0 evaluări0% au considerat acest document util (0 voturi)
30 vizualizări113 pagini
This document provides an overview of computer networking fundamentals and concepts. It discusses how computer networks transmit information between computers and people. The key points covered include:
- Reasons for using computer networks like communicating, sharing information and resources.
- Types of networks that provide different services like making phone calls, watching TV, and playing online games.
- Networking devices like routers, switches, hubs, and network interface cards that allow devices to connect and transmit data.
- Network topologies like star, bus, ring and hybrid topologies used in different network setups.
- Logical network topologies like peer-to-peer and client-server models.
Descriere originală:
Networking Fundamentals
Titlu original
Presentation_NetworkingTechnologies-Fundamentals n Concepts for BSIT-CT2_2014
This document provides an overview of computer networking fundamentals and concepts. It discusses how computer networks transmit information between computers and people. The key points covered include:
- Reasons for using computer networks like communicating, sharing information and resources.
- Types of networks that provide different services like making phone calls, watching TV, and playing online games.
- Networking devices like routers, switches, hubs, and network interface cards that allow devices to connect and transmit data.
- Network topologies like star, bus, ring and hybrid topologies used in different network setups.
- Logical network topologies like peer-to-peer and client-server models.
This document provides an overview of computer networking fundamentals and concepts. It discusses how computer networks transmit information between computers and people. The key points covered include:
- Reasons for using computer networks like communicating, sharing information and resources.
- Types of networks that provide different services like making phone calls, watching TV, and playing online games.
- Networking devices like routers, switches, hubs, and network interface cards that allow devices to connect and transmit data.
- Network topologies like star, bus, ring and hybrid topologies used in different network setups.
- Logical network topologies like peer-to-peer and client-server models.
INTRO When people use computers to communicate, they use a computer network. This is about computer networks and how they are used to transmit information between computers and ultimately between people. It provides a broad overview and foundation for understanding networks and working in the computer and networking. Living in a network centric world Why do we need a Network? People use computers and networks for a wide variety of reasons. Three common reasons that people use networks to send information from a source, such as a personal computer (PC), to a destination, such as a printer, are: Communicate and collaborate (i.e., e-mail) Share information (i.e., document sharing) Share resources (i.e., printers and servers) 1. Increased Employee Productivity Ideas are shared more quickly. Everyone moves faster. The organization is more competitive. 2. Reduced Communication Costs Network-based communication such as e-mail and instant messenger services are a cost-effective alternatives to phoning and faxing, with the potential to deliver significant savings in long distance charges. 3. Reduced Office Equipment Costs Allows equipment mainly printers and servers, to be shared with multiple users. 4. Access to Resources Anytime/Anywhere Key files, data, and services can be accessed from any place on the network. With remote access in place, one can travel or work remotely and still be connected. There are many types of networks that provide us with different kinds of services.
make a phone call, watch a television show listen to the radio look up something on the Internet play a video game with someone in another country All of these activities depend on robust, reliable networks. Converged network
Communication Signals
Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable Modulator-Demodulator.
V.90-based 56Kbps connections typical hybrid fiber-coax cable TV network
Network Interface Cards LAN cards
A NIC (pronounced "nick") is the hardware component inserted into the PC or workstation that provides connectivity to a network. The NIC provides the interface between the physical networking cable and the software implementing the networking protocols. The NIC is responsible for transmitting and receiving information to and from a network.
Network Interface Cards
Speeds available: 10 Mbps, 10/100 Mbps, 10/100/1000 Mbps Auto sense: This is where a port that can operate at different speeds has the ability to detect the speed of another port to which it is connected; both ports will automatically configure to use the best common speed. Duplex mode: Half Duplex - The term half duplex is used to describe data transmission that can occur in two directions over the same communications link, in only one direction at a time. Full Duplex: The ability of a device or line to transmit data simultaneously in both directions over the same communications link, potentially doubling the throughput of traffic.
Network Interface Cards
All PCs require network interface cards (NIC) to make them ready for network use. Some are supplied with NICs already in them. When choosing a NIC for a PC you should consider: The speed of your hub, switch, or print server Ethernet (10Mbps) or Fast Ethernet (100Mbps). The type of connection you needRJ-45 for twisted pair or BNC for coaxial cable. The type of NIC connector available inside your ComputerISA or PCI.
Network Interface Cards
Each individual NIC throughout the world carries a unique code, called a Media Access Control (MAC) address. Not two NIC are alike. This address is used to control data communication for the host on the network. A MAC address consists of 12 hexadecimal bits. The first 6 hexadecimal represents the NIC manufacturer and the last 6 hex numbers represents the unique number of a NIC. When a NIC is attached to a computer, the host computer will use the NICs MAC address as its physical address in the network. These physical address from the NIC will be used by the computer to identify themselves in the network. Media Access Control (MAC) Addresses MACs are the 48-bit, hexadecimal hardware addresses that identify Ethernet interfaces. It is presented like so: 01:23:45:67:89:00
Network Interface Cards
Installing the NIC. Network Media Networking Cables and Connectors RJ-11: Telephone STP (Shielded Twisted Pair) cable Network Media RJ-45: CAT-5, 5e and 6
strip cable jacket arrange wire pairs AT&T 258A_EIA 568B RJ-45 Connector inserted UTP Cable and RJ-45 connector Network Media BNC: Coaxial Network Media Network Devices Basic Network Devices Hubs - Simple, Layer 1 devices that create a single broadcast domain. There are four types: Passive, Active, Intelligent and Switching
Network Devices Modems - Change digital data into analog for transmission over the line. There are three types: Traditional, DSL and Cable Modulator-Demodulator.
LAN Modems A LAN Modem is router with a built-in Ethernet hub and two 56K analog modem, allowing several workstations to share a single connection to an ISP or remote office LAN, while transferring files locally among all attached workstations. Network Devices Network Interface Cards (NIC) - Cards with which a PC connects to an Ethernet or wireless network.
Network Devices Switch - Layer 2 devices that connects and selects between network segments. Unlike hubs, switches provide packet filtering and forwarding.
Manageable Hubs and Switches
Manageable Hubs and Switches are network devices that connects computers together and form a local area network. Aside from basic connectivity, these manageable devices have many useful features that are not present in any ordinary hubs and switches. These features are: VLAN (Virtual LAN) - A logical association that allows users to communicate as if they were physically connected to a single LAN, independent of the actual physical configuration of the network. Port Security A feature that disables or enables a particular port on the switch or hub. Stackability A feature that allows switches to be connected physically by a matrix cable and be treated as a single device. Link Aggregation allows 2 4 of the switchs ports to be combined together and treated as a single pipe. switch_hub Network Devices Router - A layer 3 device that separates network segments into different broadcast domains. Routers are high-level devices that provide an enormous amount of administration and monitoring features and allow for highly complex networks. Using a router to share a broadband (cable or DSL) modem connection A Router Helps Protect Your Home Network from Outside Access Typical home network typical wireless network WRT54G2 v1 wireless adapter
Network Topologies
Star - These networks are centrally administrated and nodes can be easily connected or disconnected using network media. This is most commonly seen in 10BASE-t, 100BASE-TX or 1000BASE-T networks.
Star
Network Topologies
Network Topologies
Bus - Nodes tap into a central line. These networks are almost completely obsolete, as faults with individual nodes bring the entire network down.
Bus
Network Topologies
Network Topologies
Mesh - Expensive to implement, mesh networks are easy to maintain and extremely reliable. They also work over great distances. MESH
Network Topologies
Network Topologies
Ring - Uses expensive, proprietary technology that passes a token packet around the ring in order to cut down on network collisions.
Ring
Network Topologies
Network Topologies
Point to Point - These are simple, ad-hoc networks where one point goes to one other point. They are simple to set up and maintain, but would be expensive if they were the sole topology in a network. Point to Point
Network Topologies
Network Topologies
Point to Multipoint - This network type describes most WAN and VPN setups, like frame-relay. Theyre used to connect physically distant devices. Point to Multipoint
Network Topologies
Network Topologies
Hybrid - Most networks are actually hybrids, being composed of one or all of these various topologies. Project Network Topology and Physical Layout Design: NETWORK TOPOLOGY DESIGN (using packet tracer simulation ) - employ segmenting the whole campus network into several number of nodes using routers to boost network performance and increases the bandwidth available to each user for network and internet connection.
Logical Network Topologies
Peer to peer A peer-to-peer network topology means that each network device is a client and there is no central system. These are mainly used in home or small business networks. Shared resources require computers to be configured independently for access.
Logical Network Topologies
Client/server A number of client machines are all administered, authenticated and given access to shared resources through a central server or servers. This type of topology is much easier to maintain as users can be defined in one central location.
client-server LAN
Logical Network Topologies
VPN A VPN is a private, secure connection through the public Internet. It allows a point-to-point connection between a remote user and a LAN. The connection uses encryption and authentication.
Logical Network Topologies
VLAN VLANs (Virtual Local Area Networks) are groups of network nodes that form a single, logical broadcast domain. VLANs use a switch operating at Layer 2, but sometimes need a Layer 3 device to allow VLANs to communicate with each other. Network Technologies Network Protocols Transmission Control Protocol (TCP) - TCP is a transport layer, host-to- host, connection-oriented protocol. It enables two hosts to establish a connection and exchange network data. Network Technologies User Datagram Protocol (UDP) UDP is a transport layer, connectionless, unreliable, low overhead protocol. UDP doesnt offer the assurances of TCP.
Network Technologies File Transfer Protocol (FTP) The FTP is an Application layer protocol that allows a user to upload or download files between hosts Network Technologies Secure File Transfer Protocol (SFTP) SFTP is similar to FTP but comes with SSH to provide encryption over insecure networks such as the Internet.
Network Technologies Trivial File Transfer Protocol (TFTP) TFTP is also similar to FTP but works with UDP, using less bandwidth than FTP.
Network Technologies Email Protocols Simple Mail Transport Protocol (SMTP) is used to send e-mail. Post Office Protocol 3 (POP3) and Internet Message Access Protocol 4 (IMAP4) are used to receive emails.
Network Technologies Secure Shell (SSH) SSH is a suite of protocols that uses the RSA public-key encryption technology authentication
Internet Control Message Protocol (ICMP) ICMP is a network layer protocol providing management and control Network Technologies Address Resolution Protocol (ARP) ARP is a Network layer protocol that resolves network (IP) addresses into hardware (MAC) addresses. ARP uses the address resolution cache table built into every NIC. Network Technologies Internet Group Multicast Protocol (IGMP) IGMP is a Network layer protocol that is used by an Internet computer to report its multicast group membership to adjacent routers.
Network Technologies Telnet Telnet is a terminal emulation protocol and program that uses TCP for transport, and most often used for server and network device remote administration. Network Technologies Transport Layer Security (TLS) TLS replaces SSL and/or HTTPS in providing a secure mode of transport for data from server to client.
Session Initiation Protocol (SIP) SIP is a VoIP call control protocol that uses a URL to address a specific endpoint.
Network Technologies Dynamic Host Configuration Protocol (DHCP) DHCP is used by devices to request IP addresses and local network configuration parameters.
TCP and UDP Default Ports
Routing Protocols
802.11 Wireless Communication Standards wifi alliance TCP/IP 1. TCP/IP - Transmission Control Protocol/Internet Protocol. TCP is normally used in conjunction with IP in a TCP/IP-based network. The two protocols working together provide for connectivity between applications of networked computers. Originally a UNIX standard, TCP/IP is now supported on almost all platforms, and is the protocol of the Internet.
IP represents the scheme by which two devices (both with IP addresses) communicate. TCP manages the flow of IP packets, ensuring that the packets remain error-free and reach their destination correctly. TCP/IP Hosts and networks IP addressing is based on the concept of hosts and networks. A host is essentially anything on the network that is capable of receiving and transmitting IP packets on the network, such as a workstation or a router. It is not to be confused with a server: servers and client workstations are all IP hosts.
Addressing Formats
IPv4 IPv4 addresses employs a 32-bit addressing scheme that is presented in a format called dotted decimal notation, like so: 192.168.10.235
Addressing Formats
IPv6 IPv6 employs a 128-bit addressing scheme divided into eight 16-bit hexadecimal numbers separated by colons, like so: 2342:0000:1F1F:0100:0010:0100:11B0:AF FF
Addressing Formats
IP Address Classes
Addressing Formats
Subnetting Subnetting is the process of subdividing an assigned IP address into smaller networks or subnets. Classless Inter-Domain Routing (CIDR) CIDR is a routing scheme used to mitigate the address shortage in IPv4 by drawing together a number of networks into one large routing table entry. A routing protocol must be classless to support CIDR.
Addressing Formats
Network Address Translation (NAT) NAT allows administrators to translate one public IP address into public network access for many private IP addresses.
IP addressing An IP address is 32 bits wide, and as discussed, it is composed of two parts: the network number, and the host number [1, 2, 3]. By convention, it is expressed as four decimal numbers separated by periods, such as "200.1.2.3" representing the decimal value of each of the four bytes. Valid addresses thus range from 0.0.0.0 to 255.255.255.255, a total of about 4.3 billion addresses. An IP address is a numbering system based on Octal numbering notation. xxxxxxxx.xxxxxxxx.xxxxxxxx.xxxxxxxx 1 2 4 8 16 32 64 128 11001011. 01010111. 10000000. 00000010 203 87 128 2 IP addressing Subnet Mask Example: Network: 192.168.12.0 4 workgroups (Logistics, Administration, Engineering, and Human Resources) that needed to be separated logically. required to build 4 sub networks from 192.168.12.0
HR
Admin
Engg 192.168.12.x(00000000) network Hosts
Logistics Subnet Mask
HR
Admin
Logistics
Engg 192.168.12.x(00000000) Network Hosts Borrow 2 bits: 00 Logistics = 00 01 Engineering = 64 10 Human Resource = 128 11 Admin = 192 Logistics use 192.168.12.1- 62 Subnet mask 255.255.255.192 Engineering use 192.168.12.65 126 Subnet mask 255.255.255.192 Human Resource use 192.168.12.126 190 Subnet mask 255.255.255.192 Admin use 192.168.12.193 254 Subnet mask 255.255.255.192 NETWORK PHYSICAL LAYOUT DESIGN (using Microsoft Office Visio 2003)
Wireless Security Technologies
Wired Equivalent Privacy (WEP) WEP provides either 64- or 128-bit encryption for data packets over radio frequencies providing a similar level of security as wired Ethernet networks. WEP does not offer end-to-end security because it uses the lower level layers in the OSI model.
Wireless Security Technologies
Remote Authentication Dial-In User Service (RADIUS) RADIUS is used as an authentication and accounting server, storing username and password combinations for use with a variety of different services. RADIUS is typically used in conjunction with 802.11i to authenticated pre-shared wireless keys
Wireless Security Technologies
Wi-Fi Protected Access (WPA) WPA offers improved data encryption and user authentication over WEP using the wireless devices hardware-specific MAC address as a means of ensuring that only authorized users access the network. The current version WPA2 uses Advanced Encryption Standard (AES).
WAN Technologies
Frame relay - Frame Relay is a packet switching technology used as a replacement to leased lines because frame relay connections are more cost effective. A frame relay connection is able to virtually connect to a number of different remote sites through point-to-point and point-to-multipoint connections.
WAN Technologies
Key Frame Relay Terms Virtual Circuits (VC): the frame relay connections. Committed Information Rate (CIR): the maximum amount of data bandwidth contracted by the provider. Burst: an amount of extra bandwidth provided based on need and network demand. Data Link Connection Identifier (DLCI): Identifies each individual VC.
WAN Technologies
T1/E1/J1 The T-series connections are digital carrier transmission systems. ISPs and large companies employ either T1 or T3 transmission lines for access to the Internet.
WAN Technologies
Common T-series lines and their speeds include:
T1 operates at1.544 Mbps using 24 voice channels T3 operates at 44.746 Mbps using 672 voice channels E1 operates at 2.048 MBps using 30 voice channels E3 operates at 34.368 MBps using 480 voice channels J1 operates at 1.544 Mbps using 24 voice channels J3 operates at 32.064 Mbps using 480 voice channels
WAN Technologies
T1 operates at1.544 Mbps using 24 voice channels T3 operates at 44.746 Mbps using 672 voice channels E1 operates at 2.048 MBps using 30 voice channels E3 operates at 34.368 MBps using 480 voice channels J1 operates at 1.544 Mbps using 24 voice channels J3 operates at 32.064 Mbps using 480 voice channels
E designates European; J designates Japanese. Note the difference in speeds.
WAN Technologies
DSL Digital Subscriber Line or DSL is a high- speed Internet access technology carrying both digital voice and digital data and is used by businesses and consumers.
Refer to the table for a list of DSL types and their various features:
WAN Technologies
Broadband Cable This also provides high-speed Internet access technology carrying digital data and uses coaxial cable. cable modems convert analog signals into digital data. Cable companies offer a range of bandwidths from 256 Mbps to 1024 Mbps upload speed to 512 Mbps to 3 Mbps download speed.
WAN Technologies
OC-x/SONET The base rate for OCx using fiber optic media is called OC-1 and operates at 51.84 Mbps. The Synchronous Optical Network (SONET ) also uses various OCx speeds on optical fiber.
WAN Technologies
Wireless There are a couple of different wireless technologies which are currently used for Wide Area Networks. These include microwave point-to-point connections, satellite and WiMAX (802.16). WiMAX uses some of the same concepts as the 802.11 technologies, but over a larger area.
WAN Technologies
ATM Asynchronous Transfer Mode (ATM) provides a high speed solution for large scale WANs. ATM splits traffic into 53 byte cells which are transferred across the ATM network extremely quickly. ATM also offers a large number of QoS options for traffic which allow traffic priority to be very refined.
WAN Technologies
MPLS Multi Protocol Label Switching (MPLS) is a packet switching technique which enables packets to be tagged or labeled to differentiate different types of traffic. These types can be anything from different streams requiring high QoS requirements like VoIP or they can be used to form a VPN to safely transport traffic between multiple companies branches. Network Devices Firewall - Firewalls sit in the DMZ, between an intranet and the Internet and provide packet filtering to keep unauthorized access from the protected network. WAN Connection Types WAN Services A WAN is a data communications network that operates beyond a LAN's geographic scope. One way that a WAN is different from a LAN is that you must subscribe to an outside WAN service provider, such as PLDT and Globe Telecoms to use WAN carrier network services. A WAN uses data links, such as Analog Telephone and Frame Relay, that are provided by carrier services to access bandwidth over wide-area geographies. A WAN connects the locations of an organization to each other, to locations of other organizations, to external services (such as databases), and to remote users. WANs generally carry a variety of traffic types, such as voice, data, and video. Wiring Distribution Terminology Cross Connects - The location where different cable sections come together Patch Panels - A collection of terminated circuits which can be patched together.
WIRING DISTRIBUTION AND NETWORK CABLING TOOLS Network Tools Command Line Interface Tools Be familiar with the following command line tools: Traceroute (or tracert) ipconfig ifconfig (for Linux) ping ARP ping ARP
It has become appallingly obvious that our technology has exceeded our humanity. Albert Einstein (1879-1955) Technology is a way of organizing the universe so that man doesn't have to experience it. Max Frisch Technology is a gift of God. After the gift of life it is perhaps the greatest of God's gifts. It is the mother of civilizations, of arts and of sciences. Freeman Dyson - Infinite in All Directions Famous Quotes about Technology Thank you very much for listening.. EINGILBERT C. BENOLIRAO