Chapter 2. This Chapter Covers… History of networking –Network devices –Cabling –Physical and logical layouts –LANs, MANs, WANs, SAN, VPN Bandwidth Layered.

Slides:



Advertisements
Similar presentations
M A Wajid Tanveer Infrastructure M A Wajid Tanveer
Advertisements

Introduction To Network. Overview Whats Network ? Types of Networks Open System Interconnection Reference Model (OSI / RM) Transmission Control Protocol.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
v3.1 CIS151 Module 2 JEOPARDY K. MartinG. Valencia.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
IS Network and Telecommunications Risks
Networks Adapting Computers to Telecommunications Media.
مقدمة في تقنية المعلومات د. محمد البرواني. مقدمة عن الشبكات مقدمة عن الشبكات.
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Networking Fundamentals
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Networking Fundamentals
Chapter 5 Communications and Networks
Review on Networking Technologies Linda Wu (CMPT )
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
{ Networking High School Computer Application. What is a network? A system containing any combination of computers, computer terminals, printers, audio.
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Chapter 4 Computer Networks – Part 1
Copyright CCNA 1 Chapter 2 Networking Fundamentals By Your Name.
1 Pertemuan 3 Networking Terminology. Discussion Topics Data networks Network history Networking devices Network topology Network protocols Local-area.
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Week one - networks and Layered Communication Introduction to Networks Layered Communication OSI Model The Physical Layer The Data Link Layer.
Networks and Networking Chapter 4 Copyright Prentice-Hall, Inc
Network Basics. Outline Objective Types of Networks LAN Topologies LAN Networking Standards Network Devices Dial-Up Access Ethernet Wiring Summary References.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Local Area Network By Bhupendra Ratha, Lecturer
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
NETWORKS.
Local Area Networks Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Cisco – Semester 1 – Chapter 2 Network Fundamentals And The OSI Model.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Telecommunications, the Internet, and Wireless Technology.
CHAPTER 2. Students completing this chapter should be able to: Explain the importance of bandwidth in networking. Use an analogy from their experience.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Network Structure Elements of communication message source the channel message destination Network data or information networks capable of carrying many.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
WEBMASTER 3224 PHYSICAL VS LOGICAL COMPONENTS OF THE INTERNET AND NETWORKS.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
1 Data Networks Sharing data through the use of floppy disks is not an efficient or cost-effective manner in which to operate businesses. Businesses needed.
1 Version 3 Module 2 Networking Fundamentals. 2 Version 3 Data Networks Data networks developed as a result of business applications that were written.
Computer Networks Syed Md. Ashraful Karim Lecturer, CSE BU.
Local Area Networks Honolulu Community College
CCNA1 v3 Module 2 v3 CCNA 1 Module 2 JEOPARDY K. Martin.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
NETWORKING FUNDAMENTALS Laboratorium Teknik Informatika – Universitas Gunadarma Stefanus Vlado Adi Kristanto Version 1.3.
Networking Basics CCNA 1 Chapter 2. Networking Fundamentals.
 Introduction to Wide Area Networks 2 nd semester
NETWORKS. Example Web Browsing application Software Protocols involved Software NIC / Modem Hardware Telephone line / Co-axial cable / Air interface.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
Computer Engineering and Networks, College of Engineering, Majmaah University INTRODUCTION TO COMPUTER NETWORKS Mohammed Saleem Bhat
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Chapter Objectives In this chapter, you will learn:
Local Area Networks Honolulu Community College
Module 2: Networking Fundamentals
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
Computer Networking A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels.
ICT Computing Lesson 4: Computing Network.
Presentation transcript:

Chapter 2

This Chapter Covers… History of networking –Network devices –Cabling –Physical and logical layouts –LANs, MANs, WANs, SAN, VPN Bandwidth Layered model –OSI –TCP/IP –Differences and similarities between the two models

Evolution of Networking Business Applications Sneaker Net LAN WAN

History of Networking In 1947 the invention of a semiconductor transistor opened up many possibilities for making smaller, more reliable computers. In the late 1950s the integrated circuit that combined several, then many, and now millions, of transistors on one small piece of semiconductor was invented. Through the 1960s mainframes with terminals were commonplace, and integrated circuits were widely used.

In 1977 the Apple Computer Company introduced the microcomputer, also known as the personal computer. In 1981 IBM introduced its first personal computer. The user-friendly Mac, the open-architecture IBM PC, and the further micro-miniaturization of integrated circuits led to widespread use of personal computers in homes and businesses.

In the mid-1980s users with stand-alone computers started to share files using modems to connect to other computers. Starting in the 1960s and continuing through the 70s, 80s, and 90s, the Department of Defense (DoD) developed large, reliable, wide-area networks (WANs) for military and scientific reasons.

Networking Devices End-user devices Network devices –NIC –PCMCIA card –Repeaters –Hubs –Bridges –Switches –Routers

Networking Topology Network topology defines the structure of the network Physical topology –The actual layout of the wire or media. Logical topology –Defines how the media is accessed by the hosts for sending data

Physical Topology A bus topology uses a single backbone cable that is terminated at both ends. All the hosts connect directly to this backbone A ring topology connects one host to the next and the last host to the first. This creates a physical ring of cable A star topology connects all cables to a central point of concentration An extended star topology links individual stars together by connecting the hubs and/or switches A hierarchical topology is similar to an extended star. However, instead of linking the hubs and/or switches together, the system is linked to a computer that controls the traffic on the topology A mesh topology is implemented to provide as much protection as possible from interruption of service. The use of a mesh topology in the networked control systems of a nuclear power plant would be an excellent example

Logical Topology Broadcast topology –Each host sends its data to all other hosts on the network medium –There is no order that the stations must follow to use the network –It is first come, first serve –Ethernet works this way Token passing –Controls network access by passing an electronic token sequentially to each host –When a host receives the token, that host can send data on the network. If the host has no data to send, it passes the token to the next host and the process repeats itself –Two examples of networks that use token passing are Token Ring and Fiber Distributed Data Interface (FDDI) –A variation of Token Ring and FDDI is Arcnet Arcnet is token passing on a bus topology.

Network Protocols Protocol suites are collections of protocols that enable network communication from one host through the network to another host A protocol is a formal description of a set of rules and conventions that govern a particular aspect of how devices on a network communicate Protocols determine the format, timing, sequencing, and error control in data communication Without protocols, the computer cannot make or rebuild the stream of incoming bits from another computer into the original format

Protocols Control… How the physical network is built How computers connect to the network How the data is formatted for transmission How that data is sent How to deal with errors

Related organizations and committees Tthe Institute of Electrical and Electronic Engineers (IEEE) American National Standards Institute (ANSI) Telecommunications Industry Association (TIA) Electronic Industries Alliance (EIA) The International Telecommunications Union (ITU) –Formerly known as the Comité Consultatif International Téléphonique et Télégraphique (CCITT).

LAN Components Computers Network interface cards Peripheral devices Networking media Network devices

LAN technologies Ethernet Token Ring FDDI

Wide-area Networks WANs connect user networks over a large geographical area Allows computers, printers, and other devices on a LAN to share and be shared with distant locations Provide instant communications across large geographic areas Wide-area networking has also created a new class of workers called telecommuters, people who never have to leave their homes to go to work

WANs Are Designed To Do… Operate over a large geographically separated areas Allow users to have real-time communication capabilities with other users Provide full-time remote resources connected to local services Provide , World Wide Web, file transfer, and e-commerce services

WAN Technologies Modems Integrated Services Digital Network (ISDN) Digital Subscriber Line (DSL) Frame Relay US (T) and Europe (E) Carrier Series – T1, E1, T3, E3 Synchronous Optical Network (SONET)

Metropolitan-area Networks A MAN is a network that spans a metropolitan area such as a city or suburban area A MAN usually consists of two or more LANs in a common geographic area Example –a bank with multiple branches may utilize a MAN Typically, a service provider is used to connect two or more LAN sites using private communication lines or optical services A MAN can also be created using wireless bridge technology by beaming signals across public areas.

Storage-Area Networks (SANs) SAN is a dedicated, high-performance network used to move data between servers and storage resources –Because it is a separate, dedicated network, it avoids any traffic conflict between clients and servers SAN technology allows high-speed server-to- storage, storage-to-storage, or server-to-server connectivity –This method uses a separate network infrastructure that relieves any problems associated with existing network connectivity

SANs Features Performance –SANs enable concurrent access of disk or tape arrays by two or more servers at high speeds, providing enhanced system performance Availability –SANs have disaster tolerance built in, because data can be mirrored using a SAN up to 10 kilometers (km) or 6.2 miles away Scalability –Like a LAN/WAN, it can use a variety of technologies. This allows easy relocation of backup data, operations, file migration, and data replication between systems

Virtual Private Network (VPN) A VPN is a private network that is constructed within a public network infrastructure such as the global Internet Using VPN, a telecommuter can access the network of the company headquarters through the Internet by building a secure tunnel between the telecommuter’s PC and a VPN router in the headquarters

Benefits of VPNs A VPN is a service that offers secure, reliable connectivity over a shared public network infrastructure such as the Internet VPNs maintain the same security and management policies as a private network They are the most cost-effective method of establishing a point-to-point connection between remote users and an enterprise customer's network.

Types of VPN Access VPNs –Provide remote access to a mobile worker and small office/home office (SOHO) to the headquarters of the Intranet or Extranet over a shared infrastructure –Access VPNs use analog, dialup, ISDN, digital subscriber line (DSL), mobile IP, and cable technologies to securely connect mobile users, telecommuters, and branch offices Intranet VPNs –VPNs link regional and remote offices to the headquarters of the internal network over a shared infrastructure using dedicated connections –Intranet VPNs differ from Extranet VPNs in that they allow access only to the employees of the enterprise Extranet VPNs –Extranet VPNs link business partners to the headquarters of the network over a shared infrastructure using dedicated connections –Extranet VPNs differ from Intranet VPNs in that they allow access to users outside the enterprise.

Intranets and Extranets Intranets –Intranets are designed to permit access by users who have access privileges to the internal LAN of the organization –Browser technology is used Extranets –Extranets refer to applications and services that are Intranet based, and use extended, secure access to external users or enterprises –This access is usually accomplished through passwords, user IDs, and other application-level security