Upload
abdul-hadi-ps
View
8
Download
0
Tags:
Embed Size (px)
DESCRIPTION
computer networking fundamentals
Citation preview
COMPUTER
NETWORKING
FUNDAMENTALS
EC 301
CHAPTER 1:
INTRODUCTION TO
NETWORKING Prepared By:
Sheila/JKE/PKB
DURATION
6 HOURS (3 weeks) Lecture
CLO 1
Explain the hardware and network devices to built
LAN for a specific implementation (C2)
CHAPTER 1
202.188.0.133
202.188.0.134
202.188.0.135
202.188.0.136
202.188.0.137
202.188.0.138
COMPUTER HARDWARE??
INTRODUCTION TO NETWORKING
COMPUTER HARDWARE??
INTRODUCTION TO NETWORKING
HARDWARE Input
Device
Output
Device
Processing
Device
Storage
Device
COMPUTER SYSTEM?
INTRODUCTION TO NETWORKING
HARDWARE SOFTWARE ? The instructions given
to the computer in the
form of a program
which are used for
different purposes.
COMPUTER SYSTEM ??
INTRODUCTION TO NETWORKING
an advanced
electronic
device Input Output
raw data
from the user
processes
under the control set of instructions
gives the result
saves
In the storage space
COMPUTER NETWORK??
INTRODUCTION TO NETWORKING
Network comprise 2 or MORE computers
that have been
connected
A group of device, known as a node
connected to media
transmission.
The computers can be geographically located anywhere.
Enable them to communicate with each other and share resources and files.
INTRODUCTION TO NETWORKING
COMPUTER NETWORK??
HUB
HUB
HUB
ROUTER
REPEATERS
ATM TELEKOM MALAYSIA
BR
IDG
E B
RID
GE
SERVER
WORKSTATION
HUB
HUB
HUB
HUB
Computer networks can be used for several purposes: Facilitating communications.
Sharing hardware.
Sharing files, data, and information.
Sharing software.
people can communicate efficiently and easily
via :
Email, instant messaging, chat rooms,
Telephone, video telephone calls and
video conferencing.
each computer on a network may
access and use hardware resources
on the network, such as printing a
document on a shared network
printer.
user may access data and
information which stored on other
computers on the network.
Users connected to a network may run application programs on remote computers.
INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
NETWORK COMPUTER
INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
INTRODUCTION TO NETWORKING
Connected to Printer / scanner individually
Stored on Workstations / Pendrive / CD
Connected to internet Security software installed On
each computer. User keeps
security software updated.
Physical security typically poor
Connecting teams through phone
STAND-ALONE COMPUTER
NETWORK COMPUTER
INTRODUCTION TO NETWORKING
A single stand-alone
computer can be very
useful BUT it is when
connected to other
computers that it
becomes possible to
do some of the most
powerful things.
NETWORK COMPUTER
INTRODUCTION TO NETWORKING
Share Printer / scanner Stored on server . All files can be
shared
Shared internet connection Security software installed on
server. Client for security software
installed on workstations. Server
auto updates workstations.
Physical security for servers good
Connecting teams through email /
2 TYPES of NETWORK
P2P NETWORK
CLIENT/SERVER NETWORK
INTRODUCTION TO NETWORKING
P2P NETWORK
are more commonly
implemented where less
then ten computers are
involved and where strict
security is not necessary.
INTRODUCTION TO NETWORKING
P2P NETWORK
each computer in the
network act as both client or
server for the other
computers in the network
allowing shared access to
files/email with every other
computer on the network
and peripherals without the
need for a central server
INTRODUCTION TO NETWORKING
P2P NETWORK
all computers in the
network to use the same or
a compatible program to
connect to each other and
access files and other
resources found on the
other computer.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK
Suitable for larger network
A computer network in which one
centralized
Powerful computer is a hub to
which many less powerful
personal computers or
workstations are connected
Clients run programs and access
data that are stored on the server
INTRODUCTION TO NETWORKING
PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK
Easy to setup. More difficult to set up.
Less expensive. More expensive to install.
Can be implemented on a wide range of
operating systems.
A variety of operating systems can be
supported on the client computers, but
the server needs to run an operating
system that supports networking.
More time consuming to maintain the
software being used (as computers must
be managed individually).
Less time consuming to maintain the
software being used (as most of the
maintenance is managed from the
server).
INTRODUCTION TO NETWORKING
P2P vs C/S
PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK
Very low levels of security supported or
none at all. These can be very
cumbersome to set up, depending on the
operating system being used.
High levels of security are supported, all
of which are controlled from the server.
Such measures prevent the deletion of
essential system files or the changing of
settings.
Ideal for networks with less than 10
computers.
No limit to the number of computers that
can be supported by the network.
Does not require a server. Requires a server running a server
operating system.
Demands a moderate level of skill to
administer the network.
Demands that the network administrator
has a high level of IT skills with a good
working knowledge of a server operating
system.
INTRODUCTION TO NETWORKING
P2P vs C/S
CLIENT/SERVER NETWORK ELEMENT
INTRODUCTION TO NETWORKING
2 . Client
1. Server
4. Network Interface Card
5 Network Operating System
3. Workstation
6. Node
7. Connectivity
Device
8 Backbone
9. Segment
10. Topology
11. Transmission
Media
CLIENT/SERVER NETWORK ELEMENT
1. Client
A computer on the network that requests resources or services from another computer on a network
client could also act as a server. The term client may also refer to the human user of a client workstation or to client software installed on the workstation.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
2. Server
A computer on the network that manages shared resources
usually have more processing power, memory, and hard disk space than clients.
run network operating software that can manage not only data, but also users, groups, security, and applications on the network
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
3. Workstations
All of the user computers connected to a
network are called workstations.
A typical workstation is a computer that is
configured with a network interface card,
networking software, and the appropriate
cables.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
3. Workstations
Workstations do not necessarily need floppy
disk drives because files can be saved on
the file server.
Almost any computer can serve as a
network workstation
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
4. Network Interface Card (NIC)
NIC provides the physical connection
between the network and the computer
workstation.
Most NICs are internal, with the card fitting
into an expansion slot inside the computer.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
4. Network Interface Card (NIC)
NICs are a major factor in determining the
speed and performance of a network.
The three most common network interface
connections are Ethernet cards, LocalTalk
connectors, and Token Ring cards.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
5. Network Operating System (NOS)
is the software that runs on a server and
enables the server to manage data, users,
groups, security, applications, and other
networking functions.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
5. Network Operating System (NOS)
The network operating system is designed
to allow shared file and printer access
among multiple computers in a network,
typically a local area network (LAN), a
private network or to other networks.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
5. Network Operating System (NOS)
The most popular network operating systems
are :
Microsoft Windows Server 2003,
Microsoft Windows Server 2008,
UNIX, Linux, Mac OS X, and
Novell NetWare.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
6. Node
A client, server, or other device that can
communicate over a network and that is
identified by a unique number, known as its
network addressers.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
7. Connectivity device
A specialized device that allows multiple networks or multiple parts of one network to connect and exchange data.
A client/server network can operate without connectivity devices.
However, medium- and large-sized LANs use them to extend the network and to connect with WANs.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
8. Segment
A network segment is a part of a computer
network.
The nature and extent of a segment depends
on the nature of the network and the device or
devices used to interconnect end stations.
Device including routers, switches, hubs,
bridges, or multi-homed gateways
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
9. Backbone
The part of a network to which segments and
significant shared devices such as routers,
switches, and servers.
A backbone is sometimes referred to as "a
network of networks," because of its role in
interconnecting smaller parts of a LAN or
WAN.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
10. Topology
The physical layout of a computer network.
Topologies vary according to the needs of the
organization and available hardware and
expertise.
Networks can be arranged in a ring, bus, or
star formation, and the star formation is the
most common.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK ELEMENT
11. Transmission media
The means through which data is transmitted
and received.
Transmission media may be physical, such as
wire or cable, or atmospheric (wireless), such
as radio waves.
INTRODUCTION TO NETWORKING
INTRODUCTION TO NETWORKING
CATEGORIES OF NETWORK
WIDE AREA
NETWORK
METROPOLITAN
AREA NETWORK
LOCAL AREA
NETWORK
the largest network
very expensive to setup
high speed
a larger network than LAN
smaller than a WAN.
connects computer users in a particular
geographic area or region.
A group of computers that share a common
connection
in a small area or even in the same
building
an office or home network
connected by Ethernet cables
have high Speed connections.
Connect devices in a building
INTRODUCTION TO NETWORKING
LOCAL AREA NETWORK (LAN)
INTRODUCTION TO NETWORKING
the computers are relatively close together.
can be constructed only with two computers and one printer only, or can be extended in one building to include audio and video peripherals.
LAN size is limited to a distance of several kilometers
LANs would be within the same office, a single building, or several buildings close together.
Common LAN topologies are bus, star and ring.
LAN has a data rate of 4 Mbps to 100 Mbps.
LOCAL AREA NETWORK (LAN)
Connecting device between several buildings or area (city).
INTRODUCTION TO NETWORKING
METROPOLITAN AREA NETWORK (MAN)
INTRODUCTION TO NETWORKING
METROPOLITAN AREA NETWORK (MAN)
is a network that interconnects users with
computer resources in a geographic area or
region LARGER than that covered by even a
large LAN but SMALLER than the area
covered by a WAN
Can send data, audio and video at long distances around the world.
INTRODUCTION TO NETWORKING
WIDE AREA NETWORK (WAN)
A computer network that spans a relatively
large geographical area.
Computers connected to a WAN are often
connected through public networks, such as
the telephone system.
They can also be connected through leased
lines or satellites.
The largest WAN in existence is the Internet.
INTRODUCTION TO NETWORKING
WIDE AREA NETWORK (WAN)
INTRODUCTION TO NETWORKING
INTERNET is a global network
that links computer networks around the world
Internet is from
Internetworking word, that meaning of communication between networks.
a network of network.
INTRODUCTION TO NETWORKING
INTRANET A contained collection of computers and
networks within an organizations
connecting the organization's members and/or employees to a range of computer services, resources, and information.
firewall is used to separate the Intranet from the Internet and to get permission to access the source.
INTRODUCTION TO NETWORKING
INTERNET VS INTRANET
Defines the way in which computers, printers, and other devices are connected.
the layout of the wire and devices as well as the paths used by data transmissions.
INTRODUCTION TO NETWORKING
NETWORK TOPOLOGY
Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
Bus is a passive network.
messages are usually broadcasted to every
computer
Computers in a network bus lines just listen in
to find out whether there is data that is sent.
This computer does not respond to send data to
the computer next to it.
If the computer fails, it does not give effect to
the entire network.
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
Advantages Disadvantages
Quick, reliable in building a small
network, easy to use and
understand
make a lot of network traffic is extremely
slow bus. Because any computer can
send signals at any time, these interfere
with each other
cable to connect your computer
does not need much, so prices are
cheap
Each barrel connector will weaken the
signal, if too many connections can result
in signal is not received correctly
Easy to expand the bus. Two cables
can be connected to become
longer with BNC barrel
difficult to be recovered
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
The star topology is the most commonly used architecture in Ethernet LANs.
It connecting all the cables from the computer to a central location, where everything will be connected to a device known as a hub
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
Each computer in a star
topology communicate with the
central hub that sends the
message to the all computers
(in a star network broadcast) or
only to a certain destination
computer
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
Advantages disadvantages
Easier to update and add computers in the
stars without disrupting network
If the central hub fails, the network
fails
Repairs of the network easily done in the
center of the stars
Requires device in the center of stars
for rebroadcast, or convert (switch)
network traffic
A damaged computer does not necessarily
affect the network
higher price because of all the cables
must be pulled from the center
Can use several types of cables within the
same network, with a hub that can accept
different types of cables
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
circuit arrangement in which
each network device is attached
along the same signal path to
other devices, forming a path in
the shape of a ring.
Each device in the network
(node) handles every message
that flows through the ring.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each node in the ring has a unique address.
Since in a ring topology there is only one pathway between any two nodes, ring networks are generally disrupted by the failure of a single link.
Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
The redundant topologies are used to eliminate network downtime caused by a single point of failure.
It is used to produce high-performance network: the network require special bandwidth for the features such as video and audio, or high performance is required when many users access the network
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each computer receives the signal from the
computer next to it and send these signals to
the next computer
Since each computer send the signal it
receives, then the ring topology is an active
network.
No terminator is required because there is no
end in this topology
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Since the data is transferred as a sequence
of the same route the possibility of the
occurrence of data collisions do not occur
Maintenance work for this system is
somewhat similar to the star topology.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each node can be connected to the network
and can also be removed at any time without
affecting the whole system directly.
But one problem is if a node fails, the whole
network system is likely to be affected.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Advantages disadvantages
As each computer is given the
same to achieve the token,
not a single computer can be
a monopoly network
The failure of a computer will cause
a network failure
not easy to repair if damaged
Increase or decrease the computer
will disrupt the network
INTRODUCTION TO NETWORKING
RING TOPOLOGY
there is only one possible path
from one node to another node.
If any cable in that path is
broken, the nodes cannot
communicate.
INTRODUCTION TO NETWORKING
MESH/HYBRID TOPOLOGY
Advantages disadvantages
As each computer is given the
same to achieve the token,
not a single computer can be
a monopoly network
Durable, eg failure media is not
disrupt the network when compared
with other topologies
It is easy to be recovered
INTRODUCTION TO NETWORKING
MESH/HYBRID TOPOLOGY
NETWORK STANDARD
There are several organizations in the United
States and Europe that produces standards for
data communications and computer networks.
The role of these organizations are only
suggested standards.
INTRODUCTION TO NETWORKING
NETWORK STANDARD The organizations are:
a. American National Standards Institute(ANSI)
b. Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA)
c. Institute of Electrical and Electronic Engineers (IEEE)
d. International Organization for Standardization (ISO)
e. International Telecommunication Union (ITU)
f. Internet Society (ISOC)
g. Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN)
INTRODUCTION TO NETWORKING
NETWORK STANDARD
a. American National Standard Institute (ANSI)
is a private organization that coordinates all
standards organizations in the United States.
ANSI standards are among the organizations
involved in COMPUTER AND DATA
COMMUNICATIONS
INTRODUCTION TO NETWORKING
NETWORK STANDARD
b. Electronics Industries Association (EIA)
is an organization representing many of
expenditures in the ELECTRONICS INDUSTRY.
Duties and responsibilities of EIA is more
focused on ELECTRICAL STANDARD
includingEIA-232-D and EIA-499: important
interface in the delivery / receipt of information
INTRODUCTION TO NETWORKING
NETWORK STANDARD
c. Institute of Electrical and Electronic Engineers
(IEEE)
is a professional organization will issue a
standard in their respective fields and this
standard will be adopted by consumers.
In the computer world, better known in the
developing IEEE standard Local Area Network
(LAN) which is designated as IEEE 802.
INTRODUCTION TO NETWORKING
NETWORK STANDARD
d. Internatinal Standards Organization (ISO)
is a voluntary organization with membership
from several countries.
ISO to work with other organizations such as
CCITT and ANSI standards to create some
standards such as HDLC (High-level data link
control)
INTRODUCTION TO NETWORKING
NETWORK STANDARD
e. Internatinal Telecommunication Union (ITU)
an intergovernmental organization through
which public and private organizations develop
telecommunications.
The ITU was founded in 1865 and became a
United Nations agency in 1947.
INTRODUCTION TO NETWORKING
NETWORK STANDARD
e. Internatinal Telecommunication Union (ITU)
It is responsible for adopting international
treaties, regulations and standards governing
telecommunications.
The standardization functions were formerly
performed by a group within the ITU called
CCITT, but after a 1992 reorganization the
CCITT no longer exists as a separate entity.
INTRODUCTION TO NETWORKING
INTRODUCTION TO NETWORKING
SOURCE DESTINATIONS CHANNEL
PRINCIPLES OF COMMUNICATION NETWORKING
INTRODUCTION TO NETWORKING
SOURCE DESTINATIONS CHANNEL
PRINCIPLES OF COMMUNICATION NETWORKING
INTRODUCTION TO NETWORKING
SOURCE DESTINATIONS CHANNEL
Message sources are people
or electronic devices, that
need to send a message to
other individuals or devices.
the media that provides the
pathway over which the message
can travel from source to
destination.
The receiver of the
message
PRINCIPLES OF COMMUNICATION NETWORKING
Most networks has one feature in common:
Transmitting information by breaking the original
information into a set of message (packets)
Transmitting packets sequentially
Reassembling packet back into original
information
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
In order to make sure the original message get transmitted correctly , computer networks used a set of rules:
Establish a link
Issue a command and command qualifier
Acknowledgement of command
Dissection message
Error detection and correction
Termination of transmission
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Establish a Link
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Establish a Link
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Establish a Link
Each packet is a string of bits and have to travel along way over a bunch of different network
Typically lots of computer sending and receiving information over the same network
The information getting sent can often get altered during transmission
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Issues a command and Command Qualifier The SET NETWORK command allows to control
information about network services on an Open system.
Each structure defines a particular network service and contains the following information: Product name
Manufacturer
Type of network
Node name
Address(es)
Interface(s) (OpenVMS device driver)
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Issues a command and Command Qualifier
Vendor-specific data
Status
Connections
Counters
Start command
Stop command
Path to the Point-to-Point Protocol utility (PPPD)
shareable image
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Acknowledgement of Command
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Router receiving
packets from DTE A
destined for DTE B
Without acknowledgment
the router forwards packets to the X.25 network and then
forwards acknowledgments from the network back to DTE A.
With acknowledgment
the router can acknowledge packets received from DTE A before it has received
acknowledgments from the network for the forwarded packets.
Acknowledgement of Command
Acknowledgment is transmitted between local
hops much faster and more efficiently than
between end-to-end hops.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Dissection Message
Proxies are good firewalls because the entire
packet is dissected and each section can be
examined for invalid data at each layer of the
OSI model.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Dissection Message
a proxy can examine a packet for information
contained in everything from the packet header
to the contents of the message.
Attachments can also be checked for viruses.
Messages can be searched for keywords that
might indicate the source of a packet.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Error Detection and Correction
Data can be corrupted during transmission.
ERROR = Data Send Data Received
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Error Detection and Correction
2 types of ERROR
Single bit Error
In a single-bit error, only 1 bit in the data unit has changed.
Burst Error
A burst error means that 2 or more bits in the data unit have changed.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Error Detection and Correction
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
1 0 0 1 0 0 0 0 1 0 0
Parity bit will be in charge to make sure Total
bit 1 for bits words must be ODD
8 bits words
PARITY Bit
MSB LSB
1 + 1 = 2
EVEN
+ 1 = 3
ODD
INTRODUCTION TO NETWORKING
PARITY CHECK - ODD PARITY
Parity bit will be in charge to make sure Total
bit 1 for bits words must be EVEN
0 0 0 1 0 0 0 0 1 0 0
8 bits words
PARITY Bit
MSB LSB
1 + 1 = 2 + 0 = 2
EVEN
EVEN
INTRODUCTION TO NETWORKING
PARITY CHECK - EVEN PARITY
Method used to detect and correct error
Need to send extra bits with data
Redundancy bits are added by sender and removed
by the receiver
Allows the receiver to detect or correct corrupted bits
INTRODUCTION TO NETWORKING
CYCLIC REDUNDANCY CHECK
INTRODUCTION TO NETWORKING
CYCLIC REDUNDANCY CHECK
Sender Receiver
INTRODUCTION TO NETWORKING
CHECKSUM Sender Receiver
Bin Dec Dec Bin
0111
7 7
0000
1011
11 11
1011
1010
12 12
1010
0000
0 0
0000
0110
6
7,11,12,0,6,9
6
0110
0000
0 9
1001
Sum 36 Sum 45
Wrapped Sum 6 Wrapped Sum 15
Checksum 9 Checksum 0
10 0100 36 10 1101 45 10 10
0110 6 1111 15
1001 9 0000 0
Error Detection VS Error Correction Detecting Error
Looking only to see if any error occurred.
Correcting Error
More difficult because need to know the exact number of bits are corrupted and more importantly the location of the message
Number of error and size of message are also important factors
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Termination of Transmission
each side of the connection terminating
independently.
When an endpoint wishes to stop its
half of the connection, it transmits a
FIN packet, which the other end
acknowledges with an ACK.
Therefore, a typical tear-down requires
a pair of FIN and ACK segments from
each TCP endpoint.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
Termination of Transmission
After both FIN/ACK exchanges are
concluded, the terminating side waits for a
timeout before finally closing the
connection, during which time the local
port is unavailable for new connections;
this prevents confusion due to delayed
packets being delivered during
subsequent connections.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION NETWORKING
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Encoding
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Messages sent
across the network
are first converted
into bits by the
sending host.
Each bit is encoded into a pattern of light waves
or electrical impulses depending on the network
media over which the bits are transmitted.
The destination host receives and
decodes the signals in order to
interpret the message.
Message Encapsulation
Messages are encapsulated before being sent to the
appropriate location
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Formatting
On a network messages are formatted into frames
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Formatting
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Size
Messages have size restrictions depending on the
channel used
Messages must be of a particular size
Ethernet message sizes are limited to 46-1500
bytes
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
the amount of time from the beginning until the
end of a message transmission.
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Tx Msg
Rx Msg
Start
Tx Msg
End of
Msg
Start
ACK
Time
wait to
Tx ACK
Rx ready
to listen
for ACK
Start listening
Rx Msg
Min time to
wait Rx Msg
Message Timing Access method
Determines when a message can be sent to avoid collisions
Flow control
Determines how much information can be sent at any given time
Response timeout
Determines what action to take if there is no response in a reasonable time period
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
The packet transmission time in seconds can be
obtained from the packet size in bit and the bit rate
in bit/s as:
Packet transmission time = Packet size
Bit rate
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
Example:
Assuming 100 Mbit/s Ethernet and the maximum
packet size of 1526 bytes. Calculate the results in
Maximum packet transmission time?
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Timing
Example:
Max packet transmission = Packet size
Bit rate
= 1526*8 bit
(1 Mbit/s)
122 s
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Patterns
a network-oriented architectural pattern
describes how two different parts of a message
passing system connect and communicate with
each other.
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Message Patterns
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
My friend at Putrajaya want to send me a files
using my PKB e-mail. After sending the email
she identify that the files that she has attached
cannot get through the PKB server. In a given
scenario, identify which terminologies can be
relate to this communication problem in
networking .
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION NETWORKING
Networking equipment typically
refers to devices facilitating the
use of a computer network.
includes gateways, routers,
bridges, switches, hubs, and
repeaters.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
A network interface controller
/network interface card is a
computer hardware
component that connects a
computer to a computer
network.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
NIC
NIC provides the hardware interface between a
computer and a network.
A NIC technically is network adapter hardware in
the form factor of an add-in card
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
Various types of NIC
PCI NIC
PCI Express NIC
PCMCIA
On Board NIC
Wireless NIC
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
PCI NIC
Peripheral Component Interconnect is an industry
specification for connecting hardware devices to a
computer's central processor.
Both Ethernet and Wi-Fi network adapters for
desktop and notebook computers commonly utilize
PCI.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
PCI NIC
PCI defines the electrical characteristics and signal
protocol used for two devices to communicate over
a computer's central bus.
PCI network adapters and other devices exist in
several different shapes and sizes
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
PCI Express NIC
It is used to connect Fast Ethernet Networks
together and it is connected to a PCI Slot located on
your computer's Motherboard
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
PCMCIA/PC card
Personal Computer Memory Card International Association is an industry organization best know for developing a standard network adapter using the PC Card form factor.
PC Card form factor was designed for thinness, and PCMCIA is therefore especially used mostly in removable peripherals that connect to a laptop.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
On Board NIC
A LAN connection or network connection
In a desktop, NIC's, video cards, sound cards and such can be inserted into physical slots on the motherboard but in a laptop there is no room for such a configuration. All of these things are built right in to the motherboard. Some desktops integrate these things as well but still maintain the slots as described above. So, an "onboard" or integrated NIC card would not be plugged into one of these slots.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
Wireless NIC
WNIC is a network interface controller which connects to a radio-based computer network rather than a wire-based network
A WNIC is an essential component for wireless desktop computer.
this card uses an antenna to communicate through microwaves.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
A HUB is a device
that provides a
central connection
point for cables from
workstations, servers
and peripherals.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
HUB/SWITCH
multi slot
concentrators which
can plugged a number
of multi-port cards to
provide additional
access as the network
grows in size.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
HUB/SWITCH
2 Types of HUB
1. PASSIVE concentrators/hub
No voltage supply
allow the signal to pass from one computer to another without amplify the signal.
2. ACTIVE concentrators/hub
Need voltage supply to electrically amplify the signal as it moves from one device to another
Act like repeaters that can extend the length of a network.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
HUB/SWITCH
an electronic device that
receives a signal, cleans it of
unnecessary noise,
regenerates and retransmits it
can be separate devices or they can be incorporated into a concentrator/hub.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
REPEATERS
it is necessary to
regenerates the signal
signal
Long Distance Cable
signal
a signal loses strength as
it passes along a long
distance cable
The repeater electrically
amplifies the signal it
receives and rebroadcasts it
at a higher power level
the signal can cover
longer distances without
degradation
FUNCTION OF NETWORING HARDWARE
REPEATERS
INTRODUCTION TO NETWORKING
a device to allows segment of a large network into two smaller to reduce the amount of traffic on a networks and make the traffic more efficient.
2nd Network
BRIDGE
1st Network
FUNCTION OF NETWORING HARDWARE
BRIDGE
INTRODUCTION TO NETWORKING
BRIDGE also can filters data traffic at a network boundary.
FUNCTION OF NETWORING HARDWARE
BRIDGE
INTRODUCTION TO NETWORKING
2nd Network 1st Network
can connect the 2 network. adding new wiring scheme into an older wiring
scheme or
To up-date the network
New Network Network
BRIDGE
FUNCTION OF NETWORING HARDWARE
BRIDGE
INTRODUCTION TO NETWORKING
2nd Network 1st Network
MONITORS the information traffic on both sides of the network so that it
can pass packets of information to the correct location.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
BRIDGE
1st Network
2nd Network
LISTEN" to the network and automatically figure out the address of each
computer on both sides of the bridge.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
BRIDGE
1st Network
2nd Network
INSPECT each message and broadcast it on the other side of the network.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
BRIDGE
1st Network 2nd Network
MANAGE the traffic to maintain optimum performance on both sides of the network (like
a traffic cop at a busy intersection during rush hour.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
BRIDGE
A ROUTER translates information from one network to another
it is similar to a super
intelligent bridge.
A ROUTER select the best path to route a message, based on the destination address and origin.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
ROUTER
The ROUTER can direct traffic to prevent
head-on collisions or traffic
It is smart enough to know when to direct
traffic along back roads and shortcuts.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
ROUTER
is a network point that acts as an entrance to
another network.
an internetworking system capable of joining
together two networks that use different base
protocols.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
GATEWAY
The computers that
control traffic within a
company's network or at
a local Internet service
provider (ISP) are gateway
nodes.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
GATEWAY
In PKBs, a computer server acting as a gateway node and it also acting as a proxy server and a firewall server.
A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.
INTRODUCTION TO NETWORKING
FUNCTION OF NETWORING HARDWARE
GATEWAY
Tell the class, what is the function of
computer network hardware?
Name 2 out of 5 of the computer network
hardware that u remember.
Identify which computer network hardware
can select the best path to bring a message,
based on the destination address and origin.
INTRODUCTION TO NETWORKING
REFLECTION
Sketch a simple peer to peer computer
network at your house to show connection
between 4 individual user playing and
sharing web game.
INTRODUCTION TO NETWORKING
ACTIVITIES
Construct a diagram of the local area
network in JKEs Multimedia Computer Lab
which include 40 connected PCs and 1
shared printer. The lab have 10 Ethernet
jack. Add any network hardware to apply to
the connection.
INTRODUCTION TO NETWORKING
ACTIVITIES
The network in JKEs Office includes 44 connected PCs, 2 shared printers and 4 telephones with their own Ethernet jack. If there are 2 more PCs and 1 wireless router need to be add in the office but with no more Ethernet jack available. Design the connection to show the new JKEs office network. Add any network hardware to apply to the connection.
INTRODUCTION TO NETWORKING
ACTIVITIES
NEXT : TOPIC 2
THE OPEN SYSTEM
INTERCONNECTION (OSI)
MODEL AND NETWORK
PROTOCOL