Sunteți pe pagina 1din 95

Networking and the

Internet
Network Definition
• A network is a set of devices (often referred to as nodes) connected by
communication links. A node can be a computer, printer, or any other device
capable of sending and/or receiving data generated by other nodes on the
network.

2
What is network?
• A network can be anything from a simple collection of
computers at one location that have been tied
together.
• Using a particular connectivity medium (such as
network cabling or wireless technology) to a giant
global network.
• The network can then be used to transmit data, voice,
and even video between users on the network.
Networking Social Issues
➢publicizing private instant messages, text
messages or e-mails.
➢posting threatening messages.
➢posting photos that will cause
embarrassment and spreading rumors.
➢Spreading Viruses, worms and Malicious
code.
➢Hacking.

What else ?
The Internet
• The Internet: An internet that spans the world
• Original goal was to develop a means of connecting
networks that would not be disrupted by local
disasters
• Today a commercial undertaking that links a
worldwide combination of PANs, LANs, MANs, and
WANs involving millions of computers
What is an IP Address?
• An IP address is a unique global address for a network interface
• Exceptions:
• Dynamically assigned IP addresses (DHCP)
• IP addresses in private networks .

• An IPv4 address:
- is a 32 bit long identifier
- encodes a network number (network prefix)
and a host number
Octets
• The dotted-decimal IP address 192.168.123.132 is (in binary
notation) the 32 bit number.
11000000101010000111101110000100

• This number may be hard to make sense of, so divide it into four
parts of eight binary digits.
11000000.10101000.01111011.10000100
• These eight bit sections are known as octets.
Dotted Decimal Notation
• IP addresses are written in a so-called dotted decimal notation
• Each byte is identified by a decimal number in the range [0..255]:

10000000 10001111 10001001 10010000


1st Byte 2nd Byte 3rd Byte 4th Byte
= 128 = 143 = 137 = 144

128.143.137.144
Network and Host Address
• An IP address has two parts. The first part of an IP address is used as a
network address, the last part as a host address.
• If you take the example 192.168.123.132 and divide it into these two
parts you get the following:
• 192.168.123 Network .132 Host
-or-
• 192.168.123.0 - network address.
• 0.0.0.132 - host address.
Network and Host Address

192.168.123.132
0.0.0.132 Host

192.168.123.0 network

0.0.0.133 Host
Network Mask
• The network mask shows us
where to split the network
10.1.1.1
and host sections.
• Each place there is a 1 in the 00001010 00000001 00000001 00000001
network mask, that binary
digit belongs to the network

Network

Host
portion of the address.
• Each place there is a 0 in the
network mask, that binary 11111111 11111111 11111111 00000000

digit belongs to the host


portion of the address. 255.255.255.0
Alternative Terminology

10.1.1.1
• An alternative set of terminology is:
• The network portion of the address is
00001010 00000001 00000001 00000001
called the prefix.
• The host portion of the address is called

Prefix

Host
the host.
• The network mask is expressed as a prefix
length, which is a count of the number of
1’s in the subnet mask. 11111111 11111111 11111111 00000000

8 + 8 + 8 = 24

10.1.1.1/24
IPV6
• Internet Protocol version
6 (IPv6) is the latest revision of
the Internet Protocol (IP).
• IPv6 is intended to replace IPv4,
which still carries the vast
majority of Internet traffic as of
2017.
• As of February 2017, the
percentage of users reaching
Google services over IPv6
surpassed 16%. https://www.google.com/intl/en/ipv6/statistics.html
IPV6
• Pv6 uses a 128-bit address, allowing 2128, or
approximately 3.4×1038 addresses, or more than 7.9×1028 times as
many as IPv4.

• IPv6 addresses are represented as eight groups of


four hexadecimal digits separated by colons, for example.
2001:0db8:85a3:0042:1000:8a2e:0370:7334
How Data Communicate?
• Data communication is the exchange of data (in the form of 0s and
1s) between two devices via some form of transmission medium
(wire/cable or electromagnetic waves).
The effectiveness of a data communication system depends on three
fundamental characteristics:

1. Delivery: the system must deliver data to the correct destination.

2. Accuracy: the system must deliver data accurately. Data that have been
altered in transmission and left uncorrected are unusable.

3. Timeliness: the system must deliver data in a timely manner. Data


delivered late are useless.

In case of video, audio and voice data, timely delivery mean delivering data
as they are produced.
Data Communication Components

The five major components of a data communication system are a


Message, a Sender, a Receiver, a Transmission Medium and Protocol
Data Communication Components(2)
1.Message - It is the information to be communicated. Popular
forms of information include text, pictures, audio, video etc.

2.Sender - It is the device which sends the data messages. It can be


a computer, workstation, telephone handset etc.

3.Receiver - It is the device which receives the data messages. It


can be a computer, workstation, telephone handset etc.
Data Communication Components(3)
4.Transmission Medium - It is the physical path by which a message
travels from sender to receiver. Some examples include twisted-pair
wire, coaxial cable, radio waves etc.

5.Protocol - It is a set of rules that governs the data communications. It


represents an agreement between the communicating devices.
Without a protocol, two devices may be connected but not
communicating.
Networking Advantages
➢Speed: Sharing and transferring files within Networks are very rapid.
Thus saving time, while maintaining the integrity of the file.

➢Cost: Individually licensed copies of many popular software


programs can be costly.
A. Networkable versions are available at considerable savings.
B. allows for easier upgrading of the program on one single file server, instead
of upgrading individual workstations.
Networking Advantages(2)
➢Security: Sensitive files and programs on a network are passwords
protected established for specific directories to restrict access to
authorized users or might be encrypted.

➢Centralized Software Management: Software can be loaded on one


computer (the file server). eliminating that need to spend time and
energy installing updates and tracking files on independent
computers throughout the building.
Networking Advantages(3)
• Resource Sharing: Resources such as, printers, fax machines and modems can
be shared.

• Electronic Mail: E-mail aids in personal and professional communication.

• Flexible Access: Access their files from computers throughout the firm.

• Workgroup Computing: Workgroup software (such as Microsoft BackOffice)


allows many users to work on a document or project concurrently.
Disadvantages of Network
➢Server faults stop applications being available.
➢Network faults can cause loss of data.
➢Network fault could lead to loss of resources.
➢User work dependent upon network.
➢System open to hackers and resources could be located too far
from users.
➢Decisions tend to become centralized.
➢Network management can become difficult.
Network Criteria
• For an efficient and effective networking the following criteria
is most important.

➢Performance
➢Reliability
➢Security
Performance
The performance depends on many factor some are discussed below:

1- Number of Users: A large number of users on a network can slow its response
time if it is not designed for heavy traffic loads. In peak times on a certain network
can slow its performance.
2- Transmission Medium: The transmission medium used for the network also a
main factor for its performance. As data has to travel on it. It can be fiber optics for a
faster transfer of data.
Performance(2)
3- Hardware:
The hardware used in networking affect the speed and capacity of
transmission. A high computer with big storage will perform better.

4- Software:
The software used for running applications and data processing at
sender, receiver end and intermediary nodes also effects the
performance of the network.
Reliability
Reliability of a network depend on the followings:
1-Frequency of Failure:
All networks fail occasionally. But a network that fails often have little value
to a user.
2- Recovery Time:
The time taken to restore itself after the failure is recovery time. The
network quickly restores is more useful than the other takes much time.
3- Catastrophe:
The network must be protected by fire, earthquake or theft. There may be
a system for back up of network software.
Security
Network security issues include unauthorized access and viruses.

1- Unauthorized Access:
On a network there may be sensitive data, therefore it must be
protected by an unauthorized access. It may be user identification and
password or at higher level it can be encryption techniques.

2- Viruses:
As network can be accessed at many points, it may have computer
virus.
Classification of Networks
1- Classification by network geography.
2- Classification by component roles.

Network Geography Component Roles


Classification by Network Geography
• Networks are frequently classified according to the geographical
boundaries spanned by the network itself.

• PAN, LAN, MAN, and WAN are the basic types of classification, of
which LAN and WAN are frequently used.
Classification by Network Geography
Personal Area Network (PAN)
The interconnection of devices within the range of an individual
person, typically within a range of 10 meters.
Classification by Network Geography

Local area network (LAN):


➢ Is a computer network that interconnects computers within a
limited area such as a residence, school, laboratory, or office
building.

➢LANs are inexpensive to install and also provide higher speeds.


Classification by Network Geography

Local area network


Classification by Network Geography
Metropolitan area network (MAN):
➢Is the interconnection of networks in a city in a single larger network. It is
larger than large local area network (LAN) but smaller than wide area network
(WAN).

➢The cost of installation and operation is higher.

➢MANs use high-speed connections such as fiber optics to achieve higher


speeds.
Classification by Network Geography

Metropolitan area network


Classification by Network Geography
Wide area network (WAN):
➢ is a telecommunications network or computer network that
extends over a large geographical distance..
➢These use long distance telecommunication networks for
connection, thus increasing the cost.
➢The Internet is a good example of a WAN.
Classification by Network Geography

Wide area network


Classification by Component Roles
Networks can also be classified according to the roles that the
networked computers play in the network’s operation.

➢Peer-to-peer and server-based are the types of roles into which


networks are classified.
Classification by Component Roles
Peer-to-peer: It is a network of computers configured to allow certain files, folders or
service to be shared with everyone or with selected users.

➢all computers are considered equal.


➢Each computer controls its own information and is capable of
functioning as either a client or a server depending upon the
requirement.
➢inexpensive and easy to install.
➢use at home or in small companies.
Classification by Component Roles

Peer-to-peer network
Classification by Component Roles
Server-based Network: Is a computer network in which one
centralized, powerful computer (called the server) is a hub to which
many less powerful personal computers (called clients) are
connected.
The clients run programs and access data that are stored on the server.
Classification by Component Roles
Server-based (continued):
➢These servers can also control the network’s security from one
centralized location or share it with other specially configured
servers.

Server-based network
Network Topology
➢A topology is a usually schematic description of the arrangement of a
network, including its nodes and connecting lines.
• Five basic types of network topologies.
• Bus, Star, Mesh, Ring AND Tree
Mesh Topology
✓Dedicated point-to-point links to every other device.

✓Number of link (physical channel)=n(n-1)/2 to link n devices.

✓Number of input/output (I/O) ports per device =n-1

✓The mesh network topology employs either of two schemes,


called full mesh and partial mesh.
Full Mesh Topology
In the full mesh topology, each workstation is connected directly to each of the others.
Star Topology
• In the star network topology, there is a central computer or server to
which all the workstations are directly connected. Every workstation
is indirectly connected to every other through the central computer.
Bus Topology
In the bus network topology, every workstation is connected to a main
cable called the bus. Therefore, each workstation is directly connected
to every other workstation in the network.
Bus Topology(2)
➢A Bus topology, is a multipoint configuration.

➢One long cable acts as a backbone to link all the devices in the
network.

➢Nodes are connected to the Bus cable by drop and taps.


➢A drop line is a connection running between the device and the main
cable.
➢A tap is a connector that either splices into main cable or punctures the
sheathing of a cable to create a contact with the metallic core.
Bus Topology(3)

Tabs
Tree Topology
• The tree network topology uses two or more star networks connected
together.
• The central computers of the star networks are connected to a main
bus. Thus, a tree network is a bus network of star networks.
Ring Topology
• In the ring network topology, the workstations are connected in a closed loop
configuration.
• Adjacent pairs of workstations are directly connected.
• Other pairs of workstations are indirectly connected, the data passing through
one or more intermediate nodes.
Hybrid Topology
➢Often a network combines several topologies as sub-networks linked
together in a larger topology.
➢For instance, one department of a business may have decided to use a bus
topology while another department has a ring. The two can be connected to each
other via central controller in a star topology.

Hybrid Topology
Connecting Networks
• Repeater: Extends a network
• Hub : used to create a link between different stations on a network.
• Bridge: Connects two compatible networks
• Switch: Connects several compatible networks
• Router: Connects two incompatible networks
resulting in a network of networks called an internet
Repeaters
• Is a hardware device that regenerates the received bit patterns before sending
them out.
• Work against attenuation by repeating signals that they receive on a network,
Typically cleaning and regenerating the digital transmission in the process
Repeaters (continued)
Hubs (multi-port repeaters)
• Generic connection device used to tie several networking cables
together to create a link between different stations on a network.
• Active hubs
• Amplify or repeat signals that pass through them
• Passive hub
• Merely connects cables on a network and provides no signal regeneration
Hubs (continued)
Hub Advantages & Disadvantages
• Advantages
• Can extend a network’s total distance
• Do not seriously affect network performance
• Certain repeaters can connect networks using different physical media.
• Disadvantages
• Cannot connect different network architectures, such as Token Ring and
Ethernet
• Do not reduce network traffic
• They repeat everything they receive
• Do not reformat data structures
• Cannot connect networks that require different types of frames
Bridges
• Connect two different network (segment).
Transparent Bridges
• Also called learning bridges
• Because they build a table of MAC addresses as they receive frames
• They “learn” which addresses are on which segments
• The bridge uses the source MAC addresses to determine which
addresses are on which segments
• By determining a frame’s origin, the bridge knows where to send frames
in the future
• Ethernet networks mainly use transparent bridges
Source-Routing Bridges
• Rely on the source of the frame transmission to provide the routing information.
• The source computer determines the best path by sending out
explorer frames.

• Host X sends an explorer frame


for every possible routing path.
• When Host X's explorer frames
reach Host Y, Host Y replies to
each explorer frames
individually.
• Host X chooses a path based on
some predetermined criteria.
Advantages of Bridges
• Can extend a network by acting as a repeater.
• Can reduce network traffic on a segment by subdividing network
communications.
• Reduce collisions
• Some bridges connect networks using different media types and
architectures
Disadvantages of Bridges
• Slower than repeaters and hubs
• Extra processing by viewing MAC addresses
• Forward broadcast frames indiscriminately, so they do not filter
broadcast traffic
• More expensive than repeaters and hubs
Switches
• Increase network performance by reducing the number of frames
transmitted to the rest of the network
• Switch opens a virtual circuit between the source and the
destination
• Prevents communications between just two computers from being
broadcast to every computer on the network or segment.
Advantages of Switches
• increase available network bandwidth.
• reduce the workload on individual computers.
• increase network performance
• Networks that include switches experience fewer frame
collisions.
Disadvantages of Switches
• Switches are significantly more expensive than bridges.
• Network connectivity problems can be difficult to trace
through a switch.
• Broadcast traffic may be troublesome.
Routers
• Provide filtering and network traffic control on LANs and
WANs
• Can connect multiple segments and multiple networks
• Internetworks
• Networks connected by multiple routers
• Similar to switches and bridges in that they segment a
network and filter traffic
• Routers use the logical address
Physical vs. Logical Addresses
• MAC address
• Found at the Data Link layer of the OSI model
• Used by bridges and switches to make forwarding decisions within a
network or subnetwork
• IP address
• Logical address when TCP/IP is used on an internetwork
• Routers use the IP address to route packets to the correct
network segment
Physical vs. Logical Addresses (continued)
Router connecting network to the Internet
Advantages of Routers
• Can connect different network architectures, such as
Ethernet and Token Ring
• Can choose the best path across an internetwork using
dynamic routing techniques
• Reduce network traffic by creating collision domains
• Reduce network traffic by creating broadcast domains
Disadvantages of Routers
• Routers are more expensive than other devices
• Dynamic router communications (inter-router
communication) cause additional network overhead, which
results in less bandwidth for user data
• Routers are slower than other devices because they must
analyze a data transmission from the Physical through the
Network layer
Building a large bus network from smaller ones
Routers connecting two WiFi networks and
an Ethernet network to form an internet
Wireless Access Points
• Wireless access points
• Provide cell-based areas where wireless clients such as laptops and Smart
Phones can connect to the network
• In most respects, a wireless access point functions exactly like a hub.
Wireless Standards and Organizations
Wireless Network Modes
• In ad hoc mode
• Wireless clients can connect and communicate directly
with each other
• There is no access point
• In infrastructure mode
• Wireless clients attach wirelessly to an access point
• Involves the access point wired back into a switch
Wireless Network Modes(continued)
Basic Service Set (BSS)
• When a single access point is available in
infrastructure mode
Extended Service Set (ESS)
• Involve multiple access points connected to various
switches in the network
• Allows users to roam around the building and remain
connected to the WLAN as well as the LAN and WAN
Wireless Connectivity
• Access points typically broadcast their network name
• The Service Set Identifier (SSID)
• The network name
• When wireless clients are powered on, they begin scanning the
airspace for available access points
• They detect the broadcasted SSID of the various access points in the
area
• Attempt to associate with the one that has the highest signal level and the
lowest error rate
Wireless Connectivity (continued)

• If the system is open, the client is accepted by the access


point and begins communications
• When SSID is not broadcasted
• Wireless clients must already be configured with the correct
SSID
• The client will send out a probe request with:
• Configured SSID
• Access point with that SSID configured will allow the client to
associate
Protocols
• CSMA/CD stand for Carrier Sense, Multiple Access with
Collision Detection
• Used in Ethernet
• This protocol dictates that each message be broadcast to all the
machines on the bus.
• Each machine monitors all the messages but keeps only those
addressed to itself. To transmit a message, a machine waits until
the bus is silent, and at this time it begins transmitting.
Protocols
• CSMA/CA stand for Carrier Sense, Multiple Access with Collision
Avoidance.
• Used in WiFi
• Hidden terminal problem.
• wireless networks adopt the policy of trying to avoid collisions rather than
trying to detect them.
• some WiFi networks require that each machine send a short “request” message to the
AP and wait until the AP acknowledges that request before transmitting an entire
message.
• If the AP is busy because it is dealing with a “hidden terminal,” it will ignore the request,
and the requesting machine will know to wait. Otherwise, the AP will acknowledge the
request, and the machine will know that it is safe to transmit.
• Many of which are standardized by IEEE “Institute of Electrical and
Electronics Engineers”.
The hidden terminal problem
Distributed Systems
• Systems with parts that run on different computers
• Cluster computing
• describes a distributed system in which many independent computers work closely
together to provide computation or services comparable to a much larger machine.
• The cost of these individual machines, plus the high-speed network to connect them,
can be less than a higher-priced supercomputer, but with higher reliability and lower
maintenance costs.
• Cloud computing
• ICloud
• Dropbox
• Google Drive
World Wide Web
• Hypertext combines internet technology with concept of
linked-documents
• Embeds hyperlinks to other documents
• Browsers present materials to the user
• Webservers provide access to documents
• Documents are identified by URLs and transferred using
HTTP
Figure 4.8 A typical URL
Hypertext Markup Language (HTML)
• Encoded as text file
• Contains tags to communicate with browser
• Appearance
• <h1> to start a level one heading
• <p> to start a new paragraph
• Links to other documents and content
• <a href = . . . >
• Insert images
• <img src = . . . >
A simple webpage
A simple webpage (continued)
An enhanced simple webpage
An enhanced simple Web page (continued)
Extensible Markup Language (XML)
• XML: A language for constructing markup languages similar to
HTML
• A descendant of SGML
• Opens door to a World Wide Semantic Web
<staff clef = “treble”>
<key>C minor</key>
<time> 2/4 </time>
<measure>
< rest> egth </rest>
<notes> egth G, egth G, egth G </notes>
</measure>
<measure>
<notes> hlf E </notes>
</measure>
</staff>
Client Side Versus Server Side
• Client-side activities
• HTML
• Javascript
• Macromedia Flash
• Server-side activities
• Servlets
• JavaServer Pages (JSP) / Active Server Pages (ASP)
• PHP
References
• CCNA Guide to Cisco Networking 4th Ed by Kelly Cannon, Kelly
Caudle & Anthony Chiarella.

• Network Fundamentals CCNA Exploration Companion Guide by Mark


A. Dye, Rick McDonald & Antoon W. Rufi pp 44-50.

S-ar putea să vă placă și