SlideShare uma empresa Scribd logo
1 de 30
Networking Concepts
LAN
• Concepts
  – Attenuation, Noise
• Hardware
  –   Repeater, Amplifier
  –   Bridge, Router, Gateway, Switch, Hub
  –   Twisted pair, Coaxial cable, Fiber optics
  –   Server, Workstation
  –   Wireless access point
• Topology
  – Bus, Tree, Star, Ring
LAN
• Standard
  –   OSI (Open Systems Interconnection)
  –   IEEE (Institute of Electrical and Electronic Engineers)
  –   ITU-T (Int’l Telephone Union – Telecom. Sector)
  –   ISO (International Standards Organization)
  –   EIA (Electronic Industries Association)
  –   ETS (European Telecom. Standard)
Communications Hardware
• Repeater
  – Extends distance limitation on networks (both voice
    and data)
  – Filters noise
  – Regenerates signals
  – For twisted pair wire, repeaters are placed every 100
    meters
• Amplifier
  – Extends distance limitation on networks (both voice
    and data)
  – Amplifies both signal and noise
Communications Hardware
• Bridge
  – Connects two LANs using same protocol
  – Single path between LANs
  – Minimal sophistication
• Router
  – Connects multiple LANs using same protocol
  – Choice of paths between LANs
  – Mainstay of internetworking
Communications Hardware
• Gateway
  – Connects multiple LANs using any protocol
  – Very sophisticated
  – Supports today’s internet by providing access
    points to several networks
• Hub
  – Connects nodes to a network
  – Sometimes acts as repeater
Communications Hardware
• Switch
  – Connects multiple LAN segments using the
    same protocol
  – Connections may use twisted pair, coaxial
    cable, or fiber optics wiring
  – Faster than bridges
  – Enables simultaneous communication between
    multiple network segments
Ethernet
• Ethernet was developed jointly by Xerox, Intel,
  and DEC in 1980
• DEC (Digital Equipment Corporation) a computer
  company that specialized in mini-computers in the
  1970s. It was acquired by Compaq and Compaq
  merged with HP.
• This was the first commercial LAN system
• Ethernet is a simple protocol to implement
• Ethernet addresses the layers 1 and 2 functionality
  for the OSI model
• Ethernet standard is very close to IEEE 802.3
  standard, but has some minor differences
Ethernet
• Ethernet uses bus topology (which we will discuss
  next)
• Ethernet transmits a baseband signal at 10 Mbps
• Baseband signals are digital and bidirectional
• Ethernet allows the user data to have a variable
  length up to 1500 bytes
• Unlike HDLC and SDLC protocols, ethernet uses
  a length field in the header to identify the length
  of the user data in bytes. Because of this, no
  special bit pattern is needed to recognize the start
  and end of the user data.
Ethernet frame format
 6-bytes       6-bytes    2-bytes   Variable length   4-bytes




Destination     Source    length       User data      CRC-32
 address        address
Ethernet diagram
PC1         PC3
                      Segment 1



      PC2


                         Repeater




                                                     PC-B   PC-C
                                  Segment 2



                                              PC-A
Bus topology
• It is a contention-based topology, which means that each
  node on the network must contend for access
• Each node listens to traffic on the network
• When a node has packets to transfer and the bus is not
  busy, then the packets are put on the bus in both directions,
  with the destination address marked on the packets
• All nodes listen to traffic on the network and the node that
  has packets addressed to it, receives the packets
• No routing or switching is involved in data transfer
Bus topology diagram


   PC1   PC2   PC3   PC4




                           Tap for a new node
Tree topology
• Tree topology is a variation on bus topology
• A special node is designated as root
• The primary reason for this topology is to
  segment nodes so that not all nodes need to
  listen to packets broadcast on a segment
• This adds a layer of security in the form of
  unwanted nodes not listening to the network
  traffic
• Speeds up data transfer since there will be
  fewer nodes on each segment
Tree topology diagram

                      Root



                                     PC 7




                                      PC 6
PC 1    PC 2
               PC 3

                       PC 4
                              PC 5
Star topology
•   This is another variation on bus topology
•   This has a central hub, a passive device
•   Star is a logical bus and a physical ring
•   Hub has ports in multiples of 8. Multiple hubs can be
    connected in a daisy chain format
•   Easy to add nodes to the network and remove nodes from
    the network
•   Central node does switching between nodes
•   Multiple nodes can communicate simultaneously without
    collision
•   Potential problem is the single point of failure for the
    network when the central node fails
Star topology diagram

          PC 3
   PC 2          PC 4

PC 1      Hub      PC 5


  PC 8           PC 6
          PC 7
Ring topology
• The nodes are connected in a ring pattern
• Unlike bus topology, each node on the ring acts as a
  repeater on the network
• Nodes access the network using a token, which eliminates
  the need for contention as in bus topology
• Token is a series of bits that identifies the node that has the
  right to transmit at any given time
• Example of a token: Assume that there are 6 nodes on the
  network. The nodes are labeled 1 through 6 and the token
  would consist of 3 bits. The token 100 will indicate that
  node 4 has the token.
• Tokens circulate in a single direction from a node to its
  neighbor
Ring topology diagram
         PC 4


                 PC 3
  PC 5




  PC 6
                 PC 2


          PC 1
OSI 7-layer model
 Source              Destination
Application          Application
Presentation         Presentation
  Session              Session
 Transport            Transport
 Network               Network
 Data link            Data link
 Physical              Physical
IEEE 802
• 802.1     General LAN management of OSI
            layers 3 through 7
•   802.2   LLC sublayer
•   802.3   Ethernet
•   802.4   Token bus
•   802.5   Token ring
•   802.6   MAN
•   802.7   Broadband, in general
IEEE 802
•   802.10   Network Security
•   802.11   Wireless LAN
•   802.12   100VG-AnyLAN (Voice Grade)
•   802.13   unused
•   802.14   Cable Modem
WAN
• Concepts
  – Gateway, Frame Relay, ATM, DSL, T1, T3,
    STS (Synchronous Transport Signal)
• Standard
  – TCP/IP (Transmission Control Protocol
    /Internet Protocol)
  – IETF (Internet Engineering Task Force)
  – ATM Forum (Asynchronous Transfer Mode)
STS, STM, OC equivalencies
 STS level    STM level    OC level    Data Rate
STS-1        --           OC-1        52 Mbps
STS-3        STM-1        OC-3        155 Mbps
STS-9        STM-3        OC-9        467 Mbps
STS-12       STM-4        OC-12       622 Mbps
STS-18       STM-6        OC-18       933 Mbps
STS-24       STM-8        OC-24       1.2 Gbps
STS-36       STM-12       OC-36       1.9 Gbps
STS-48       STM-16       OC-48       2.5 Gbps
ATM VPI and VCI
                         VP I 1                  VP I5
  VC I 1                                                    VC I 1
  VC I 2                                                    VC I 2

                                                          VCI 4
                                                 VP I6
                                                            VCI 7
   V C I 2            V P I 2
   V C I 6




                                                                     V C I 2
                                                                     V C I 6

             VP I 3                              VP I 3

VCI 4

VCI 7



                                  V P Sw itc h
TCP/IP functions
• Establish a connection between nodes
• Manage data flow on the network
• Handle transmission errors
• Terminate connection at the end
• TCP is a connection-oriented protocol, meaning that a
  packet sent to the next node is monitored for proper receipt
• IP is a connection-less protocol, meaning that a packet sent
  to the next node is not monitored for proper delivery
• Since TCP and IP work together, the packet delivery is
  reliable
• Connection-less mode is known as User Datagram
  Protocol (UDP)
TCP/IP 5-layer model
• TCP/IP protocol is divided into 5 layers
  –   Application layer
  –   Transport layer
  –   Network layer
  –   Data link layer
  –   Physical layer
IP Addressing
• IP address consists of 4 octets: n.n.n.n
  where n is in the range 0 to 255
• This form of IP address is known as IPv4,
  denoting IP address Version 4
• A new form of IP address known as IPv6,
  denoting IP address Version 6, has been
  proposed. It uses 128-bit addressing instead
  of 32-bit addressing.
IP Address Hierarchy
• There are 3 main classes of IP addresses in use
  and two additional classes of IP addresses
  available for multicast and testing
• Class A First octet range: 1 – 126
   – IBM, AT&T, HP, Merck, Stanford University
• Class B     First octet range: 128 – 191
   – U of L and most other universities
• Class C     First octet range: 192 – 223
   – IGLOU, Louisville’s first ISP
UDP
•   User Datagram Protocol is a ‘best effort’ protocol
•   ‘best effort’ means no guarantee of delivery
•   This is a connection-less protocol
•   UDP does not provide reliability
•   UDP sends out packets without first establishing a
    connection
•   RFC 768 describes UDP
•   UDP header consists of source port, destination port,
    length, checksum
•   Example of UDP: TFTP (Trivial File Transfer Protocol).
    TFTP is used when bootsrapping diskless system
•   TFTP is on UDP port 69

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Mpls
MplsMpls
Mpls
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Mpls technology
Mpls technologyMpls technology
Mpls technology
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Mpls
MplsMpls
Mpls
 
Part 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGPPart 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGP
 
MPLS
MPLSMPLS
MPLS
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Mpls te
Mpls teMpls te
Mpls te
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
Network layer
Network layerNetwork layer
Network layer
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 

Semelhante a Networking concepts

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4mlrbrown
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Network Protocol
Network ProtocolNetwork Protocol
Network ProtocolKetan Nayak
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...Adam Dunkels
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mrwael-b1
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnectKinza Razzaq
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22Techvilla
 

Semelhante a Networking concepts (20)

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
Ppt seminar noc
Ppt seminar nocPpt seminar noc
Ppt seminar noc
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 

Mais de Yogesh Thawait

Mais de Yogesh Thawait (13)

C.f
C.fC.f
C.f
 
Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstruction
 
Sebi
SebiSebi
Sebi
 
It act
It actIt act
It act
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property law
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers right
 
Idra,1951
Idra,1951Idra,1951
Idra,1951
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)
 
Consumer
ConsumerConsumer
Consumer
 
Competition act,2002
Competition act,2002Competition act,2002
Competition act,2002
 
Securties contract act
Securties contract actSecurties contract act
Securties contract act
 
Mis 3
Mis 3Mis 3
Mis 3
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtel
 

Último

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 

Networking concepts

  • 2. LAN • Concepts – Attenuation, Noise • Hardware – Repeater, Amplifier – Bridge, Router, Gateway, Switch, Hub – Twisted pair, Coaxial cable, Fiber optics – Server, Workstation – Wireless access point • Topology – Bus, Tree, Star, Ring
  • 3. LAN • Standard – OSI (Open Systems Interconnection) – IEEE (Institute of Electrical and Electronic Engineers) – ITU-T (Int’l Telephone Union – Telecom. Sector) – ISO (International Standards Organization) – EIA (Electronic Industries Association) – ETS (European Telecom. Standard)
  • 4. Communications Hardware • Repeater – Extends distance limitation on networks (both voice and data) – Filters noise – Regenerates signals – For twisted pair wire, repeaters are placed every 100 meters • Amplifier – Extends distance limitation on networks (both voice and data) – Amplifies both signal and noise
  • 5. Communications Hardware • Bridge – Connects two LANs using same protocol – Single path between LANs – Minimal sophistication • Router – Connects multiple LANs using same protocol – Choice of paths between LANs – Mainstay of internetworking
  • 6. Communications Hardware • Gateway – Connects multiple LANs using any protocol – Very sophisticated – Supports today’s internet by providing access points to several networks • Hub – Connects nodes to a network – Sometimes acts as repeater
  • 7. Communications Hardware • Switch – Connects multiple LAN segments using the same protocol – Connections may use twisted pair, coaxial cable, or fiber optics wiring – Faster than bridges – Enables simultaneous communication between multiple network segments
  • 8. Ethernet • Ethernet was developed jointly by Xerox, Intel, and DEC in 1980 • DEC (Digital Equipment Corporation) a computer company that specialized in mini-computers in the 1970s. It was acquired by Compaq and Compaq merged with HP. • This was the first commercial LAN system • Ethernet is a simple protocol to implement • Ethernet addresses the layers 1 and 2 functionality for the OSI model • Ethernet standard is very close to IEEE 802.3 standard, but has some minor differences
  • 9. Ethernet • Ethernet uses bus topology (which we will discuss next) • Ethernet transmits a baseband signal at 10 Mbps • Baseband signals are digital and bidirectional • Ethernet allows the user data to have a variable length up to 1500 bytes • Unlike HDLC and SDLC protocols, ethernet uses a length field in the header to identify the length of the user data in bytes. Because of this, no special bit pattern is needed to recognize the start and end of the user data.
  • 10. Ethernet frame format 6-bytes 6-bytes 2-bytes Variable length 4-bytes Destination Source length User data CRC-32 address address
  • 11. Ethernet diagram PC1 PC3 Segment 1 PC2 Repeater PC-B PC-C Segment 2 PC-A
  • 12. Bus topology • It is a contention-based topology, which means that each node on the network must contend for access • Each node listens to traffic on the network • When a node has packets to transfer and the bus is not busy, then the packets are put on the bus in both directions, with the destination address marked on the packets • All nodes listen to traffic on the network and the node that has packets addressed to it, receives the packets • No routing or switching is involved in data transfer
  • 13. Bus topology diagram PC1 PC2 PC3 PC4 Tap for a new node
  • 14. Tree topology • Tree topology is a variation on bus topology • A special node is designated as root • The primary reason for this topology is to segment nodes so that not all nodes need to listen to packets broadcast on a segment • This adds a layer of security in the form of unwanted nodes not listening to the network traffic • Speeds up data transfer since there will be fewer nodes on each segment
  • 15. Tree topology diagram Root PC 7 PC 6 PC 1 PC 2 PC 3 PC 4 PC 5
  • 16. Star topology • This is another variation on bus topology • This has a central hub, a passive device • Star is a logical bus and a physical ring • Hub has ports in multiples of 8. Multiple hubs can be connected in a daisy chain format • Easy to add nodes to the network and remove nodes from the network • Central node does switching between nodes • Multiple nodes can communicate simultaneously without collision • Potential problem is the single point of failure for the network when the central node fails
  • 17. Star topology diagram PC 3 PC 2 PC 4 PC 1 Hub PC 5 PC 8 PC 6 PC 7
  • 18. Ring topology • The nodes are connected in a ring pattern • Unlike bus topology, each node on the ring acts as a repeater on the network • Nodes access the network using a token, which eliminates the need for contention as in bus topology • Token is a series of bits that identifies the node that has the right to transmit at any given time • Example of a token: Assume that there are 6 nodes on the network. The nodes are labeled 1 through 6 and the token would consist of 3 bits. The token 100 will indicate that node 4 has the token. • Tokens circulate in a single direction from a node to its neighbor
  • 19. Ring topology diagram PC 4 PC 3 PC 5 PC 6 PC 2 PC 1
  • 20. OSI 7-layer model Source Destination Application Application Presentation Presentation Session Session Transport Transport Network Network Data link Data link Physical Physical
  • 21. IEEE 802 • 802.1 General LAN management of OSI layers 3 through 7 • 802.2 LLC sublayer • 802.3 Ethernet • 802.4 Token bus • 802.5 Token ring • 802.6 MAN • 802.7 Broadband, in general
  • 22. IEEE 802 • 802.10 Network Security • 802.11 Wireless LAN • 802.12 100VG-AnyLAN (Voice Grade) • 802.13 unused • 802.14 Cable Modem
  • 23. WAN • Concepts – Gateway, Frame Relay, ATM, DSL, T1, T3, STS (Synchronous Transport Signal) • Standard – TCP/IP (Transmission Control Protocol /Internet Protocol) – IETF (Internet Engineering Task Force) – ATM Forum (Asynchronous Transfer Mode)
  • 24. STS, STM, OC equivalencies STS level STM level OC level Data Rate STS-1 -- OC-1 52 Mbps STS-3 STM-1 OC-3 155 Mbps STS-9 STM-3 OC-9 467 Mbps STS-12 STM-4 OC-12 622 Mbps STS-18 STM-6 OC-18 933 Mbps STS-24 STM-8 OC-24 1.2 Gbps STS-36 STM-12 OC-36 1.9 Gbps STS-48 STM-16 OC-48 2.5 Gbps
  • 25. ATM VPI and VCI VP I 1 VP I5 VC I 1 VC I 1 VC I 2 VC I 2 VCI 4 VP I6 VCI 7 V C I 2 V P I 2 V C I 6 V C I 2 V C I 6 VP I 3 VP I 3 VCI 4 VCI 7 V P Sw itc h
  • 26. TCP/IP functions • Establish a connection between nodes • Manage data flow on the network • Handle transmission errors • Terminate connection at the end • TCP is a connection-oriented protocol, meaning that a packet sent to the next node is monitored for proper receipt • IP is a connection-less protocol, meaning that a packet sent to the next node is not monitored for proper delivery • Since TCP and IP work together, the packet delivery is reliable • Connection-less mode is known as User Datagram Protocol (UDP)
  • 27. TCP/IP 5-layer model • TCP/IP protocol is divided into 5 layers – Application layer – Transport layer – Network layer – Data link layer – Physical layer
  • 28. IP Addressing • IP address consists of 4 octets: n.n.n.n where n is in the range 0 to 255 • This form of IP address is known as IPv4, denoting IP address Version 4 • A new form of IP address known as IPv6, denoting IP address Version 6, has been proposed. It uses 128-bit addressing instead of 32-bit addressing.
  • 29. IP Address Hierarchy • There are 3 main classes of IP addresses in use and two additional classes of IP addresses available for multicast and testing • Class A First octet range: 1 – 126 – IBM, AT&T, HP, Merck, Stanford University • Class B First octet range: 128 – 191 – U of L and most other universities • Class C First octet range: 192 – 223 – IGLOU, Louisville’s first ISP
  • 30. UDP • User Datagram Protocol is a ‘best effort’ protocol • ‘best effort’ means no guarantee of delivery • This is a connection-less protocol • UDP does not provide reliability • UDP sends out packets without first establishing a connection • RFC 768 describes UDP • UDP header consists of source port, destination port, length, checksum • Example of UDP: TFTP (Trivial File Transfer Protocol). TFTP is used when bootsrapping diskless system • TFTP is on UDP port 69