Sunteți pe pagina 1din 147

EC 301

COMPUTER
NETWORKING
FUNDAMENTALS

CHAPTER 1:

INTRODUCTION TO
NETWORKING
Prepared By:
Sheila/JKE/PKB

CHAPTER 1

DURATION
6

HOURS (3 weeks) Lecture

CLO 1
Explain

the hardware and network devices to built


LAN for a specific implementation (C2)

202.188.0.133

202.188.0.134
202.188.0.138

202.188.0.135

202.188.0.137
202.188.0.136

INTRODUCTION TO NETWORKING
COMPUTER

HARDWARE??

INTRODUCTION TO NETWORKING
COMPUTER

HARDWARE??
Processing
Device

Input
Device

HARDWARE

Storage
Device

Output
Device

INTRODUCTION TO NETWORKING
COMPUTER
HARDWARE

SYSTEM?

SOFTWARE

The instructions given


to the computer in the
form of a program
which are used for
different purposes.

INTRODUCTION TO NETWORKING
COMPUTER

SYSTEM ??

under the control set of instructions


processes
raw data
from the user an advanced
electronic
Input
device

gives the result


Output

saves
In the storage space

INTRODUCTION TO NETWORKING
COMPUTER

NETWORK??
Network comprise 2
or MORE computers
that have been
connected
A group of device,
known as a node
connected to media
transmission.

INTRODUCTION TO NETWORKING
COMPUTER

NETWORK??

The computers can be


geographically located
anywhere.

Enable them to
communicate with
each other and share
resources and files.

ATM
TELEKOM MALAYSIA

REPEATERS

SERVER

ROUTER

HUB

HUB

HUB

HUB

BRIDGE

HUB

BRIDGE

HUB

HUB

WORKSTATION

INTRODUCTION TO NETWORKING
Computer networks can be used for
several purposes:

Facilitating communications.
Sharing hardware.
Sharing files, data, and information.
Sharing software.

people can communicate


efficiently
and easily
each computer
on a network
may
via :
access
andaccess
use hardware
resources
user may
data and
Email,
messaging,
chat
rooms,
on
thetonetwork,
such
as printing
a
information
which
stored
on other
Usersinstant
connected
a network
may
Telephone,
video
telephone
calls
run application
programs
document
onon
aon
shared
network
computers
the and
network.
remote
computers.
video
conferencing.
printer.

INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER

NETWORK COMPUTER

INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
Connected to Printer / scanner
individually
Stored on Workstations / Pendrive
/ CD
Connected to internet
Security software installed On
each computer. User keeps
security software updated.
Physical security typically poor
Connecting teams through phone

INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER

NETWORK COMPUTER
A single stand-alone
computer can be very
useful BUT it is when
connected to other
computers that it
becomes possible to
do some of the most
powerful things.

INTRODUCTION TO NETWORKING
NETWORK COMPUTER
Share Printer / scanner
Stored on server . All files can be
shared
Shared internet connection
Security software installed on
server. Client for security software
installed on workstations. Server
auto updates workstations.
Physical security for servers good
Connecting teams through email /

INTRODUCTION TO NETWORKING
2

TYPES of NETWORK

P2P

NETWORK
CLIENT/SERVER NETWORK

INTRODUCTION TO NETWORKING
P2P
are

NETWORK

more commonly
implemented where less
then ten computers are
involved and where strict
security is not necessary.

INTRODUCTION TO NETWORKING
P2P

NETWORK

each

computer in the
network act as both client or
server for the other
computers in the network
allowing shared access to
files/email with every other
computer on the network
and peripherals without the
need for a central server

INTRODUCTION TO NETWORKING
P2P
all

NETWORK

computers in the
network to use the same or
a compatible program to
connect to each other and
access files and other
resources found on the
other computer.

INTRODUCTION TO NETWORKING
CLIENT/SERVER
Suitable

NETWORK

for larger network


A computer network in which one
centralized
Powerful computer is a hub to
which many less powerful
personal computers or
workstations are connected
Clients run programs and access
data that are stored on the server

INTRODUCTION TO NETWORKING
P2P

vs C/S

PEER-TO-PEER NETWORK

CLIENT/SERVER NETWORK

Easy to setup.

More difficult to set up.

Less expensive.

More expensive to install.

Can be implemented on a wide range of


operating systems.

A variety of operating systems can be


supported on the client computers, but
the server needs to run an operating
system that supports networking.

More time consuming to maintain the


software being used (as computers must
be managed individually).

Less time consuming to maintain the


software being used (as most of the
maintenance is managed from the
server).

INTRODUCTION TO NETWORKING
P2P

vs C/S

PEER-TO-PEER NETWORK

CLIENT/SERVER NETWORK

Very low levels of security supported or


none at all. These can be very
cumbersome to set up, depending on the
operating system being used.

High levels of security are supported, all


of which are controlled from the server.
Such measures prevent the deletion of
essential system files or the changing of
settings.

Ideal for networks with less than 10


computers.

No limit to the number of computers that


can be supported by the network.

Does not require a server.

Requires a server running a server


operating system.

Demands a moderate level of skill to


administer the network.

Demands that the network administrator


has a high level of IT skills with a good
working knowledge of a server operating
system.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT
9. Segment

11. Transmission
Media

8 Backbone

10. Topology

6. Node

5 Network Operating System


1. Server

7. Connectivity
Device

3. Workstation

2 . Client

4. Network Interface Card

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

1. Client
A computer on the network that requests
resources or services from another
computer on a network
client could also act as a server. The
term client may also refer to the human
user of a client workstation or to client
software installed on the workstation.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

2. Server
A computer on the network that manages
shared resources
usually have more processing power, memory,
and hard disk space than clients.
run network operating software that can
manage not only data, but also users,
groups, security, and applications on the
network

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

3. Workstations
All of the user computers connected to a
network are called workstations.
A typical workstation is a computer that is
configured with a network interface card,
networking software, and the appropriate
cables.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

3. Workstations
Workstations do not necessarily need floppy
disk drives because files can be saved on
the file server.
Almost any computer can serve as a
network workstation

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

4. Network Interface Card (NIC)


NIC provides the physical connection
between the network and the computer
workstation.
Most NICs are internal, with the card fitting
into an expansion slot inside the computer.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

4. Network Interface Card (NIC)


NICs are a major factor in determining the
speed and performance of a network.
The three most common network interface
connections are Ethernet cards, LocalTalk
connectors, and Token Ring cards.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

5. Network Operating System (NOS)


is the software that runs on a server and
enables the server to manage data, users,
groups, security, applications, and other
networking functions.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

5. Network Operating System (NOS)


The network operating system is designed
to allow shared file and printer access
among multiple computers in a network,
typically a local area network (LAN), a
private network or to other networks.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

5. Network Operating System (NOS)


The most popular network operating systems
are :
Microsoft

Windows Server 2003,


Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, and
Novell NetWare.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

6. Node
A client, server, or other device that can
communicate over a network and that is
identified by a unique number, known as its
network addressers.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

7. Connectivity device
A specialized device that allows multiple
networks or multiple parts of one network to
connect and exchange data.
A client/server network can operate without
connectivity devices.
However, medium- and large-sized LANs
use them to extend the network and to
connect with WANs.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

8. Segment
A network segment is a part of a computer
network.
The nature and extent of a segment depends
on the nature of the network and the device or
devices used to interconnect end stations.
Device including routers, switches, hubs,
bridges, or multi-homed gateways

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

9. Backbone
The part of a network to which segments and
significant shared devices such as routers,
switches, and servers.
A backbone is sometimes referred to as "a
network of networks," because of its role in
interconnecting smaller parts of a LAN or
WAN.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

10. Topology
The physical layout of a computer network.
Topologies vary according to the needs of the
organization and available hardware and
expertise.
Networks can be arranged in a ring, bus, or
star formation, and the star formation is the
most common.

INTRODUCTION TO NETWORKING
CLIENT/SERVER

NETWORK ELEMENT

11. Transmission media


The means through which data is transmitted
and received.
Transmission media may be physical, such as
wire or cable, or atmospheric (wireless), such
as radio waves.

INTRODUCTION TO NETWORKING
CATEGORIES

OF NETWORK

WIDE AREA
group
of computers
that share a common
a Alarger
network
than LAN
NETWORK
the
largest
network
connection

high speed
connects
computer
usersininthe
a particular
in a small
area or even
same
geographic
area
or
region.
building
very expensive to setup

METROPOLITAN
AREA NETWORK

an office or home network


smaller than a WAN.

connected by Ethernet cables

LOCAL AREA
NETWORK

have high Speed connections.

INTRODUCTION TO NETWORKING
LOCAL

AREA NETWORK (LAN)

Connect devices in a building

INTRODUCTION TO NETWORKING
LOCAL

AREA NETWORK (LAN)

the computers are relatively close together.


can be constructed only with two computers and
one printer only, or can be extended in one
building to include audio and video peripherals.
LAN size is limited to a distance of several
kilometers
LANs would be within the same office, a single
building, or several buildings close together.
Common LAN topologies are bus, star and ring.
LAN has a data rate of 4 Mbps to 100 Mbps.

INTRODUCTION TO NETWORKING
METROPOLITAN

AREA NETWORK (MAN)

Connecting device between several buildings or area (city).

INTRODUCTION TO NETWORKING
METROPOLITAN

AREA NETWORK (MAN)

is a network that interconnects users with


computer resources in a geographic area or
region LARGER than that covered by even a
large LAN but SMALLER than the area
covered by a WAN

INTRODUCTION TO NETWORKING
WIDE

AREA NETWORK (WAN)

Can send data, audio and video at long distances around the world.

INTRODUCTION TO NETWORKING
WIDE

AREA NETWORK (WAN)

A computer network that spans a relatively


large geographical area.
Computers connected to a WAN are often
connected through public networks, such as
the telephone system.
They can also be connected through leased
lines or satellites.
The largest WAN in existence is the Internet.

INTRODUCTION TO NETWORKING
INTERNET

is a global network
that links computer
networks around the
world

Internet is from
Internetworking
word, that meaning
of communication
between networks.

a network of
network.

INTRODUCTION TO NETWORKING
INTRANET

A contained collection of computers and


networks within an organizations
connecting the organization's members
and/or employees to a range of computer
services, resources, and information.
firewall is used to separate the Intranet from
the Internet and to get permission to access
the source.

INTRODUCTION TO NETWORKING
INTERNET

VS INTRANET

INTRODUCTION TO NETWORKING
NETWORK

Defines

TOPOLOGY

the way in which computers, printers, and other


devices are connected.
the layout of the wire and devices as well as the
paths used by data transmissions.

INTRODUCTION TO NETWORKING
BUS

TOPOLOGY

Commonly referred to as a
linear bus, all the devices on a
bus topology are connected by
one single cable.

INTRODUCTION TO NETWORKING
BUS

TOPOLOGY

Bus is a passive network.


messages are usually broadcasted to every
computer
Computers in a network bus lines just listen in
to find out whether there is data that is sent.
This computer does not respond to send data to
the computer next to it.
If the computer fails, it does not give effect to
the entire network.

INTRODUCTION TO NETWORKING
BUS

TOPOLOGY
Advantages

Disadvantages

Quick, reliable in building a small


network, easy to use and
understand

make a lot of network traffic is extremely


slow bus. Because any computer can
send signals at any time, these interfere
with each other

cable to connect your computer


does not need much, so prices are
cheap

Each barrel connector will weaken the


signal, if too many connections can result
in signal is not received correctly

Easy to expand the bus. Two cables difficult to be recovered


can be connected to become
longer with BNC barrel

INTRODUCTION TO NETWORKING
STAR

TOPOLOGY

The star topology is the


most commonly used
architecture in Ethernet
LANs.
It connecting all the cables
from the computer to a
central location, where
everything will be
connected to a device
known as a hub

INTRODUCTION TO NETWORKING
STAR

TOPOLOGY

Each computer in a star


topology communicate with the
central hub that sends the
message to the all computers
(in a star network broadcast) or
only to a certain destination
computer

INTRODUCTION TO NETWORKING
STAR

TOPOLOGY
Advantages

disadvantages

Easier to update and add computers in the


stars without disrupting network

If the central hub fails, the network


fails

Repairs of the network easily done in the


center of the stars

Requires device in the center of stars


for rebroadcast, or convert (switch)
network traffic

A damaged computer does not necessarily


affect the network

higher price because of all the cables


must be pulled from the center

Can use several types of cables within the


same network, with a hub that can accept
different types of cables

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

circuit arrangement in which


each network device is attached
along the same signal path to
other devices, forming a path in
the shape of a ring.
Each device in the network
(node) handles every message
that flows through the ring.

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

Each node in the ring has a unique


address.
Since in a ring topology there is only
one pathway between any two nodes,
ring networks are generally disrupted
by the failure of a single link.
Similarly in the Ring topology
message can travel in only one
direction i.e clockwise or
anticlockwise.

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

The redundant topologies are used


to eliminate network downtime
caused by a single point of failure.
It is used to produce highperformance network: the network
require special bandwidth for the
features such as video and audio,
or high performance is required
when many users access the
network

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

Each computer receives the signal from the


computer next to it and send these signals to
the next computer
Since each computer send the signal it
receives, then the ring topology is an active
network.
No terminator is required because there is no
end in this topology

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

Since the data is transferred as a sequence


of the same route the possibility of the
occurrence of data collisions do not occur
Maintenance work for this system is
somewhat similar to the star topology.

INTRODUCTION TO NETWORKING
RING

TOPOLOGY

Each node can be connected to the network


and can also be removed at any time without
affecting the whole system directly.
But one problem is if a node fails, the whole
network system is likely to be affected.

INTRODUCTION TO NETWORKING
RING

TOPOLOGY
Advantages

disadvantages

As each computer is given the


same to achieve the token,
not a single computer can be
a monopoly network

The failure of a computer will cause


a network failure

not easy to repair if damaged


Increase or decrease the computer
will disrupt the network

INTRODUCTION TO NETWORKING
MESH/HYBRID

TOPOLOGY

there is only one possible path


from one node to another node.
If any cable in that path is
broken, the nodes cannot
communicate.

INTRODUCTION TO NETWORKING
MESH/HYBRID

TOPOLOGY

Advantages

disadvantages

As each computer is given the


same to achieve the token,
not a single computer can be
a monopoly network

Durable, eg failure media is not


disrupt the network when compared
with other topologies

It is easy to be recovered

INTRODUCTION TO NETWORKING

NETWORK STANDARD

There are several organizations in the United


States and Europe that produces standards for
data communications and computer networks.
The role of these organizations are only
suggested standards.

INTRODUCTION TO NETWORKING
NETWORK STANDARD
The organizations are:
a. American National Standards Institute(ANSI)
b. Electronic Industries Alliance (EIA) and
Telecommunications Industry Association (TIA)
c. Institute of Electrical and Electronic Engineers (IEEE)
d. International Organization for Standardization
(ISO)
e. International Telecommunication Union (ITU)
f. Internet Society (ISOC)
g. Internet Assigned Numbers Authority (IANA) and Internet
Corporation for Assigned Names and Numbers (ICANN)

INTRODUCTION TO NETWORKING
NETWORK STANDARD
a. American National Standard Institute (ANSI)
is a private organization that coordinates all
standards organizations in the United States.
ANSI standards are among the organizations
involved in COMPUTER AND DATA
COMMUNICATIONS

INTRODUCTION TO NETWORKING
NETWORK STANDARD
b. Electronics Industries Association (EIA)
is an organization representing many of
expenditures in the ELECTRONICS INDUSTRY.
Duties and responsibilities of EIA is more
focused on ELECTRICAL STANDARD
includingEIA-232-D and EIA-499: important
interface in the delivery / receipt of information

INTRODUCTION TO NETWORKING
NETWORK STANDARD
c. Institute of Electrical and Electronic Engineers
(IEEE)
is a professional organization will issue a
standard in their respective fields and this
standard will be adopted by consumers.
In the computer world, better known in the
developing IEEE standard Local Area Network
(LAN) which is designated as IEEE 802.

INTRODUCTION TO NETWORKING
NETWORK STANDARD
d. Internatinal Standards Organization (ISO)
is a voluntary organization with membership
from several countries.
ISO to work with other organizations such as
CCITT and ANSI standards to create some
standards such as HDLC (High-level data link
control)

INTRODUCTION TO NETWORKING
NETWORK

STANDARD

e. Internatinal Telecommunication Union (ITU)


an intergovernmental organization through
which public and private organizations develop
telecommunications.
The ITU was founded in 1865 and became a
United Nations agency in 1947.

INTRODUCTION TO NETWORKING
NETWORK

STANDARD

e. Internatinal Telecommunication Union (ITU)


It is responsible for adopting international
treaties, regulations and standards governing
telecommunications.
The standardization functions were formerly
performed by a group within the ITU called
CCITT, but after a 1992 reorganization the
CCITT no longer exists as a separate entity.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
SOURCE

CHANNEL

DESTINATIONS

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
SOURCE

CHANNEL

DESTINATIONS

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

SOURCE

the media that provides the


pathway over which the message
can travel from source to
destination.

CHANNEL

Message sources are people


or electronic devices, that
need to send a message to
other individuals or devices.

DESTINATIONS
The receiver of the
message

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
Most networks has one feature in common:
Transmitting

information by breaking the original


information into a set of message (packets)
Transmitting packets sequentially
Reassembling packet back into original
information

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
In order to make sure the original message
get transmitted correctly , computer networks
used a set of rules:
Establish

a link
Issue a command and command qualifier
Acknowledgement of command
Dissection message
Error detection and correction
Termination of transmission

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Establish a Link

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Establish a Link

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
Establish a Link
Each

packet is a string of bits and have to travel


along way over a bunch of different network
Typically lots of computer sending and receiving
information over the same network
The information getting sent can often get altered
during transmission

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Issues a command and Command Qualifier


The SET NETWORK command allows to control
information about network services on an Open system.
Each structure defines a particular network service and
contains the following information:

Product

name
Manufacturer
Type of network
Node name
Address(es)
Interface(s) (OpenVMS device driver)

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Issues a command and Command Qualifier


Vendor-specific

data

Status
Connections
Counters

Start

command
Stop command
Path to the Point-to-Point Protocol utility (PPPD)
shareable image

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Acknowledgement of Command

Router receiving
packets from DTE A
destined for DTE B

Without acknowledgment
the router forwards packets to the X.25 network and then
forwards acknowledgments from the network back to DTE A.

With acknowledgment
the router can acknowledge packets received from DTE A before it has received
acknowledgments from the network for the forwarded packets.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Acknowledgement of Command
Acknowledgment is transmitted between local
hops much faster and more efficiently than
between end-to-end hops.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Dissection Message
Proxies are good firewalls because the entire
packet is dissected and each section can be
examined for invalid data at each layer of the
OSI model.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Dissection Message
a proxy can examine a packet for information
contained in everything from the packet header
to the contents of the message.
Attachments can also be checked for viruses.
Messages can be searched for keywords that
might indicate the source of a packet.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Error Detection and Correction

Data can be corrupted during transmission.

ERROR = Data Send Data Received

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Error Detection and Correction

2 types of ERROR

Single bit Error


In a single-bit error, only 1 bit in the data unit has changed.

Burst Error
A burst error means that 2 or more bits in the data unit have
changed.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Error Detection and Correction

INTRODUCTION TO NETWORKING
PARITY

CHECK - ODD PARITY

Parity bit will be in charge to make sure Total


bit 1 for bits words must be ODD
EVEN
PARITY Bit

1 +1 =2 +1=3
ODD

LSB

0 0 1 0 0 0 0 1 0 0 1

8 bits words

MSB

INTRODUCTION TO NETWORKING
PARITY

CHECK - EVEN PARITY

Parity bit will be in charge to make sure Total


bit 1 for bits words must be EVEN
EVEN
PARITY Bit

1 +1 =2 +0=2
EVEN

LSB

0 0 0 0 0 0 0 1 0 0 1

8 bits words

MSB

INTRODUCTION TO NETWORKING
CYCLIC

REDUNDANCY CHECK

Method
Need

used to detect and correct error

to send extra bits with data


Redundancy bits are added by sender and removed
by the receiver
Allows the receiver to detect or correct corrupted bits

INTRODUCTION TO NETWORKING

CYCLIC REDUNDANCY CHECK


Sender

Receiver

INTRODUCTION TO NETWORKING
CHECKSUM
Sender
Bin
0111

Receiver
Dec

Dec

1011

Bin
0000
1011

11

11

1010

1010
12

12

0000

0000
0

0110

0110
6

0000

1001
Sum
Wrapped Sum
Checksum

0
36
6
9

10 0100
10

36

0110
1001

6
9

7,11,12,0,6,9
Sum
Wrapped Sum
Checksum

10 1101
10
1111
0000

9
45
15
0

45
15
0

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING
Error Detection VS Error Correction

Detecting Error
Looking only to see if any error occurred.

Correcting Error
More difficult because need to know the exact number of
bits are corrupted and more importantly the location of
the message
Number of error and size of message are also important
factors

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Termination

of Transmission

each side of the connection terminating


independently.
When an endpoint wishes to stop its
half of the connection, it transmits a
FIN packet, which the other end
acknowledges with an ACK.
Therefore, a typical tear-down requires
a pair of FIN and ACK segments from
each TCP endpoint.

INTRODUCTION TO NETWORKING
PRINCIPLES

OF COMMUNICATION
NETWORKING

Termination

of Transmission

After both FIN/ACK exchanges are


concluded, the terminating side waits for a
timeout before finally closing the
connection, during which time the local
port is unavailable for new connections;
this prevents confusion due to delayed
packets being delivered during
subsequent connections.

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Encoding

Messages sent
across the network
are first converted
into bits by the
sending host.

The destination host receives and


decodes the signals in order to
interpret the message.

Each bit is encoded into a pattern of light waves


or electrical impulses depending on the network
media over which the bits are transmitted.

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Encapsulation

Messages are encapsulated before being sent to the


appropriate location

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Formatting
On

a network messages are formatted into frames

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Formatting

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Size
Messages

have size restrictions depending on the


channel used
Messages must be of a particular size
Ethernet message sizes are limited to 46-1500
bytes

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Timing
the

amount of time from the beginning until the


end of a message transmission.

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

Message Timing

IN COMMUNICATION
End of
Msg

Tx Msg

Rx ready
to listen
for ACK

Start
Tx Msg

Start listening
Rx Msg

Min time to
wait Rx Msg

Rx Msg

Start
ACK

Time
wait to
Tx ACK

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Timing

Access method
Determines when a message can be sent to avoid
collisions
Flow control
Determines how much information can be sent at any
given time
Response timeout
Determines what action to take if there is no response in a
reasonable time period

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

Message Timing

IN COMMUNICATION

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

Message

IN COMMUNICATION

Timing

The

packet transmission time in seconds can be


obtained from the packet size in bit and the bit rate
in bit/s as:

Packet transmission time = Packet size


Bit rate

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

Message

IN COMMUNICATION

Timing

Example:

Assuming 100 Mbit/s Ethernet and the maximum


packet size of 1526 bytes. Calculate the results in
Maximum packet transmission time?

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Timing
Example:

Max packet transmission = Packet size


Bit rate
= 1526*8 bit
(1 Mbit/s)
122 s

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

Message Patterns
a

network-oriented architectural pattern


describes how two different parts of a message
passing system connect and communicate with
each other.

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

Message Patterns

IN COMMUNICATION

INTRODUCTION TO NETWORKING
TERMINOLOGIES

NETWORKING

IN COMMUNICATION

My friend at Putrajaya want to send me a files


using my PKB e-mail. After sending the email
she identify that the files that she has attached
cannot get through the PKB server. In a given
scenario, identify which terminologies can be
relate to this communication problem in
networking .

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

Networking equipment typically


refers to devices facilitating the
use of a computer network.
includes gateways, routers,
bridges, switches, hubs, and
repeaters.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

A network interface controller


/network interface card is a
computer hardware
component that connects a
computer to a computer
network.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

NIC
NIC

provides the hardware interface between a


computer and a network.
A NIC technically is network adapter hardware in
the form factor of an add-in card

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

Various types of NIC


PCI

NIC
PCI Express NIC
PCMCIA
On Board NIC
Wireless NIC

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

PCI NIC
Peripheral

Component Interconnect is an industry


specification for connecting hardware devices to a
computer's central processor.
Both Ethernet and Wi-Fi network adapters for
desktop and notebook computers commonly utilize
PCI.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

PCI NIC
PCI

defines the electrical characteristics and signal


protocol used for two devices to communicate over
a computer's central bus.
PCI network adapters and other devices exist in
several different shapes and sizes

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

PCI Express NIC


It

is used to connect Fast Ethernet Networks


together and it is connected to a PCI Slot located on
your computer's Motherboard

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

PCMCIA/PC card
Personal

Computer Memory Card International


Association is an industry organization best know
for developing a standard network adapter using
the PC Card form factor.
PC Card form factor was designed for thinness, and
PCMCIA is therefore especially used mostly in
removable peripherals that connect to a laptop.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

On Board NIC
A

LAN connection or network connection

In

a desktop, NIC's, video cards, sound cards and such


can be inserted into physical slots on the motherboard
but in a laptop there is no room for such a configuration.
All of these things are built right in to the motherboard.
Some desktops integrate these things as well but still
maintain the slots as described above. So, an "onboard"
or integrated NIC card would not be plugged into one of
these slots.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

Wireless NIC
WNIC

is a network interface controller which


connects to a radio-based computer network rather
than a wire-based network
A WNIC is an essential component for wireless
desktop computer.
this card uses an antenna to communicate through
microwaves.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

HUB/SWITCH

A HUB is a device
that provides a
central connection
point for cables from
workstations, servers
and peripherals.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

HUB/SWITCH

multi slot
concentrators which
can plugged a number
of multi-port cards to
provide additional
access as the network
grows in size.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

HUB/SWITCH
2 Types of HUB

1.

PASSIVE concentrators/hub

2.

No voltage supply
allow the signal to pass from one computer to
another without amplify the signal.

ACTIVE concentrators/hub

Need voltage supply to electrically amplify the signal


as it moves from one device to another
Act like repeaters that can extend the length of a
network.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

REPEATERS

an electronic device that


receives a signal, cleans it of
unnecessary noise,
regenerates and retransmits it
can be separate devices or
they can be incorporated into a
concentrator/hub.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

REPEATERS

it is necessary to
regenerates the signal

The repeater electrically


amplifies the signal it
receives and rebroadcasts it
at a higher power level

a signal loses strength as


it passes along a long
distance cable
signal

the signal can cover


longer distances without
degradation
signal

Long Distance Cable

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

2nd Network

BRIDGE

a device to allows segment of a large


network into two smaller to reduce the
amount of traffic on a networks and
make the traffic more efficient.
1st Network

BRIDGE

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE

BRIDGE also can filters data


traffic at a network boundary.

1st Network

2nd Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE
can connect the 2 network.

adding

new wiring scheme into an older wiring


scheme or
To up-date the network
BRIDGE

Network

New Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE

MONITORS the information traffic on both sides of the network so that it


can pass packets of information to the correct location.

1st Network

2nd Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE

LISTEN" to the network and automatically figure out the address of each
computer on both sides of the bridge.

1st Network
2nd Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE

INSPECT each message and broadcast it on the other side of the network.

1st Network
2nd Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

BRIDGE

MANAGE the traffic to maintain optimum performance on both sides of the network (like
a traffic cop at a busy intersection during rush hour.

1st Network

2nd Network

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

ROUTER

A ROUTER translates information from one network


to another
it is similar to a super
intelligent bridge.
A ROUTER select the best path to route a message,
based on the destination address and origin.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

ROUTER

The ROUTER can direct traffic to prevent


head-on collisions or traffic
It is smart enough to know when to direct
traffic along back roads and shortcuts.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

GATEWAY

is a network point that acts as an entrance to


another network.
an internetworking system capable of joining
together two networks that use different base
protocols.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

GATEWAY

The computers that


control traffic within a
company's network or at
a local Internet service
provider (ISP) are gateway
nodes.

INTRODUCTION TO NETWORKING
FUNCTION

OF NETWORING HARDWARE

GATEWAY

In PKBs, a computer server acting as a gateway


node and it also acting as a proxy server and a
firewall server.
A gateway is often associated with both a router,
which knows where to direct a given packet of
data that arrives at the gateway, and a switch,
which furnishes the actual path in and out of the
gateway for a given packet.

INTRODUCTION TO NETWORKING
REFLECTION

Tell the class, what is the function of


computer network hardware?
Name 2 out of 5 of the computer network
hardware that u remember.
Identify which computer network hardware
can select the best path to bring a message,
based on the destination address and origin.

INTRODUCTION TO NETWORKING
ACTIVITIES

Sketch a simple peer to peer computer


network at your house to show connection
between 4 individual user playing and
sharing web game.

INTRODUCTION TO NETWORKING
ACTIVITIES

Construct a diagram of the local area


network in JKEs Multimedia Computer Lab
which include 40 connected PCs and 1
shared printer. The lab have 10 Ethernet
jack. Add any network hardware to apply to
the connection.

INTRODUCTION TO NETWORKING
ACTIVITIES

The network in JKEs Office includes 44


connected PCs, 2 shared printers and 4
telephones with their own Ethernet jack. If
there are 2 more PCs and 1 wireless router
need to be add in the office but with no more
Ethernet jack available. Design the
connection to show the new JKEs office
network. Add any network hardware to apply
to the connection.

NEXT : TOPIC 2
THE OPEN SYSTEM
INTERCONNECTION (OSI)
MODEL AND NETWORK
PROTOCOL

S-ar putea să vă placă și