NETWORKING




    Vinodh Alwal
WHAT IS A NETWORK?
   A network is simply two or more computers
    that are linked together.
   The most common types of networks are:
          Local Area Networks (LAN)
          Metropolitan Area Network (MAN)
          Wide Area Networks (WAN)
   The primary difference between the two is that
    a LAN is generally confined to a limited
    geographical area, whereas a MAN covers a
    Metropolitan geographical area. Most WANs
    are made up of several connected LANs.
TYPES OF NETWORKS
   Local Area Network (LAN) – a network that spans a
    small area such as a building or an office.
       Software applications and other resources are stored on a
        file server.
       Print servers enable multiple users to share the same
        printer.
   Metropolitan Area Network (MAN) a network that
    connect networking devices that may spans around
    entire city area.
   Wide Area Network (WAN) – a network that spans a
    wide geographical area; there are several types of
    WANS
       Campus area network (CAN)
       Public access network (PAN)
       Value added network (VAN)
       Virtual private network (VPN)
TYPES OF NETWORKS
   Intranet – An intranet is a private LAN designed for
    use by everyone within an organization. An intranet
    might consist of an internal e-mail system, a message
    board and one or more Web site portals that contain
    company news, forms, and personnel information.
    Access to an intranet’s web site is restricted by a
    firewall
   Extranet – a network that connects people within
    your company with people who are outside your
    company--all within a secure, password-protected
    network that can be accessed from anywhere.
    people who are outside your company--all
    within a secure, password-protected
    network that can be accessed from
    anywhere.
BENEFITS OF A
                                   NETWORK
   Information sharing:             Authorized users can use other
    computers on the network to access and share information and data.
    This could include special group projects, databases, etc.
   Hardware sharing:              One device connected to a network, such
    as a printer or scanner, can be shared by many users.
   Software sharing:             Instead of purchasing and installing a
    software program on each computer, it can be installed on the server.
    All of the users can then access the program from a single location.
   Collaborative environment:                Users can work together on
    group projects by combining the power and capabilities of diverse
    equipment.
RISKS OF NETWORK
                        COMPUTING
   The security of a computer network is
    challenged everyday by:
       Equipment malfunctions
       System failures
           Note: equipment malfunctions and system failures may
            be caused by natural disasters such as floods, storms, or
            fires, and electrical disturbances
       Computer hackers
       Virus attacks
COMMUNICATIONS
                          MEDIA
   Communications Channel

       To transfer data from one computer to another
        requires some type of link through which the data
        can be transmitted. This link is known as the
        communications channel.
       To send data through the channel requires some
        type of transmission media, which may be either
        physical or wireless.
PHYSICAL MEDIA
   Twisted-pair cable – consists of two independently
    insulated wires twisted around each other (least
    expensive type of cable—the kind that is used in many telephone
    systems)
   Coaxial cable – consists of an insulated center wire
    grounded by a shield of braided wire (the primary type of
    cabling used by the cable television industry; it is more expensive than
    twisted pair)
   Fiber-optic cable – contains hundreds of clear
    fiberglass or plastic fibers (threads) (made from thin, flexible
    glass tubing; bandwidth is greater, so it can carry more data; it is lighter
    than metal wires and is less susceptible to interference; it is fragile and
    expensive)
   ISDN line – a special digital telephone line that
    transmits and receives information at very high
    speeds
WIRELESS MEDIA
   Microwave system – transmits data via high-
    frequency radio signals through the atmosphere
   Satellite system – receive transmitted signals, amplify
    them, and then transmit the signals to the appropriate
    locations
   Cellular technology – uses antennae resembling
    telephone towers to pick up radio signals within a
    specific area (cell)
   Infrared technology – transmits data as infrared light
    waves from one device to another, providing wireless
    links between PCs and peripherals
    Note: The type selected is determined by the type of
    network, the size of the network, and the cost.
HOW ARE NETWORKS
             CATEGORIZED?
 Networks are usually classified using
 three properties:
     Topology
     Protocol

     Architecture
NETWORK
                              TOPOLOGIES
   Network Topology (or layout) – refers to the way
    computers and peripherals are configured to form
    networks
      Bus topology – all computers are linked by a single
       line of cable
      Star topology – multiple computers and peripheral
       devices are linked to a central computer, called a
       host
      Ring topology – each computer or workstation is
       connected to two other computers, with the entire
       network forming a circle
      Hybrid topology – combine network layout
        types to meet their needs
NETWORK/COMMUNICATION
               PROTOCOLS
 A protocol is simply an agreed-on set of rules
  and procedures for transmitting data between
  two or more devices.
 Features determined by the protocol are:
      How the sending device indicates it has finished
       sending the message.
      How the receiving device indicates it has received

       the message.
   The type of error checking to be used. Most networks
    use Ethernet, but some network may use IBM’s Token
    Ring protocol.
   On the Internet, the major protocol is TCP/IP
    (Transmission Control Protocol/Internet Protocol).
EXAMPLE OF AN ETHERNET
                   BUS
             Ethernet LANs use a bus
              topology.
             All stations are connected to
              a single long cable.
             Any station can send a
              signal along the cable, which
              all other stations will receive.
              Unlike ring topologies, the
              cable doesn't close a loop.
TOKEN RING NETWORK
          A token passing ring LAN is a
           group of computers connected in
           a loop. The group uses a token
           passing access mechanism.
          A computer wishing to send data
           should first receive permission.
           When it gets control of the
           network it may transmit a frame.
           Each frame transmitted on the
           ring is transmitted from one
           computer to the next, until it
           ultimately returns to the initiator of
           the transmission.
INTERNET PROTOCOLS
NETWORKING HARDWARE
                   AND SOFTWARE

   Hub & Switch – electronic device (with a number of
    ports) used in a LAN to link groups of computers
   Repeaters (also called amplifiers) – electronic devices
    that receive signals and amplify and send them along
    the network
   Routers - electronic devices used to ensure
    messages are sent to their intended destinations
   Gateway – consists of hardware and/or software that
    allows communications between dissimilar networks
   Bridge – consists of hardware and/or software
     that allows communication between two
     similar networks
HUBS


The original Ethernet LANs relied on certain physical
characteristics of the cable carrying the network data
(usually coaxial cable). New Ethernet technologies
introduced new cable types that we unable to fulfill the
original physical requirements. New devices - hubs -
were introduced to simulate those characteristics.
Simply put, the hub's major function is to replicate data it
receives from one device attached to it to all others.
SWITCH


A network switch is a networking device that performs
transparent connection of multiple network segments
with forwarding based on MAC addresses at up to the
speed of the hardware.
It is an Intelligent Device, & It maantains MAC address
table
Each Port of the switch has fixed bandwidth, it works
with flooding & Unicast
It Supports full duplex communication
REPEATERS
A common problem in the networking world is that of weakening
electrical signals. Electrical signals traveling through wires (such as
copper wires used in most networks), weaken due to the wire's
electrical resistance. This effect limits the lengths of the cable that can
be used. A repeater will overcome this limit, when there is a need to
connect two computers at a larger distance.
A repeater is connected to two cable segments. Any electrical signal
reaching the repeater from one segment, will be amplified and
retransmitted to the other segment.




                      An illustration of a repeater at work
       The electrical signal entering the repeater at one end is weakened.
       The repeater amplifies the electrical signals and resends the data.
ROUTERS




   Routers connect two or more networks and forward data
    packets between them. When data arrives from one of
    the segments, the router decides, according to it's routing
    table, to which segment to forward that data.
MODEMS


 An illustration of data sent using a modem and a regular
                       telephone line.


A modem is a device that converts digital data originating from a
terminal or computer, to analog signals used by voice
communication networks such as the telephone system. At one
end, modems convert the digital pulses to audible tones and
convert audio tones back to digital pulses at the other.
The word "Modem" stands for "MOdulator-DEModulator".
EXAMPLE OF
                              FIREWALL




   Firewalls are systems that establish access control policies
    among networks. They can block information from entering
    a network or from getting out of that network, they can
    permit different users to perform different kinds of
    operations, according to the user's authorizations .
NETWORK
                         ARCHITECTURE
   Network architecture – refers to the way a
    network is designed and built. The two major
    types are:
       Peer-to-peer architecture – Computers connect
        with each other in a workgroup to share files,
        printers, and Internet access. This is used to
        connect a small number of computers.
       Client/server architecture – sends information from
        a client computer to a server, which then relays the
        information back to the client computer, or to other
        computers on the network
COMMUNICATION
                     PROTOCOLS
   File transfer protocol (FTP) – used to transmit files.
   Simple mail transfer protocol (SMTP) – used to
    transmit e-mail messages.
   Post office protocol (POP) – allows the recipient to
    retrieve messages.
   Wireless application protocol – enables wireless
    devices to access and use the Internet using a
    client/server network.
   802.11 – protocol for wireless LAN technology
DATA TRANSMISSION
                  CHARACTERISTICS
   Bandwidth (rate of transmission)
   Analog or Digital (type of signal)
      Analog transmission – takes the form of
       continuous waves transmitted over a medium at a
       certain frequency rage
      Digital transmission – sends data in the form of bits

   Serial or Parallel (order of bits)
      Serial transmission – all of the data bits are
       transmitted one bit after another in a continuous
       line
      Parallel transmission – data bits are sent at the
       same time along multiple paths
COMMUNICATIONS
                   SOFTWARE
   E-Mail Software – used to send and receive
    electronic messages using the Internet
   Web Browser – allows users to access and
    view Web pages
   Groupware – allows groups of people on a
    network to share information and to
    collaborate on various projects
Computer Networking
Computer Networking

Computer Networking

  • 1.
    NETWORKING Vinodh Alwal
  • 2.
    WHAT IS ANETWORK?  A network is simply two or more computers that are linked together.  The most common types of networks are:  Local Area Networks (LAN)  Metropolitan Area Network (MAN)  Wide Area Networks (WAN)  The primary difference between the two is that a LAN is generally confined to a limited geographical area, whereas a MAN covers a Metropolitan geographical area. Most WANs are made up of several connected LANs.
  • 3.
    TYPES OF NETWORKS  Local Area Network (LAN) – a network that spans a small area such as a building or an office.  Software applications and other resources are stored on a file server.  Print servers enable multiple users to share the same printer.  Metropolitan Area Network (MAN) a network that connect networking devices that may spans around entire city area.  Wide Area Network (WAN) – a network that spans a wide geographical area; there are several types of WANS  Campus area network (CAN)  Public access network (PAN)  Value added network (VAN)  Virtual private network (VPN)
  • 5.
    TYPES OF NETWORKS  Intranet – An intranet is a private LAN designed for use by everyone within an organization. An intranet might consist of an internal e-mail system, a message board and one or more Web site portals that contain company news, forms, and personnel information. Access to an intranet’s web site is restricted by a firewall  Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere. people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere.
  • 7.
    BENEFITS OF A NETWORK  Information sharing: Authorized users can use other computers on the network to access and share information and data. This could include special group projects, databases, etc.  Hardware sharing: One device connected to a network, such as a printer or scanner, can be shared by many users.  Software sharing: Instead of purchasing and installing a software program on each computer, it can be installed on the server. All of the users can then access the program from a single location.  Collaborative environment: Users can work together on group projects by combining the power and capabilities of diverse equipment.
  • 9.
    RISKS OF NETWORK COMPUTING  The security of a computer network is challenged everyday by:  Equipment malfunctions  System failures  Note: equipment malfunctions and system failures may be caused by natural disasters such as floods, storms, or fires, and electrical disturbances  Computer hackers  Virus attacks
  • 11.
    COMMUNICATIONS MEDIA  Communications Channel  To transfer data from one computer to another requires some type of link through which the data can be transmitted. This link is known as the communications channel.  To send data through the channel requires some type of transmission media, which may be either physical or wireless.
  • 12.
    PHYSICAL MEDIA  Twisted-pair cable – consists of two independently insulated wires twisted around each other (least expensive type of cable—the kind that is used in many telephone systems)  Coaxial cable – consists of an insulated center wire grounded by a shield of braided wire (the primary type of cabling used by the cable television industry; it is more expensive than twisted pair)  Fiber-optic cable – contains hundreds of clear fiberglass or plastic fibers (threads) (made from thin, flexible glass tubing; bandwidth is greater, so it can carry more data; it is lighter than metal wires and is less susceptible to interference; it is fragile and expensive)  ISDN line – a special digital telephone line that transmits and receives information at very high speeds
  • 14.
    WIRELESS MEDIA  Microwave system – transmits data via high- frequency radio signals through the atmosphere  Satellite system – receive transmitted signals, amplify them, and then transmit the signals to the appropriate locations  Cellular technology – uses antennae resembling telephone towers to pick up radio signals within a specific area (cell)  Infrared technology – transmits data as infrared light waves from one device to another, providing wireless links between PCs and peripherals Note: The type selected is determined by the type of network, the size of the network, and the cost.
  • 16.
    HOW ARE NETWORKS CATEGORIZED?  Networks are usually classified using three properties:  Topology  Protocol  Architecture
  • 17.
    NETWORK TOPOLOGIES  Network Topology (or layout) – refers to the way computers and peripherals are configured to form networks  Bus topology – all computers are linked by a single line of cable  Star topology – multiple computers and peripheral devices are linked to a central computer, called a host  Ring topology – each computer or workstation is connected to two other computers, with the entire network forming a circle  Hybrid topology – combine network layout types to meet their needs
  • 19.
    NETWORK/COMMUNICATION PROTOCOLS  A protocol is simply an agreed-on set of rules and procedures for transmitting data between two or more devices.  Features determined by the protocol are:  How the sending device indicates it has finished sending the message.  How the receiving device indicates it has received the message.  The type of error checking to be used. Most networks use Ethernet, but some network may use IBM’s Token Ring protocol.  On the Internet, the major protocol is TCP/IP (Transmission Control Protocol/Internet Protocol).
  • 20.
    EXAMPLE OF ANETHERNET BUS  Ethernet LANs use a bus topology.  All stations are connected to a single long cable.  Any station can send a signal along the cable, which all other stations will receive. Unlike ring topologies, the cable doesn't close a loop.
  • 21.
    TOKEN RING NETWORK  A token passing ring LAN is a group of computers connected in a loop. The group uses a token passing access mechanism.  A computer wishing to send data should first receive permission. When it gets control of the network it may transmit a frame. Each frame transmitted on the ring is transmitted from one computer to the next, until it ultimately returns to the initiator of the transmission.
  • 22.
  • 23.
    NETWORKING HARDWARE AND SOFTWARE  Hub & Switch – electronic device (with a number of ports) used in a LAN to link groups of computers  Repeaters (also called amplifiers) – electronic devices that receive signals and amplify and send them along the network  Routers - electronic devices used to ensure messages are sent to their intended destinations  Gateway – consists of hardware and/or software that allows communications between dissimilar networks  Bridge – consists of hardware and/or software that allows communication between two similar networks
  • 24.
    HUBS The original EthernetLANs relied on certain physical characteristics of the cable carrying the network data (usually coaxial cable). New Ethernet technologies introduced new cable types that we unable to fulfill the original physical requirements. New devices - hubs - were introduced to simulate those characteristics. Simply put, the hub's major function is to replicate data it receives from one device attached to it to all others.
  • 25.
    SWITCH A network switchis a networking device that performs transparent connection of multiple network segments with forwarding based on MAC addresses at up to the speed of the hardware. It is an Intelligent Device, & It maantains MAC address table Each Port of the switch has fixed bandwidth, it works with flooding & Unicast It Supports full duplex communication
  • 26.
    REPEATERS A common problemin the networking world is that of weakening electrical signals. Electrical signals traveling through wires (such as copper wires used in most networks), weaken due to the wire's electrical resistance. This effect limits the lengths of the cable that can be used. A repeater will overcome this limit, when there is a need to connect two computers at a larger distance. A repeater is connected to two cable segments. Any electrical signal reaching the repeater from one segment, will be amplified and retransmitted to the other segment. An illustration of a repeater at work The electrical signal entering the repeater at one end is weakened. The repeater amplifies the electrical signals and resends the data.
  • 27.
    ROUTERS  Routers connect two or more networks and forward data packets between them. When data arrives from one of the segments, the router decides, according to it's routing table, to which segment to forward that data.
  • 28.
    MODEMS An illustrationof data sent using a modem and a regular telephone line. A modem is a device that converts digital data originating from a terminal or computer, to analog signals used by voice communication networks such as the telephone system. At one end, modems convert the digital pulses to audible tones and convert audio tones back to digital pulses at the other. The word "Modem" stands for "MOdulator-DEModulator".
  • 29.
    EXAMPLE OF FIREWALL  Firewalls are systems that establish access control policies among networks. They can block information from entering a network or from getting out of that network, they can permit different users to perform different kinds of operations, according to the user's authorizations .
  • 30.
    NETWORK ARCHITECTURE  Network architecture – refers to the way a network is designed and built. The two major types are:  Peer-to-peer architecture – Computers connect with each other in a workgroup to share files, printers, and Internet access. This is used to connect a small number of computers.  Client/server architecture – sends information from a client computer to a server, which then relays the information back to the client computer, or to other computers on the network
  • 32.
    COMMUNICATION PROTOCOLS  File transfer protocol (FTP) – used to transmit files.  Simple mail transfer protocol (SMTP) – used to transmit e-mail messages.  Post office protocol (POP) – allows the recipient to retrieve messages.  Wireless application protocol – enables wireless devices to access and use the Internet using a client/server network.  802.11 – protocol for wireless LAN technology
  • 33.
    DATA TRANSMISSION CHARACTERISTICS  Bandwidth (rate of transmission)  Analog or Digital (type of signal)  Analog transmission – takes the form of continuous waves transmitted over a medium at a certain frequency rage  Digital transmission – sends data in the form of bits  Serial or Parallel (order of bits)  Serial transmission – all of the data bits are transmitted one bit after another in a continuous line  Parallel transmission – data bits are sent at the same time along multiple paths
  • 35.
    COMMUNICATIONS SOFTWARE  E-Mail Software – used to send and receive electronic messages using the Internet  Web Browser – allows users to access and view Web pages  Groupware – allows groups of people on a network to share information and to collaborate on various projects