SlideShare uma empresa Scribd logo
1 de 26
Twitter: @eminka_da
Computer Networking
Deborah E. Akuoko | Devops Engineer - Cloud Engineering
Twitter: @eminka_da
Objectives
❏ Give high level and relatable ideas of
computer networking concepts
❏ Prepare for self learning weeks 3 - 6 of google
technical support certification
❏ Prepare for self learning advanced
networking in future
Outline
❏ Recap
❏ Introduction to Network Services (Week 03)
❏ Introduction to Connecting to the Internet
(Week 04)
❏ Introduction to Troubleshooting and the
Future of Networking (Week 05)
Twitter: @eminka_da
Please Physical
Do Data Link
Not Network
Throw Transport
Sliced Session
Pizza Presentation
Away Application
Network Layers(OSI)
Recap
Twitter: @eminka_da
Network Services
○ Domain Name Service(DNS)
■ Overview
■ Why DNS uses UDP ?
■ What is my IP?
Twitter: @eminka_da
Network Services - Domain Name Service(DNS)
Twitter: @eminka_da
Network Services
○ Dynamic Host Config Protocol (DHCP)
■ Overview
■ Static vs dhcp → pros n cons
■ Analogy
Twitter: @eminka_da
Network Services
○ Network Address Translation (NAT)
■ Overview
■ NAT vs PAT
■ Non routable address space and ipv4
limitations
RFC1918: ‘We will refer to the
hosts in the first and second
categories as
"private". We will refer to the
hosts in the third category as
"public".’
Twitter: @eminka_da
Network Services - Network Address Translation (NAT)
Twitter: @eminka_da
Network Services
○ Virtual Private Networks (VPNs)
■ Overview
○ Proxy
Twitter: @eminka_da
Connecting to the Internet
○ Dial up
■ Overview
■ POTs
■ Dial up modems
■ Point to point protocol (PPP)
PO
T
Dial up modem
Twitter: @eminka_da
Connecting to the Internet
○ Broadband
■ Overview
■ Broadband technologies
(DSL, Cable, Fiber and
Satellite, also T-carriers)
Twitter: @eminka_da
Connecting to the Internet
○ T-Carrier technologies: T-Carrier: [L1]
■ T-1: 24 channels and 1.544 Mbps
■ T-2: 96 channels and 6.312 Mbps
■ T-3: 432 channels and 44.736 Mbps
■ T-4: 4032 channels and 274.176
Mbps
Twitter: @eminka_da
Connecting to the Internet
○ Wide Area Networks (WANs)
■ Overview
■ WAN technologies
■ WAN protocols
● Point-to-point topology
● Hub-and-spoke topology
● Full mesh topology
● Dual-homed topology
Twitter: @eminka_da
Connecting to the Internet
○ Wireless Networks
■ Overview
■ Wireless technologies
■ Wireless protocols
■ Wireless channels & security
■ What OSI layer is the network
adapter?
Twitter: @eminka_da
Connecting to the Internet
● 900 MHz (802.11ah)
● 2.4 GHz (802.11b/g/n/ax)
● 3.65 GHz (802.11y)
● 5.0 GHz (802.11j) WLAN
● 5 GHz or 5.8 GHz
(802.11a/h/j/n/ac/ax)
Twitter: @eminka_da
Connecting to the Internet
○ Cellular Networking
■ Mobile device networks
Twitter: @eminka_da
Troubleshooting & Future
○ Verification of network connectivity
■ How the OSI/TCP-IP layes
help ?
■ ICMP
■ Ping & Traceroute
■ What layer is ICMP ?
Twitter: @eminka_da
Troubleshooting & Future
○ DNS deep dive
■ Name resolution tools
■ Public DNS servers
■ Google DNS and nslookup
handson :)
■ DNS registration and expiration
Twitter: @eminka_da
Troubleshooting & Future
○ DNS deep dive
■ Hosts files
Twitter: @eminka_da
Troubleshooting & Future
○ Cloud
■ Virtualisation & hypervisors
■ private , public and hybrid
■ Cloud services(IAAC, PAAS, SAAS)
■ Cloud storage (E.g from Google: Multiregional,
Regional, Nearline and Coldline)
Twitter: @eminka_da
Troubleshooting & Future
Twitter: @eminka_da
Troubleshooting & Future
○ Ipv6
■ Addressing
■ Ipv6 headers
■ Ipv6 vs ipv4
Twitter: @eminka_da
Troubleshooting & Future
Twitter: @eminka_da
Word Definitions
Bit On or off signal (8 bits == Byte)
Symmetrical
Transmission
Equal download/upload speeds
Node Device on the network. Could be computer, switch.
Gateway Network entry point
Packet Formatted unit of data with header and user data
header Control information identifying packet, e.g source, destination.
Non routable ip Private IP space (A, B, C )
Twitter: @eminka_da
Word Definitions
ISP Internet Service Provider
ADSL Asymmetrical DSL (higher download than upload)
DSL Digital subscriber line
Analog Continuous signal
Cloud Cloud computing platform
hop Network count
L OSI /TCP-IP Layers (1-7)
Twitter: @eminka_da
References/Resources
○ IPv4 address space depletion
○ Network Address Translation
○ DHCP
○ Why does DNS use UDP ?
○ OSI Networking Game :)
○ Request for comments (RFC)
○ RFC archives
○ IANA
○ RIR
○ OSI Model

Mais conteúdo relacionado

Semelhante a Computer Networking Concepts for Technical Support Certification

The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the NetworkTom Paseka
 
Keeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your CustomersKeeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your CustomersCloudflare
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with MikrotikGLC Networks
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksSam Bowne
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-DiveGLC Networks
 
Network address translation
Network address translationNetwork address translation
Network address translationMohak Kaushik
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfADARSHN40
 
Up and Running DNS Service
Up and Running DNS ServiceUp and Running DNS Service
Up and Running DNS ServiceGLC Networks
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightAndy Gelme
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5jemtallon
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science HungWei Chiu
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingDigicomp Academy AG
 
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesAPNIC
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security GLC Networks
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101Rohan Reddy
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For CybersecurityMohammed Adam
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksAtif Shahzad
 
Building Indoor Wireless Network
Building Indoor Wireless NetworkBuilding Indoor Wireless Network
Building Indoor Wireless NetworkGLC Networks
 

Semelhante a Computer Networking Concepts for Technical Support Certification (20)

The New Edge of the Network
The New Edge of the NetworkThe New Edge of the Network
The New Edge of the Network
 
Keeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your CustomersKeeping the Internet Fast and Resilient for You and Your Customers
Keeping the Internet Fast and Resilient for You and Your Customers
 
IPv6 with Mikrotik
IPv6 with MikrotikIPv6 with Mikrotik
IPv6 with Mikrotik
 
Ch 11: Hacking Wireless Networks
Ch 11: Hacking Wireless NetworksCh 11: Hacking Wireless Networks
Ch 11: Hacking Wireless Networks
 
Internet Protocol Deep-Dive
Internet Protocol Deep-DiveInternet Protocol Deep-Dive
Internet Protocol Deep-Dive
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
CN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdfCN 5151(15) Module II part 2 13082020.pdf
CN 5151(15) Module II part 2 13082020.pdf
 
Up and Running DNS Service
Up and Running DNS ServiceUp and Running DNS Service
Up and Running DNS Service
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
Internet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! nightInternet Of Things: Hands on: YOW! night
Internet Of Things: Hands on: YOW! night
 
CISSP Week 5
CISSP Week 5CISSP Week 5
CISSP Week 5
 
How Networking works with Data Science
How Networking works with Data Science How Networking works with Data Science
How Networking works with Data Science
 
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only BuildingSwiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
Swiss IPv6 Council: The Cisco-Journey to an IPv6-only Building
 
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenchesInternet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
Internet Week 2018: 1.1.1.0/24 A report from the (anycast) trenches
 
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
Troubleshooting Layer 2 Ethernet Problem: Loop, Broadcast, Security
 
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
21092018-C4E-What's Next for the Net? Security, Reliability, Capability, Perf...
 
CCNA training 101
CCNA training 101CCNA training 101
CCNA training 101
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
Lecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networksLecture12 ie321 dr_atifshahzad - networks
Lecture12 ie321 dr_atifshahzad - networks
 
Building Indoor Wireless Network
Building Indoor Wireless NetworkBuilding Indoor Wireless Network
Building Indoor Wireless Network
 

Último

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Último (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Computer Networking Concepts for Technical Support Certification

Notas do Editor

  1. QnA from previous ??
  2. What: L7 network service that helps us resolve friendly domain names to ip addresses Why: although domain names are easy for people to remember, computers or machines, access websites based on IP addresses How: 3 way handshake (L7) to query → Uses either UDP or TCP (L4) via a 4 way handshake to serve requested resource Use cases, QnAnA
  3. What: L7 network service that helps us resolve friendly domain names to ip addresses Why: although domain names are easy for people to remember, computers or machines, access websites based on IP addresses How: 3 way handshake (L7) to query → Uses either UDP or TCP (L4) via a 4 way handshake to serve requested resource Use cases, QnAnA
  4. What: L7 network service that ensures automatic assignment of ip addresses on network Why: ip scalability if ip needs grow, less error prone, unlikely conflict in ip assignment, better ip assigning management. How: It accepts UDP requests for IP address from un-configured hosts. Then, returns the IP address for that host. Static may be prefered in VPN applications Use cases, QnAnA
  5. What: L3 network service that translates private ips to public ips for routing to and from a private network Why: Secure:keeps internal addressing from the external network, help conserve ip space by mappin multiple private ip set to one public ip How: Modifies IP header of packet to reflect appropriate public or private ip Non routable address space: Class A, B and C ( D==multicast, E==Experimental purpose) Use cases, QnAnA
  6. What: L3 network service that translates private ips to public ips for routing and vice versa Why: Secure:keeps internal addressing from the external network, help conserve ip space by mappin multiple private ip set to one public ip How: Modifies IP header of packet to reflect appropriate public or private ip Non routable address space: Class A, B and C ( D==multicast, E==Experimental purpose) Use cases, QnAnA
  7. What: (L3 / L2 ) network service for safe and encrypted connection over a less secure network e.g. internet. Extends private network via public network Why: safety, privacy, How: KPMG wfh scenario Proxies: Anonymous web browsing and managing content access control. It masks your IP location but doesn’t encrypt your data, (KPMG scenario) Use cases, QnAnA
  8. What: internet service that connect via phone line. Phone couldn’t be used for both calls and internet connectivity at same time(Baseband) Why: We had to get on the internet by some means :) and this was the best way then How: Dial into your ISP (Internet Service Provider) using a phone number via an external (or later internal) dial-up modem((L1 device) POTs: voice-grade telephone service. Uses analog signal transmission Point to point protocol (PPP):enable dial up connections / facilitates the transmission of data packets between point to point links. Use cases, QnAnA
  9. What: internet service uses multiple channel and able to split signal traffic among different channels for both calls and internet connectivity Why: it's a lot better than traditional dial up connection, faster and more options for delivery. Find protocols How: Broadband technologies(order of popularity): DSL, Cable modem, Fiber, t-carriers, and Satellite . Find order of speed
  10. What: internet service Dedicated multi channel phone call and data (point-to-point private networks). Unlike standard telephone lines which transfer data and voice at about 30,000 bits per second (30 kbps) using a dial-up modem Why: dedicated and faster connection How: multi channels (maths)
  11. What: geographically distributed network that interconnects multiple local area networks (LANs). E.g network of ATMs, internet, #askmore Why: expand networks accross diverse locations, How: Facilitated by WAN technologies and protocols WAN technologies usually at layers 1,2&3
  12. What: Network on which data transmission is via a wireless medium Why: Convenience/mobility, easy deployment, might cost less How: LAN==Wi-Fi, Community==WiMax, Satellite,MAN==Point-to-Point links, PAN==Bluetooth,Zigbee, infrared, etc.. Devices: Repeater(L1), Wireless router(L3),
  13. What: Network on which data transmission is via a wireless medium Why: Convenience/mobility, easy deployment, might cost less How: LAN==Wi-Fi, Community==WiMax, Satellite,MAN==Point-to-Point links, PAN==Bluetooth,Zigbee, infrared, etc.. Ref Devices: Repeater(L1), Wireless router(L3),
  14. What: A cellular network or mobile network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver, known as a cell site or base station. Why: seamless roaming capabilities for supporting cellular devices. How:
  15. Handson with students (Ping & Traceroute) The Internet Control Message Protocol (ICMP) is a supporting protocol in the Internet protocol suite. It is used by network devices, including routers, to send error messages and operational information indicating success or failure when communicating with another IP address
  16. Hostsfiles: Maps custom hostnames to ip addresses. Testing domains locally before going live Tools: NSlookup: resolves domain names to ip
  17. Hostsfiles: Maps custom hostnames to ip addresses. Testing domains locally before going live Tools: NSlookup: resolves domain names to ip
  18. Virtualization: single host could run many virtual instances called guests. Hypervisor: runs and manages virtual machines while also offering these guests a virtual operating platform that's indistinguishable from actual hardware. Cloud leverages on this to create a system that allows massive resource sharing
  19. Virtualization: single host could run many virtual instances called guests. Hypervisor: runs and manages virtual machines while also offering these guests a virtual operating platform that's indistinguishable from actual hardware. Cloud leverages on this to create a system that allows massive resource sharing
  20. What: emerged to resolved the depleting addresses of ipv4. Uses alphanumeric to represent ip addresses rather than numbers as in ipv4. (Hexadecimals). 128 bit ip address & 16 octets
  21. What: emerged to resolved the depleting addresses of ipv4. Ipv6 vs ipv4 harmony: how do we safely and seamlessly transition or even merge these two ? Read more about ipv6 tunneling