SlideShare uma empresa Scribd logo
1 de 65
Network Fundamentals: Introduction to Network Structure  and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Concepts in Communication
Basic Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essentials for Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 5 6
Essentials for Communications Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5 6
Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
Understanding Networking
Big Picture What do you see here for a typical network?
Key Network Terminology Explained (1) ,[object Object],[object Object],[object Object]
Key Network Terminology Explained (2) ,[object Object],[object Object],[object Object],[object Object],Network architecture  
Common Topologies - Bus  ,[object Object]
Common Topologies - Ring ,[object Object]
Common Topologies - Star ,[object Object],[object Object],[object Object]
Common Topologies - Star ,[object Object]
Common Topologies – Star Bus ,[object Object],[object Object],[object Object]
Other network topologies (architecture) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Network Terminology Explained (3) ,[object Object],[object Object],[object Object]
Basic Signal Terminologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kilo  K 2^10 Mega M 2^20 Giga G 2^30 Tera T 2^40 Peta P 2^50 Exa E 2^60 Zetta Z 2^70 Yotta Y 2^80
Data Transmission ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Transmission Medium
Basic transmission medium concepts ,[object Object],[object Object],[object Object]
Medium examples by type ,[object Object],[object Object],[object Object],[object Object]
Coaxial cable (1) ,[object Object],[object Object],[object Object],   Covered by sheath material    Outer conductor is braided shielded (ground)    Separated by insulating material    Inner conductor is solid copper metal
Coaxial cable (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Twisted Pair Cables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Categories of Twisted Pairs Cabling System Specs describe cable Material, type of  Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
Optical Fibers (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Repeaters  
Optical Fibers (2) ,[object Object],[object Object]
Wireless Transmission (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Transmission (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LAN ,[object Object],[object Object],[object Object]
Network Hardware
Hubs ,[object Object],[object Object],Reference to equipment
Gateways ,[object Object],[object Object],[object Object]
Routers ,[object Object],[object Object],[object Object],[object Object]
Bridge ,[object Object],[object Object]
What is the difference between? ,[object Object],[object Object],[object Object]
Switches ,[object Object],[object Object]
WANs and LANs
Major Categories of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (1) ,[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (2) ,[object Object],[object Object],[object Object],[object Object]
Circuit Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frame Relay Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
Asynchronous Transfer Mode (ATM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISDN and Broadband ISDN Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is ethernet? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Interface Card (NIC) ,[object Object]
How does Ethernet work? ,[object Object]
What is a MAC Address? ,[object Object]
What is a Token Ring? ,[object Object]
How do Token Rings work? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Network Protocols
Protocols of Computer Communications and Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Architecture ,[object Object],[object Object],[object Object]
ISO/OSI Reference Model (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and   receiving data on a carrier Two party communication: Ethernet   Routing and Forwarding Address: IP   End-to-end control & error checking  (ensure complete data transfer): TCP   Establish/manage connection   ASCII Text, Sound (syntax layer)   File Transfer, Email, Remote Login  
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object]
TCP/IP Five Independent Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],HTTP / FTP / Telnet /  SMTP / SLIP / PPP   TCP keep track of the  individual packets   And reassemble IP handles actual   delivery of packets
TCP (example) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ,[object Object],[object Object],[object Object]
Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol.  SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

Mais conteúdo relacionado

Mais procurados

Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client serverSatya P. Joshi
 
Ring topology
Ring topologyRing topology
Ring topologyAhh_Huay
 
Network topology
Network topologyNetwork topology
Network topologyilakkiya
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101Sameer Mahajan
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCDilum Bandara
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionGuisun Han
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G3G4G
 
Network topologies
Network topologiesNetwork topologies
Network topologiesNorah Saad
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
Evolution of computer_networks
Evolution of computer_networksEvolution of computer_networks
Evolution of computer_networksAdityaroy110
 
Network protocols
Network protocolsNetwork protocols
Network protocolsAbiud Orina
 

Mais procurados (20)

Physical and logical topologies in computer network and client server
Physical  and logical topologies in computer network and client serverPhysical  and logical topologies in computer network and client server
Physical and logical topologies in computer network and client server
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Ring topology
Ring topologyRing topology
Ring topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Network topology
Network topologyNetwork topology
Network topology
 
Computer Networking 101
Computer Networking 101Computer Networking 101
Computer Networking 101
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
Other types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFCOther types of networks: Bluetooth, Zigbee, & NFC
Other types of networks: Bluetooth, Zigbee, & NFC
 
Data transmission media
Data transmission mediaData transmission media
Data transmission media
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
LTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) IntroductionLTE (Long Term Evolution) Introduction
LTE (Long Term Evolution) Introduction
 
High-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5GHigh-level architecture of Mobile Cellular Networks from 2G to 5G
High-level architecture of Mobile Cellular Networks from 2G to 5G
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
5G Network Overview
 5G Network Overview 5G Network Overview
5G Network Overview
 
Evolution of computer_networks
Evolution of computer_networksEvolution of computer_networks
Evolution of computer_networks
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Network switch
Network switchNetwork switch
Network switch
 
LTE Advanced
LTE AdvancedLTE Advanced
LTE Advanced
 

Semelhante a Fundamentals of Networking

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentationurmishabm
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz aliFaraz Faqeer
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
It infrastructure
It infrastructureIt infrastructure
It infrastructureraptrovic
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentationhassaanashraf1
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptxEvadeDube
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devicesAmril Huda
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptTestUser621581
 

Semelhante a Fundamentals of Networking (20)

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
3.pptx
3.pptx3.pptx
3.pptx
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentation
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
DCCN Unit 1.pdf
DCCN Unit 1.pdfDCCN Unit 1.pdf
DCCN Unit 1.pdf
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devices
 
basic networking
basic networkingbasic networking
basic networking
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer project
Computer project Computer project
Computer project
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Fundamentals of Networking

  • 1. Network Fundamentals: Introduction to Network Structure and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
  • 2.
  • 3. Basic Concepts in Communication
  • 4.
  • 5.
  • 6.
  • 7. Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
  • 9. Big Picture What do you see here for a typical network?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Categories of Twisted Pairs Cabling System Specs describe cable Material, type of Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57.
  • 58.
  • 59.
  • 60. ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and  receiving data on a carrier Two party communication: Ethernet  Routing and Forwarding Address: IP  End-to-end control & error checking (ensure complete data transfer): TCP  Establish/manage connection  ASCII Text, Sound (syntax layer)  File Transfer, Email, Remote Login 
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol. SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

Notas do Editor

  1. This is intended to be a very general overview of the concepts in computer networking and communication.
  2. Potential topics: TCP/IP and the Internet TCP and UDP Gateway and Routing Protocols Telnet and FTP TCP/IP Configuration TCP/IP and Networks Domain Name Service Network File System
  3. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  4. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  5. Network - A group of computers connected together in a way that allows information to be exchanged between the computers. Node - Anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower. Segment - Any portion of a network that is separated, by a switch, bridge or router, from other parts of the network. Backbone - The main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a second), while the backbone may operate at 100 Mbps. Topology - The way that each node is physically connected to the network.
  6. Backbone example: E.g. each segment may have a transfer rate of 10Mbps (megabits per second or 1 million bits a second) while the backbone may operate at 100Mbps
  7. Similar to a bus network, rings have nodes daisy chained, but the end of the network in a ring topology comes back around to the first node, creating a complete circuit. Each node takes a turn sending and receiving information through the use of a token. The token along with any data is sent from the first node to the second node which extracts the data addressed to it and adds any data it wishes to send. Then second node passes the token and data to the third node, etc. until ti comes back around to the first node again. Only the node with the token is allowed to send data . All other nodes must wait for the token to come to them.
  8. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  9. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  10. Baud – don’t use; a single state change can involve more than a single bit of data
  11.  we will talk about network cables next
  12. CAT 5 is currently under consideration to be incorporated into the Gigabit Ethernet specification for short distance wiring. While longer connections using Gigabit Ethernet use optical fiber, the goal is to leverage the CAT 5 twisted-pair wiring most organizations already have in place for connections out to the desktop.
  13. Use of optical fibers over ; Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber. Transmission on optical fiber wire requires repeater at distance intervals. The glass fiber requires more protection within an outer cable than copper. For these reasons and because the installation of any new wiring is labor-intensive, few communities yet have optical fiber wires or cables from the phone company's branch office to local customers (known as local loop). single mode fiber fiber is used for longer distances; multimode fiber fiber is used for shorter distances.
  14. Multimode has a larger core than single mode optical fiber
  15. Starband.com DirectDuo DirectPC
  16. In wireless LAN (WLAN) technology, 802.11 refers to a family of specifications developed by a working group of the Institute of Electrical and Electronics Engineers ( IEEE ). There are three specifications in the family: 802.11, 802.11a, and 802.11b. All three of the above mentioned specifications use CSMA/CD carrier sense multiple access with collision detection ( CSMA/CD )as the path sharing protocol. If a source station has a data packet to send, the station checks the system to see if the path medium is busy. If the medium is not busy, the packet is sent; if the medium is busy, the station waits until the first moment that the medium becomes clear. Testing is done repeatedly by the source via a short test message called RTS (ready to send). The data packet is not transmitted until the destination station returns a confirmation message called CTS (clear to send). If two stations send at exactly the same time, CSMA/CD prevents the loss of data that might otherwise occur and provides a system for retrying. The 802.11 and 802.11b specifications apply to wireless Ethernet LANs, and operate at frequencies in the 2.4-GHz region of the radio spectrum. Data speeds are generally 1 Mbps or 2 Mbps for 802.11, and 5.5 Mbps or 11 Mbps for 802.11b, although speeds up to about 20 Mbps are realizable with 802.11b. The 802.11b standard is backward compatible with 802.11. The modulation used in 802.11 has historically been phase-shift keying ( PSK ). The modulation method selected for 802.11b is known as CCK (complementary code keying), which allows higher data speeds and is less susceptible to multipath-propagation interference. The 802.11a specification applies to wireless ATM systems and operates at radio frequencies between 5 GHz and 6 GHz. A modulation scheme known as OFDM (orthogonal frequency-division multiplexing) makes possible data speeds as high as 54 Mbps, but most commonly, communications takes place at 6 Mbps, 12 Mbps, or 24 Mbps.
  17. Nowadays you see hubs with switches; but basically the hub is the place where data comes together while the switch determines how and where data is forwarded from the place where data comes together.
  18. bridge In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs). In bridging networks, computer or node addresses have no specific relationship to location. For this reason, messages are sent out to every address on the network and accepted only by the intended destination node. Bridges learn which addresses are on which network and develop a learning table so that subsequent messages can be forwarded to the right network. Bridging networks are generally always interconnected local area networks since broadcasting every message to all possible destinations would flood a larger network with unnecessary traffic. For this reason, router networks such as the Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in one general direction rather than forwarded in all directions. A bridge works at the data-link (physical network) level of a network, copying a data frame from one network to the next network along the communications path. A bridge is sometimes combined with a router in a product called a brouter.
  19. The range for WAN transmission will vary: 56 Kb/s to 1.544 Mb/s
  20. Communication path established between two
  21. What is the third generation speed for ISDN?
  22. http://www.informit.com/newsletter.asp?link=320 The 802.3 standards put down in writing what happens at the very basest level of network communication: that which actually travels through the wires and hardware.
  23. Structure of protocols architecture: file transfer module contains all logic for file transfer applications (transmitting passwords, file commands, and file records). Need is to transmit the files and commands reliably. Some sorts of reliability are relevant to a variety of applications (e.g. e-mail, document transfer) Met by separate communication service modules that can be used by a variety of applications. Communication service modules assumes two computer systems are active and ready for data transfer, and keeps track of data being exchanged to assure delivery. A structured set of modules are used that implements the communication functions.
  24. It is use to guide product implementors so that their products will consistently work with other products.
  25. OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lowest three layers (Up to network layer) are used when any message passes through the host computer. Message intended for this computer pass to the upper layers. Message destined for some other host are not passed up to the upper layers but are forwarded to another host. Physical layer: Bit stream through network at electrical/mechanical level
  26. There are several higher layer application protocols that use TCP/IP to get to the internet. They include World Wide Web’s Hypertext Transfer Protocol; File Transfer Protocol (FTP); Telnet (Telnet) [ allow you to logion to remote computers], Simple Mail Transfer Protocol (SMTP) These and other protocols are often packaged together as a suite. TCP keep track of the individual packets that a message is divided into for efficient routing through the internet