start bit, it can synchronize its internal clock with the sender clock.
  • 77. Modems • The modem is an electronic device that is used for computer communications through telephone lines. • It allows data transfer between one computer and another. • There are four main types of modems: – – – – Expansion cards PCMCIA External modems Built-in modems
  • 78. Dial-Up Networking, Modem Standards, AT Commands • When computers use the public telephone system or network to communicate, it is called Dial-Up Networking (DUN). • All modems require software to control the communication session. • The set of commands that most modem software uses are known as the Hayescompatible command set. The Hayes command set is based on a group of instructions that always begins with a set of attention characters (AT).
  • 79. ISPs and Internet Backbone Providers • Services of an Internet Service Provider (ISP) are required to surf the Internet. • An ISP is a company that connects computers to the Internet and World Wide Web. • The actual connection to the Internet is tiered. • The ISP may link to a larger regional ISP, which in turn might connect to one of a number of nationwide computer centers.
  • 80. ISPs and Internet Backbone Providers • The current U.S. Internet infrastructure consists of a commercial backbone and a high-speed service known as the Very High-Speed Backbone Network Service (vBNS). • The vBNS connects five supercomputer networks across the country: – UUNET - a division of WorldCom – Cable & Wireless USA – Sprint – AT&T – BBN Planet
  • 81. ISPs and Internet Backbone Providers • The ISP that cannot connect directly to the national backbone is charged a fee to connect to a regional provider that links to the national backbone through a Network Access Point (NAP). • Not all the Internet traffic goes through NAPs. • Some ISPs that are in the same geographic area make their own interconnections and peering agreements.
  • 82. Digital Subscriber Line (DSL) • Digital Subscriber Line (DSL) is an always-on technology. This means there is no need to dial up each time to connect to the Internet. • DSL comes in several varieties: – – – – Asymmetric DSL (ADSL) High Data Rate DSL (HDSL) Symmetric DSL (SDSL) Very High Data Rate DSL (VDSL)
  • 83. Cable Modems • A cable modem acts like a LAN interface by connecting a computer to the Internet. • The cable modem connects a computer to the cable company network through the same coaxial cabling that feeds cable TV (CATV) signals to a television set.
  • 84. Cable Modem versus DSL Internet Technologies • When it comes to comparing cable modem and DSL Internet technologies, both have their pros and cons.
  • 85. ISDN • Another alternative to using analog telephones lines to establish a connection is ISDN. • Speed is one advantage ISDN has over telephone line connections. • ISDN uses a pair of 64Kbps digital lines to connect, which provides a total of 128Kbps throughput. • A telephone line connects at a maximum speed of 56Kbps, and in some areas, doesn’t even reach that.
  • 86. Satellite • Satellite is an option for users in rural areas or with no other access to high speed Internet service. • Satellite Internet does not require a phone line or cable. Two‑ way communication, for upload and download, is achieved with the use of a satellite dish. • Download speed is up to 500 kbps while the upload speed is one‑ tenth of that of that.

Notas do Editor

  1. Welcome