147
COMPUTER NETWORKING FUNDAMENTALS EC 301

computer networking fundamentals_topic1

Embed Size (px)

DESCRIPTION

computer networking fundamentals

Citation preview

  • COMPUTER

    NETWORKING

    FUNDAMENTALS

    EC 301

  • CHAPTER 1:

    INTRODUCTION TO

    NETWORKING Prepared By:

    Sheila/JKE/PKB

  • DURATION

    6 HOURS (3 weeks) Lecture

    CLO 1

    Explain the hardware and network devices to built

    LAN for a specific implementation (C2)

    CHAPTER 1

  • 202.188.0.133

    202.188.0.134

    202.188.0.135

    202.188.0.136

    202.188.0.137

    202.188.0.138

  • COMPUTER HARDWARE??

    INTRODUCTION TO NETWORKING

  • COMPUTER HARDWARE??

    INTRODUCTION TO NETWORKING

    HARDWARE Input

    Device

    Output

    Device

    Processing

    Device

    Storage

    Device

  • COMPUTER SYSTEM?

    INTRODUCTION TO NETWORKING

    HARDWARE SOFTWARE ? The instructions given

    to the computer in the

    form of a program

    which are used for

    different purposes.

  • COMPUTER SYSTEM ??

    INTRODUCTION TO NETWORKING

    an advanced

    electronic

    device Input Output

    raw data

    from the user

    processes

    under the control set of instructions

    gives the result

    saves

    In the storage space

  • COMPUTER NETWORK??

    INTRODUCTION TO NETWORKING

    Network comprise 2 or MORE computers

    that have been

    connected

    A group of device, known as a node

    connected to media

    transmission.

  • The computers can be geographically located anywhere.

    Enable them to communicate with each other and share resources and files.

    INTRODUCTION TO NETWORKING

    COMPUTER NETWORK??

  • HUB

    HUB

    HUB

    ROUTER

    REPEATERS

    ATM TELEKOM MALAYSIA

    BR

    IDG

    E B

    RID

    GE

    SERVER

    WORKSTATION

    HUB

    HUB

    HUB

    HUB

  • Computer networks can be used for several purposes: Facilitating communications.

    Sharing hardware.

    Sharing files, data, and information.

    Sharing software.

    people can communicate efficiently and easily

    via :

    Email, instant messaging, chat rooms,

    Telephone, video telephone calls and

    video conferencing.

    each computer on a network may

    access and use hardware resources

    on the network, such as printing a

    document on a shared network

    printer.

    user may access data and

    information which stored on other

    computers on the network.

    Users connected to a network may run application programs on remote computers.

    INTRODUCTION TO NETWORKING

  • STAND-ALONE COMPUTER

    NETWORK COMPUTER

    INTRODUCTION TO NETWORKING

  • STAND-ALONE COMPUTER

    INTRODUCTION TO NETWORKING

    Connected to Printer / scanner individually

    Stored on Workstations / Pendrive / CD

    Connected to internet Security software installed On

    each computer. User keeps

    security software updated.

    Physical security typically poor

    Connecting teams through phone

  • STAND-ALONE COMPUTER

    NETWORK COMPUTER

    INTRODUCTION TO NETWORKING

    A single stand-alone

    computer can be very

    useful BUT it is when

    connected to other

    computers that it

    becomes possible to

    do some of the most

    powerful things.

  • NETWORK COMPUTER

    INTRODUCTION TO NETWORKING

    Share Printer / scanner Stored on server . All files can be

    shared

    Shared internet connection Security software installed on

    server. Client for security software

    installed on workstations. Server

    auto updates workstations.

    Physical security for servers good

    Connecting teams through email /

  • 2 TYPES of NETWORK

    P2P NETWORK

    CLIENT/SERVER NETWORK

    INTRODUCTION TO NETWORKING

  • P2P NETWORK

    are more commonly

    implemented where less

    then ten computers are

    involved and where strict

    security is not necessary.

    INTRODUCTION TO NETWORKING

  • P2P NETWORK

    each computer in the

    network act as both client or

    server for the other

    computers in the network

    allowing shared access to

    files/email with every other

    computer on the network

    and peripherals without the

    need for a central server

    INTRODUCTION TO NETWORKING

  • P2P NETWORK

    all computers in the

    network to use the same or

    a compatible program to

    connect to each other and

    access files and other

    resources found on the

    other computer.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK

    Suitable for larger network

    A computer network in which one

    centralized

    Powerful computer is a hub to

    which many less powerful

    personal computers or

    workstations are connected

    Clients run programs and access

    data that are stored on the server

    INTRODUCTION TO NETWORKING

  • PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK

    Easy to setup. More difficult to set up.

    Less expensive. More expensive to install.

    Can be implemented on a wide range of

    operating systems.

    A variety of operating systems can be

    supported on the client computers, but

    the server needs to run an operating

    system that supports networking.

    More time consuming to maintain the

    software being used (as computers must

    be managed individually).

    Less time consuming to maintain the

    software being used (as most of the

    maintenance is managed from the

    server).

    INTRODUCTION TO NETWORKING

    P2P vs C/S

  • PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK

    Very low levels of security supported or

    none at all. These can be very

    cumbersome to set up, depending on the

    operating system being used.

    High levels of security are supported, all

    of which are controlled from the server.

    Such measures prevent the deletion of

    essential system files or the changing of

    settings.

    Ideal for networks with less than 10

    computers.

    No limit to the number of computers that

    can be supported by the network.

    Does not require a server. Requires a server running a server

    operating system.

    Demands a moderate level of skill to

    administer the network.

    Demands that the network administrator

    has a high level of IT skills with a good

    working knowledge of a server operating

    system.

    INTRODUCTION TO NETWORKING

    P2P vs C/S

  • CLIENT/SERVER NETWORK ELEMENT

    INTRODUCTION TO NETWORKING

    2 . Client

    1. Server

    4. Network Interface Card

    5 Network Operating System

    3. Workstation

    6. Node

    7. Connectivity

    Device

    8 Backbone

    9. Segment

    10. Topology

    11. Transmission

    Media

  • CLIENT/SERVER NETWORK ELEMENT

    1. Client

    A computer on the network that requests resources or services from another computer on a network

    client could also act as a server. The term client may also refer to the human user of a client workstation or to client software installed on the workstation.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    2. Server

    A computer on the network that manages shared resources

    usually have more processing power, memory, and hard disk space than clients.

    run network operating software that can manage not only data, but also users, groups, security, and applications on the network

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    3. Workstations

    All of the user computers connected to a

    network are called workstations.

    A typical workstation is a computer that is

    configured with a network interface card,

    networking software, and the appropriate

    cables.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    3. Workstations

    Workstations do not necessarily need floppy

    disk drives because files can be saved on

    the file server.

    Almost any computer can serve as a

    network workstation

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    4. Network Interface Card (NIC)

    NIC provides the physical connection

    between the network and the computer

    workstation.

    Most NICs are internal, with the card fitting

    into an expansion slot inside the computer.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    4. Network Interface Card (NIC)

    NICs are a major factor in determining the

    speed and performance of a network.

    The three most common network interface

    connections are Ethernet cards, LocalTalk

    connectors, and Token Ring cards.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    5. Network Operating System (NOS)

    is the software that runs on a server and

    enables the server to manage data, users,

    groups, security, applications, and other

    networking functions.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    5. Network Operating System (NOS)

    The network operating system is designed

    to allow shared file and printer access

    among multiple computers in a network,

    typically a local area network (LAN), a

    private network or to other networks.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    5. Network Operating System (NOS)

    The most popular network operating systems

    are :

    Microsoft Windows Server 2003,

    Microsoft Windows Server 2008,

    UNIX, Linux, Mac OS X, and

    Novell NetWare.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    6. Node

    A client, server, or other device that can

    communicate over a network and that is

    identified by a unique number, known as its

    network addressers.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    7. Connectivity device

    A specialized device that allows multiple networks or multiple parts of one network to connect and exchange data.

    A client/server network can operate without connectivity devices.

    However, medium- and large-sized LANs use them to extend the network and to connect with WANs.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    8. Segment

    A network segment is a part of a computer

    network.

    The nature and extent of a segment depends

    on the nature of the network and the device or

    devices used to interconnect end stations.

    Device including routers, switches, hubs,

    bridges, or multi-homed gateways

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    9. Backbone

    The part of a network to which segments and

    significant shared devices such as routers,

    switches, and servers.

    A backbone is sometimes referred to as "a

    network of networks," because of its role in

    interconnecting smaller parts of a LAN or

    WAN.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    10. Topology

    The physical layout of a computer network.

    Topologies vary according to the needs of the

    organization and available hardware and

    expertise.

    Networks can be arranged in a ring, bus, or

    star formation, and the star formation is the

    most common.

    INTRODUCTION TO NETWORKING

  • CLIENT/SERVER NETWORK ELEMENT

    11. Transmission media

    The means through which data is transmitted

    and received.

    Transmission media may be physical, such as

    wire or cable, or atmospheric (wireless), such

    as radio waves.

    INTRODUCTION TO NETWORKING

  • INTRODUCTION TO NETWORKING

    CATEGORIES OF NETWORK

  • WIDE AREA

    NETWORK

    METROPOLITAN

    AREA NETWORK

    LOCAL AREA

    NETWORK

    the largest network

    very expensive to setup

    high speed

    a larger network than LAN

    smaller than a WAN.

    connects computer users in a particular

    geographic area or region.

    A group of computers that share a common

    connection

    in a small area or even in the same

    building

    an office or home network

    connected by Ethernet cables

    have high Speed connections.

  • Connect devices in a building

    INTRODUCTION TO NETWORKING

    LOCAL AREA NETWORK (LAN)

  • INTRODUCTION TO NETWORKING

    the computers are relatively close together.

    can be constructed only with two computers and one printer only, or can be extended in one building to include audio and video peripherals.

    LAN size is limited to a distance of several kilometers

    LANs would be within the same office, a single building, or several buildings close together.

    Common LAN topologies are bus, star and ring.

    LAN has a data rate of 4 Mbps to 100 Mbps.

    LOCAL AREA NETWORK (LAN)

  • Connecting device between several buildings or area (city).

    INTRODUCTION TO NETWORKING

    METROPOLITAN AREA NETWORK (MAN)

  • INTRODUCTION TO NETWORKING

    METROPOLITAN AREA NETWORK (MAN)

    is a network that interconnects users with

    computer resources in a geographic area or

    region LARGER than that covered by even a

    large LAN but SMALLER than the area

    covered by a WAN

  • Can send data, audio and video at long distances around the world.

    INTRODUCTION TO NETWORKING

    WIDE AREA NETWORK (WAN)

  • A computer network that spans a relatively

    large geographical area.

    Computers connected to a WAN are often

    connected through public networks, such as

    the telephone system.

    They can also be connected through leased

    lines or satellites.

    The largest WAN in existence is the Internet.

    INTRODUCTION TO NETWORKING

    WIDE AREA NETWORK (WAN)

  • INTRODUCTION TO NETWORKING

    INTERNET is a global network

    that links computer networks around the world

    Internet is from

    Internetworking word, that meaning of communication between networks.

    a network of network.

  • INTRODUCTION TO NETWORKING

    INTRANET A contained collection of computers and

    networks within an organizations

    connecting the organization's members and/or employees to a range of computer services, resources, and information.

    firewall is used to separate the Intranet from the Internet and to get permission to access the source.

  • INTRODUCTION TO NETWORKING

    INTERNET VS INTRANET

  • Defines the way in which computers, printers, and other devices are connected.

    the layout of the wire and devices as well as the paths used by data transmissions.

    INTRODUCTION TO NETWORKING

    NETWORK TOPOLOGY

  • Commonly referred to as a linear bus, all the devices on a bus topology are connected by one single cable.

    INTRODUCTION TO NETWORKING

    BUS TOPOLOGY

  • Bus is a passive network.

    messages are usually broadcasted to every

    computer

    Computers in a network bus lines just listen in

    to find out whether there is data that is sent.

    This computer does not respond to send data to

    the computer next to it.

    If the computer fails, it does not give effect to

    the entire network.

    INTRODUCTION TO NETWORKING

    BUS TOPOLOGY

  • Advantages Disadvantages

    Quick, reliable in building a small

    network, easy to use and

    understand

    make a lot of network traffic is extremely

    slow bus. Because any computer can

    send signals at any time, these interfere

    with each other

    cable to connect your computer

    does not need much, so prices are

    cheap

    Each barrel connector will weaken the

    signal, if too many connections can result

    in signal is not received correctly

    Easy to expand the bus. Two cables

    can be connected to become

    longer with BNC barrel

    difficult to be recovered

    INTRODUCTION TO NETWORKING

    BUS TOPOLOGY

  • The star topology is the most commonly used architecture in Ethernet LANs.

    It connecting all the cables from the computer to a central location, where everything will be connected to a device known as a hub

    INTRODUCTION TO NETWORKING

    STAR TOPOLOGY

  • Each computer in a star

    topology communicate with the

    central hub that sends the

    message to the all computers

    (in a star network broadcast) or

    only to a certain destination

    computer

    INTRODUCTION TO NETWORKING

    STAR TOPOLOGY

  • Advantages disadvantages

    Easier to update and add computers in the

    stars without disrupting network

    If the central hub fails, the network

    fails

    Repairs of the network easily done in the

    center of the stars

    Requires device in the center of stars

    for rebroadcast, or convert (switch)

    network traffic

    A damaged computer does not necessarily

    affect the network

    higher price because of all the cables

    must be pulled from the center

    Can use several types of cables within the

    same network, with a hub that can accept

    different types of cables

    INTRODUCTION TO NETWORKING

    STAR TOPOLOGY

  • circuit arrangement in which

    each network device is attached

    along the same signal path to

    other devices, forming a path in

    the shape of a ring.

    Each device in the network

    (node) handles every message

    that flows through the ring.

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • Each node in the ring has a unique address.

    Since in a ring topology there is only one pathway between any two nodes, ring networks are generally disrupted by the failure of a single link.

    Similarly in the Ring topology message can travel in only one direction i.e clockwise or anticlockwise.

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • The redundant topologies are used to eliminate network downtime caused by a single point of failure.

    It is used to produce high-performance network: the network require special bandwidth for the features such as video and audio, or high performance is required when many users access the network

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • Each computer receives the signal from the

    computer next to it and send these signals to

    the next computer

    Since each computer send the signal it

    receives, then the ring topology is an active

    network.

    No terminator is required because there is no

    end in this topology

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • Since the data is transferred as a sequence

    of the same route the possibility of the

    occurrence of data collisions do not occur

    Maintenance work for this system is

    somewhat similar to the star topology.

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • Each node can be connected to the network

    and can also be removed at any time without

    affecting the whole system directly.

    But one problem is if a node fails, the whole

    network system is likely to be affected.

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • Advantages disadvantages

    As each computer is given the

    same to achieve the token,

    not a single computer can be

    a monopoly network

    The failure of a computer will cause

    a network failure

    not easy to repair if damaged

    Increase or decrease the computer

    will disrupt the network

    INTRODUCTION TO NETWORKING

    RING TOPOLOGY

  • there is only one possible path

    from one node to another node.

    If any cable in that path is

    broken, the nodes cannot

    communicate.

    INTRODUCTION TO NETWORKING

    MESH/HYBRID TOPOLOGY

  • Advantages disadvantages

    As each computer is given the

    same to achieve the token,

    not a single computer can be

    a monopoly network

    Durable, eg failure media is not

    disrupt the network when compared

    with other topologies

    It is easy to be recovered

    INTRODUCTION TO NETWORKING

    MESH/HYBRID TOPOLOGY

  • NETWORK STANDARD

    There are several organizations in the United

    States and Europe that produces standards for

    data communications and computer networks.

    The role of these organizations are only

    suggested standards.

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD The organizations are:

    a. American National Standards Institute(ANSI)

    b. Electronic Industries Alliance (EIA) and Telecommunications Industry Association (TIA)

    c. Institute of Electrical and Electronic Engineers (IEEE)

    d. International Organization for Standardization (ISO)

    e. International Telecommunication Union (ITU)

    f. Internet Society (ISOC)

    g. Internet Assigned Numbers Authority (IANA) and Internet Corporation for Assigned Names and Numbers (ICANN)

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    a. American National Standard Institute (ANSI)

    is a private organization that coordinates all

    standards organizations in the United States.

    ANSI standards are among the organizations

    involved in COMPUTER AND DATA

    COMMUNICATIONS

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    b. Electronics Industries Association (EIA)

    is an organization representing many of

    expenditures in the ELECTRONICS INDUSTRY.

    Duties and responsibilities of EIA is more

    focused on ELECTRICAL STANDARD

    includingEIA-232-D and EIA-499: important

    interface in the delivery / receipt of information

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    c. Institute of Electrical and Electronic Engineers

    (IEEE)

    is a professional organization will issue a

    standard in their respective fields and this

    standard will be adopted by consumers.

    In the computer world, better known in the

    developing IEEE standard Local Area Network

    (LAN) which is designated as IEEE 802.

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    d. Internatinal Standards Organization (ISO)

    is a voluntary organization with membership

    from several countries.

    ISO to work with other organizations such as

    CCITT and ANSI standards to create some

    standards such as HDLC (High-level data link

    control)

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    e. Internatinal Telecommunication Union (ITU)

    an intergovernmental organization through

    which public and private organizations develop

    telecommunications.

    The ITU was founded in 1865 and became a

    United Nations agency in 1947.

    INTRODUCTION TO NETWORKING

  • NETWORK STANDARD

    e. Internatinal Telecommunication Union (ITU)

    It is responsible for adopting international

    treaties, regulations and standards governing

    telecommunications.

    The standardization functions were formerly

    performed by a group within the ITU called

    CCITT, but after a 1992 reorganization the

    CCITT no longer exists as a separate entity.

    INTRODUCTION TO NETWORKING

  • INTRODUCTION TO NETWORKING

    SOURCE DESTINATIONS CHANNEL

    PRINCIPLES OF COMMUNICATION NETWORKING

  • INTRODUCTION TO NETWORKING

    SOURCE DESTINATIONS CHANNEL

    PRINCIPLES OF COMMUNICATION NETWORKING

  • INTRODUCTION TO NETWORKING

    SOURCE DESTINATIONS CHANNEL

    Message sources are people

    or electronic devices, that

    need to send a message to

    other individuals or devices.

    the media that provides the

    pathway over which the message

    can travel from source to

    destination.

    The receiver of the

    message

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Most networks has one feature in common:

    Transmitting information by breaking the original

    information into a set of message (packets)

    Transmitting packets sequentially

    Reassembling packet back into original

    information

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • In order to make sure the original message get transmitted correctly , computer networks used a set of rules:

    Establish a link

    Issue a command and command qualifier

    Acknowledgement of command

    Dissection message

    Error detection and correction

    Termination of transmission

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Establish a Link

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Establish a Link

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Establish a Link

    Each packet is a string of bits and have to travel along way over a bunch of different network

    Typically lots of computer sending and receiving information over the same network

    The information getting sent can often get altered during transmission

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Issues a command and Command Qualifier The SET NETWORK command allows to control

    information about network services on an Open system.

    Each structure defines a particular network service and contains the following information: Product name

    Manufacturer

    Type of network

    Node name

    Address(es)

    Interface(s) (OpenVMS device driver)

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Issues a command and Command Qualifier

    Vendor-specific data

    Status

    Connections

    Counters

    Start command

    Stop command

    Path to the Point-to-Point Protocol utility (PPPD)

    shareable image

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Acknowledgement of Command

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

    Router receiving

    packets from DTE A

    destined for DTE B

    Without acknowledgment

    the router forwards packets to the X.25 network and then

    forwards acknowledgments from the network back to DTE A.

    With acknowledgment

    the router can acknowledge packets received from DTE A before it has received

    acknowledgments from the network for the forwarded packets.

  • Acknowledgement of Command

    Acknowledgment is transmitted between local

    hops much faster and more efficiently than

    between end-to-end hops.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Dissection Message

    Proxies are good firewalls because the entire

    packet is dissected and each section can be

    examined for invalid data at each layer of the

    OSI model.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Dissection Message

    a proxy can examine a packet for information

    contained in everything from the packet header

    to the contents of the message.

    Attachments can also be checked for viruses.

    Messages can be searched for keywords that

    might indicate the source of a packet.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Error Detection and Correction

    Data can be corrupted during transmission.

    ERROR = Data Send Data Received

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Error Detection and Correction

    2 types of ERROR

    Single bit Error

    In a single-bit error, only 1 bit in the data unit has changed.

    Burst Error

    A burst error means that 2 or more bits in the data unit have changed.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Error Detection and Correction

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • 1 0 0 1 0 0 0 0 1 0 0

    Parity bit will be in charge to make sure Total

    bit 1 for bits words must be ODD

    8 bits words

    PARITY Bit

    MSB LSB

    1 + 1 = 2

    EVEN

    + 1 = 3

    ODD

    INTRODUCTION TO NETWORKING

    PARITY CHECK - ODD PARITY

  • Parity bit will be in charge to make sure Total

    bit 1 for bits words must be EVEN

    0 0 0 1 0 0 0 0 1 0 0

    8 bits words

    PARITY Bit

    MSB LSB

    1 + 1 = 2 + 0 = 2

    EVEN

    EVEN

    INTRODUCTION TO NETWORKING

    PARITY CHECK - EVEN PARITY

  • Method used to detect and correct error

    Need to send extra bits with data

    Redundancy bits are added by sender and removed

    by the receiver

    Allows the receiver to detect or correct corrupted bits

    INTRODUCTION TO NETWORKING

    CYCLIC REDUNDANCY CHECK

  • INTRODUCTION TO NETWORKING

    CYCLIC REDUNDANCY CHECK

    Sender Receiver

  • INTRODUCTION TO NETWORKING

    CHECKSUM Sender Receiver

    Bin Dec Dec Bin

    0111

    7 7

    0000

    1011

    11 11

    1011

    1010

    12 12

    1010

    0000

    0 0

    0000

    0110

    6

    7,11,12,0,6,9

    6

    0110

    0000

    0 9

    1001

    Sum 36 Sum 45

    Wrapped Sum 6 Wrapped Sum 15

    Checksum 9 Checksum 0

    10 0100 36 10 1101 45 10 10

    0110 6 1111 15

    1001 9 0000 0

  • Error Detection VS Error Correction Detecting Error

    Looking only to see if any error occurred.

    Correcting Error

    More difficult because need to know the exact number of bits are corrupted and more importantly the location of the message

    Number of error and size of message are also important factors

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Termination of Transmission

    each side of the connection terminating

    independently.

    When an endpoint wishes to stop its

    half of the connection, it transmits a

    FIN packet, which the other end

    acknowledges with an ACK.

    Therefore, a typical tear-down requires

    a pair of FIN and ACK segments from

    each TCP endpoint.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • Termination of Transmission

    After both FIN/ACK exchanges are

    concluded, the terminating side waits for a

    timeout before finally closing the

    connection, during which time the local

    port is unavailable for new connections;

    this prevents confusion due to delayed

    packets being delivered during

    subsequent connections.

    INTRODUCTION TO NETWORKING

    PRINCIPLES OF COMMUNICATION NETWORKING

  • INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Encoding

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

    Messages sent

    across the network

    are first converted

    into bits by the

    sending host.

    Each bit is encoded into a pattern of light waves

    or electrical impulses depending on the network

    media over which the bits are transmitted.

    The destination host receives and

    decodes the signals in order to

    interpret the message.

  • Message Encapsulation

    Messages are encapsulated before being sent to the

    appropriate location

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Formatting

    On a network messages are formatted into frames

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Formatting

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Size

    Messages have size restrictions depending on the

    channel used

    Messages must be of a particular size

    Ethernet message sizes are limited to 46-1500

    bytes

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    the amount of time from the beginning until the

    end of a message transmission.

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

    Tx Msg

    Rx Msg

    Start

    Tx Msg

    End of

    Msg

    Start

    ACK

    Time

    wait to

    Tx ACK

    Rx ready

    to listen

    for ACK

    Start listening

    Rx Msg

    Min time to

    wait Rx Msg

  • Message Timing Access method

    Determines when a message can be sent to avoid collisions

    Flow control

    Determines how much information can be sent at any given time

    Response timeout

    Determines what action to take if there is no response in a reasonable time period

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    The packet transmission time in seconds can be

    obtained from the packet size in bit and the bit rate

    in bit/s as:

    Packet transmission time = Packet size

    Bit rate

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    Example:

    Assuming 100 Mbit/s Ethernet and the maximum

    packet size of 1526 bytes. Calculate the results in

    Maximum packet transmission time?

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Timing

    Example:

    Max packet transmission = Packet size

    Bit rate

    = 1526*8 bit

    (1 Mbit/s)

    122 s

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Patterns

    a network-oriented architectural pattern

    describes how two different parts of a message

    passing system connect and communicate with

    each other.

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Message Patterns

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • My friend at Putrajaya want to send me a files

    using my PKB e-mail. After sending the email

    she identify that the files that she has attached

    cannot get through the PKB server. In a given

    scenario, identify which terminologies can be

    relate to this communication problem in

    networking .

    INTRODUCTION TO NETWORKING

    TERMINOLOGIES IN COMMUNICATION NETWORKING

  • Networking equipment typically

    refers to devices facilitating the

    use of a computer network.

    includes gateways, routers,

    bridges, switches, hubs, and

    repeaters.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • A network interface controller

    /network interface card is a

    computer hardware

    component that connects a

    computer to a computer

    network.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • NIC

    NIC provides the hardware interface between a

    computer and a network.

    A NIC technically is network adapter hardware in

    the form factor of an add-in card

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • Various types of NIC

    PCI NIC

    PCI Express NIC

    PCMCIA

    On Board NIC

    Wireless NIC

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • PCI NIC

    Peripheral Component Interconnect is an industry

    specification for connecting hardware devices to a

    computer's central processor.

    Both Ethernet and Wi-Fi network adapters for

    desktop and notebook computers commonly utilize

    PCI.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • PCI NIC

    PCI defines the electrical characteristics and signal

    protocol used for two devices to communicate over

    a computer's central bus.

    PCI network adapters and other devices exist in

    several different shapes and sizes

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • PCI Express NIC

    It is used to connect Fast Ethernet Networks

    together and it is connected to a PCI Slot located on

    your computer's Motherboard

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • PCMCIA/PC card

    Personal Computer Memory Card International Association is an industry organization best know for developing a standard network adapter using the PC Card form factor.

    PC Card form factor was designed for thinness, and PCMCIA is therefore especially used mostly in removable peripherals that connect to a laptop.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • On Board NIC

    A LAN connection or network connection

    In a desktop, NIC's, video cards, sound cards and such can be inserted into physical slots on the motherboard but in a laptop there is no room for such a configuration. All of these things are built right in to the motherboard. Some desktops integrate these things as well but still maintain the slots as described above. So, an "onboard" or integrated NIC card would not be plugged into one of these slots.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • Wireless NIC

    WNIC is a network interface controller which connects to a radio-based computer network rather than a wire-based network

    A WNIC is an essential component for wireless desktop computer.

    this card uses an antenna to communicate through microwaves.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

  • A HUB is a device

    that provides a

    central connection

    point for cables from

    workstations, servers

    and peripherals.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    HUB/SWITCH

  • multi slot

    concentrators which

    can plugged a number

    of multi-port cards to

    provide additional

    access as the network

    grows in size.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    HUB/SWITCH

  • 2 Types of HUB

    1. PASSIVE concentrators/hub

    No voltage supply

    allow the signal to pass from one computer to another without amplify the signal.

    2. ACTIVE concentrators/hub

    Need voltage supply to electrically amplify the signal as it moves from one device to another

    Act like repeaters that can extend the length of a network.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    HUB/SWITCH

  • an electronic device that

    receives a signal, cleans it of

    unnecessary noise,

    regenerates and retransmits it

    can be separate devices or they can be incorporated into a concentrator/hub.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    REPEATERS

  • it is necessary to

    regenerates the signal

    signal

    Long Distance Cable

    signal

    a signal loses strength as

    it passes along a long

    distance cable

    The repeater electrically

    amplifies the signal it

    receives and rebroadcasts it

    at a higher power level

    the signal can cover

    longer distances without

    degradation

    FUNCTION OF NETWORING HARDWARE

    REPEATERS

    INTRODUCTION TO NETWORKING

  • a device to allows segment of a large network into two smaller to reduce the amount of traffic on a networks and make the traffic more efficient.

    2nd Network

    BRIDGE

    1st Network

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

    INTRODUCTION TO NETWORKING

  • BRIDGE also can filters data traffic at a network boundary.

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

    INTRODUCTION TO NETWORKING

    2nd Network 1st Network

  • can connect the 2 network. adding new wiring scheme into an older wiring

    scheme or

    To up-date the network

    New Network Network

    BRIDGE

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

    INTRODUCTION TO NETWORKING

  • 2nd Network 1st Network

    MONITORS the information traffic on both sides of the network so that it

    can pass packets of information to the correct location.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

  • 1st Network

    2nd Network

    LISTEN" to the network and automatically figure out the address of each

    computer on both sides of the bridge.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

  • 1st Network

    2nd Network

    INSPECT each message and broadcast it on the other side of the network.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

  • 1st Network 2nd Network

    MANAGE the traffic to maintain optimum performance on both sides of the network (like

    a traffic cop at a busy intersection during rush hour.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    BRIDGE

  • A ROUTER translates information from one network to another

    it is similar to a super

    intelligent bridge.

    A ROUTER select the best path to route a message, based on the destination address and origin.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    ROUTER

  • The ROUTER can direct traffic to prevent

    head-on collisions or traffic

    It is smart enough to know when to direct

    traffic along back roads and shortcuts.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    ROUTER

  • is a network point that acts as an entrance to

    another network.

    an internetworking system capable of joining

    together two networks that use different base

    protocols.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    GATEWAY

  • The computers that

    control traffic within a

    company's network or at

    a local Internet service

    provider (ISP) are gateway

    nodes.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    GATEWAY

  • In PKBs, a computer server acting as a gateway node and it also acting as a proxy server and a firewall server.

    A gateway is often associated with both a router, which knows where to direct a given packet of data that arrives at the gateway, and a switch, which furnishes the actual path in and out of the gateway for a given packet.

    INTRODUCTION TO NETWORKING

    FUNCTION OF NETWORING HARDWARE

    GATEWAY

  • Tell the class, what is the function of

    computer network hardware?

    Name 2 out of 5 of the computer network

    hardware that u remember.

    Identify which computer network hardware

    can select the best path to bring a message,

    based on the destination address and origin.

    INTRODUCTION TO NETWORKING

    REFLECTION

  • Sketch a simple peer to peer computer

    network at your house to show connection

    between 4 individual user playing and

    sharing web game.

    INTRODUCTION TO NETWORKING

    ACTIVITIES

  • Construct a diagram of the local area

    network in JKEs Multimedia Computer Lab

    which include 40 connected PCs and 1

    shared printer. The lab have 10 Ethernet

    jack. Add any network hardware to apply to

    the connection.

    INTRODUCTION TO NETWORKING

    ACTIVITIES

  • The network in JKEs Office includes 44 connected PCs, 2 shared printers and 4 telephones with their own Ethernet jack. If there are 2 more PCs and 1 wireless router need to be add in the office but with no more Ethernet jack available. Design the connection to show the new JKEs office network. Add any network hardware to apply to the connection.

    INTRODUCTION TO NETWORKING

    ACTIVITIES

  • NEXT : TOPIC 2

    THE OPEN SYSTEM

    INTERCONNECTION (OSI)

    MODEL AND NETWORK

    PROTOCOL