Why Use a Computer Network?

Slides:



Advertisements
Similar presentations
LAN Devices 5.3 IT Essentials.
Advertisements

Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
Lab Practical 2 Study about different types of Networking Device
IST 201 Chapter 5. LAN Technologies Ethernet – most widely used technology in LANS In 1970, developed and implemented by: Digital Intel Xerox IEEE
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Communicating over the Network Network Fundamentals – Chapter 2.
LOCAL AREA NETWORK Presented by : Tan Teng MengWET Chan Choi Ngor WET Philip Lim Loong HinWET
CCNA 1 v3.1 Module 5 Review.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Internetworking Devices that connect networks are called Internetworking devices. A segment is a network which does not contain Internetworking devices.
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
Chapter 3 Physical Components of a Network
Connecting LANs, (network devices) Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
TC 361 Data Networking Test Review
Chapter 4: Managing LAN Traffic
Semester 1 Module 5 Cabling LANs and WANs. Ethernet Standards.
Chapter 5 Networks Communicating and Sharing Resources
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Chapter 9A Network Basics.
ITED 328 Lecture 4 12 Feb 2004 Loosely covering Chapter 5 Internet and LAN Technology.
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
Network Devices.
Topologies The structure of the network –Physical topology Actual layout of the media –Logical topology How the hosts access the media.
Local Area Networks Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Mr. Mark Welton.  A computer network, or simply a network, is a collection of computers and other hardware interconnected by communication channels.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Lets play Jeopardy No, sorry. You got it! Network Addresses Protocols Subnet Masks Media Network Devices
Topology, refers to the physical and logical diagrams which summarize network connections and information flow.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Local Area Networks Honolulu Community College
Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials.
Easy Subnetting. Chapter 4 Objectives Topics Covered in this chapter include: Interpret network diagrams Describe the operation and benefits of using.
IP Addressing.
Computer Network Architecture Lecture 3: Network Connectivity Devices.
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
© 2015 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 7: Networking Concepts IT Essentials v6.0.
Instructor & Todd Lammle
Network Concepts.
Instructor & Todd Lammle
Chapter Objectives In this chapter, you will learn:
Industrial communication networks
CCNA 1 pgb JEOPARDY.
Contents Computer Network Benefits of Computer Network
Local Area Networks Honolulu Community College
Connecting Network Components
Networking Devices.
Chapter 3 Computer Networking Hardware
Network connectivity to the legacy wired LAN
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Mollie Sconyers.
Introduction to Computers
CT1303 LAN Rehab AlFallaj.
Subnetting Basics benefits Reduced network traffic
IP Addressing & Subnetting
Network connectivity to the legacy wired LAN
IP Addressing & Subnetting
Connectors, Repeaters, Hubs, Bridges, Switches, Routers, NIC’s
Presentation transcript:

Why Use a Computer Network? Sharing information (or data) Sharing hardware and software Centralizing administration and support

The sneakernet

Sharing Hardware and Software

Network Configuration Overview Servers—Computers that provide shared resources to network users. Clients—Computers that access shared network resources provided by a server. Media—The wires that make the physical connections. Shared data—Files provided to clients by servers across the network.

Network Topology A network's topology affects its capabilities Type of equipment the network needs. Capabilities of the equipment. Growth of the network. Way the network is managed.

Standard Topologies Bus Star Ring Mesh All network designs stem from four basic topologies: Bus Star Ring Mesh

Bus topology network

Communication on the Bus Sending the signal Signal bounce Terminator

The following are affect the network performance Number of computer in the network Hardware capabilities of computers on the network Total number of queued commands waiting to be executed Types of applications (client-server or file system sharing, for example) being run on the network Types of cable used on the network Distances between computers on the network

Terminator

Star

Ring

Token Passing One method of transmitting data around a ring is called token passing

Mesh

Variations on the Standard Topologies Many working topologies are hybrid combinations of the bus, star, ring, and mesh topologies

Star Bus

Star Ring

Network interface card Protocols – Ethernet, Token Ring, or FDDI Types of media – Twisted-pair, coaxial, wireless, or fiber-optic Type of system bus – PCI or ISA

Situations that require NIC installation include the following Installation of a NIC on a PC that does not already have one Replacement of a malfunctioning or damaged NIC Upgrade from a 10-Mbps NIC to a 10/100/1000-Mbps NIC Change to a different type of NIC, such as wireless Installation of a secondary, or backup, NIC for network security reasons

The following are some of the factors that determine throughput: Internetworking devices Type of data being transferred Network topology Number of users on the network User computer Server computer Power conditions Using the formula transfer time = size of file / bandwidth (T=S/BW)

Network Cabling Coaxial cable Twisted-pair (unshielded and shielded) cable Fiber-optic cable Wireless

Cable specification

Coaxial Cable

There are two types of coaxial cable: Thin (thinnet) cable Thick (thicknet) cable The thicker the copper core, the farther the cable can carry signals

Coaxial-Cable Connection Hardware

Twisted-Pair Cable Types of twisted-pair cable Unshielded Twisted-Pair (UTP) Cable Shielded Twisted-Pair (STP) Cable

RJ-45 connector

UTP cabling wire colors are two types

UTP cable

Straight through

Use straight-through cables for the following connections: Switch to router Switch to PC or server Hub to PC or server

Straight through

Straight through

Cross over

Use crossover cables for the following connections Switch to switch Switch to hub Hub to hub Router to router PC to PC Router to PC

Cross over

Cross over

Roll over

Roll over

Roll over

Fiber-optic cable

Wireless

Wireless

Single wire punch

PART TWO

Types of Networking Peer-to-peer Server based

Peer to peer versus client-server

OSI MODELS

Networking Models

Dividing the network into seven layers provides the following advantages: It breaks network communication into smaller, more manageable parts. It standardizes network components to allow multiple vendor development and support. It allows different types of network hardware and software to communicate with each other. It prevents changes in one layer from affecting other layers. It divides network communication into smaller parts to make learning it easier to understand.

Peer-to-peer communications

Cabling LAN Materials used in networking LAN REPEATERS HUBS BRIDGE SWITCH ROUTERS

REPEATERS Is two port (for signal i/o) It simply give strength for signal

HUBS Hubs are actually multiport repeaters Passive: used only to share the physical media (It does not boost or clean the signal ) Active: it needs power to amplify Intelligent: microprocessor chips and diagnostic capabilities

Hub

Five segments of network media Four repeaters or hubs The 5-4-3-2-1 rule requires that the following guidelines should not be exceeded: Five segments of network media Four repeaters or hubs Three host segments of the network Two link sections with no hosts One large collision domain

BRIDGE Used to segment a large LAN to smaller. decreases the amount of traffic on a single LAN bridges operate at the data link layer of the OSI model The function of the bridge is to make intelligent decisions about whether or not to pass signals on to the next segment of a network.

BRIDGE When a bridge receives a frame on the network, the destination MAC address is looked up in the bridge table to determine whether to:- Filter Flood Copy the frame onto another segment

Filter If the destination device is on the same segment as the frame, the bridge will not send the frame onto other segments. This process is known as filtering

Flood If the destination address is unknown to the bridge, the bridge forwards the frame to all segments except the one on which it was received. This process is known as flooding.

Copy the frame onto another segment If the destination device is on a different segment, the bridge forwards the frame to the appropriate segment.

SWITCH A switch is sometimes described as a multiport bridge Switches reduce traffic and increase bandwidth Switches operate at much higher speeds than bridges and can support new functionality, such as virtual LANs.

ROUTERS Routers are responsible for routing data packets from source to destination within the LAN, and for providing connectivity to the WAN. The DTE is the endpoint of the user’s device on the WAN link. The DCE is typically the point where responsibility for delivering data passes into the hands of the service provider.

DTE & DCE

TCP-IP

TCP/IP MODEL

TCP/IP MODEL

TCP/IP MODEL

TCP/IP MODEL

TCP/IP MODEL

The OSI and TCP/IP models have many similarities: Both have layers. Both have application layers, though they include different services. Both have comparable transport and network layers. Both use packet-switched instead of circuit-switched technology. Networking professionals need to know both models.

Some differences of the OSI and TCP/IP models: TCP/IP combines the OSI application, presentation, and session layers into its application layer. TCP/IP combines the OSI data link and physical layers into its network access layer. TCP/IP appears simpler because it has fewer layers. When the TCP/IP transport layer uses UDP it does not provide reliable delivery of packets. The transport layer in the OSI model always does. The Internet was developed based on the standards of the TCP/IP protocols. The OSI model is not generally used to build networks. The OSI model is used as a guide to help students understand the communication process.

NETWORK ADDRESSING

IP Addressing The Hierarchical IP Addressing Scheme There are three types of IP addressing Dotted-decimal, as in 172.16.30.56 Binary, as in 10101100.00010000.00011110.00111000 Hexadecimal, as in AC.10.1E.38

Network Addressing called the network number uniquely identifies each network

Network Address Range: Class A 00000000 = 0 01111111 = 127 Network Address Range: Class B 10000000 = 128 10111111 = 191 Network Address Range: Class C 11000000 = 192 11011111 = 223 Network Address Ranges: Classes D and E Class D (224–239) Class E (240–255

Class A network.node.node.node In a Class A network address, the first byte is assigned to the network address, and the three remaining bytes are used for the node addresses: All host bits off is the network address: 10.0.0.0. All host bits on is the broadcast address: 10.255.255.255

Private IP Addresses (they’re not routable through the Internet) Reserved IP Address Space Address Class Reserved address space Class A 10.0.0.0 through 10.255.255.255 Class B 172.16.0.0 through 172.31.255.255 Class C 192.168.0.0 through 192.168.255.255

Introduction to Network Address Translation (NAT) to translate your private inside addresses to a global outside address by using NAT There are different flavors of NAT Static NAT Dynamic NAT Overloading

Classless Inter-Domain Routing (CIDR) It’s basically the method that ISPs (Internet Service Providers) use to allocate an amount of addresses to a company, a home—a customer When you receive a block of addresses from an ISP, what you get will look something like this: 192.168.10.32/28.(The slash notation (/) means how many bits are turned on (1s))

Broadcast Addresses Layer 2 broadcasts These are sent to all nodes on a LAN. Broadcasts (layer 3) These are sent to all nodes on the network. Unicast These are sent to a single destination host. Multicast These are packets sent from a single source, and transmitted to many devices on different networks

Subnetting Basics Reduced network traffic Optimized network performance Simplified management Facilitated spanning of large geographical distances

How to Create Subnets Follow these steps: 1.Determine the number of required network IDs: One for each subnet One for each wide area network connection 2.Determine the number of required host IDs per subnet: One for each TCP/IP host One for each router interface 3.Based on the above requirements, create the following: One subnet mask for your entire network A unique subnet ID for each physical segment A range of host IDs for each subnet

Subnetting

Subnetting a Class C Address Answer five simple questions: How many subnets does the chosen subnet mask produce? How many valid hosts per subnet are available? What are the valid subnets? What’s the broadcast address of each subnet? What are the valid hosts in each subnet?

Subnetting a Class C Address

How many subnets. 2^x = number of subnets How many subnets? 2^x = number of subnets. x is the number of masked bits, or the 1s How many hosts per subnet? 2^y – 2 = number of hosts per subnet. y is the number of unmasked bits, or the 0s. For example, in 11000000, the number of zeros gives us 26 – 2 hosts. In this example, there are 62 hosts per subnet What are the valid subnets? 256 – subnet mask = block size, or increment number. An example would be 256 – 192 = 64. The block size of a 192 mask is always 64. Start counting at zero in blocks of 64 until you reach the subnet mask value and these are your subnets. 0, 64, 128, 192. What’s the broadcast address for each subnet? the broadcast address is always the number right before the next subnet. What are the valid hosts? Valid hosts are the numbers between the subnets, omitting all the 0s and all 1s.

Practice Example #1: 255.255.255.192 (/26) Let’s use the Class C subnet mask from the preceding example, 255.255.255.192, to see how much simpler this method is than writing out the binary numbers. We’re going to subnet the network address 192.168.10.0 and subnet mask 255.255.255.192.

How many subnets? Since 192 is 2 bits on (11000000), the answer would be 22. How many hosts per subnet? We have 6 host bits off (11000000), so the equation would be 26 – 2 = 62 hosts. What are the valid subnets? 256 – 192 = 64. Remember, we start at zero and count in our block size, so our subnets are 0, 64, 128, and 192.

Practice Example #2: 255.255.255.224 (/27) This time, we’ll subnet the network address 192.168.10.0 and subnet mask 255.255.255.224.

How many subnets? 224 is 11100000, so our equation would be 23 = 8. How many hosts? 25 – 2 = 30. What are the valid subnets? 256 – 224 = 32. We just start at zero and count to the subnet mask value in blocks (increments) of 32: 0, 32, 64, 96, 128, 160, 192, 224.