Professional Documents
Culture Documents
Networking Fundamentals
Networking Fundamentals
COMPUTER
NETWORKING
FUNDAMENTALS
CHAPTER 1:
INTRODUCTION TO
NETWORKING
Prepared By:
Sheila/JKE/PKB
CHAPTER 1
DURATION
6 HOURS (3 weeks) – Lecture
CLO 1
Explainthe hardware and network devices to built
LAN for a specific implementation (C2)
202.188.0.133
202.188.0.134
202.188.0.138
202.188.0.137 202.188.0.135
202.188.0.136
INTRODUCTION TO NETWORKING
COMPUTER HARDWARE??
INTRODUCTION TO NETWORKING
COMPUTER HARDWARE??
Processing
Device
Input Output
HARDWARE Device
Device
Storage
Device
INTRODUCTION TO NETWORKING
COMPUTER SYSTEM?
HARDWARE
?
SOFTWARE
COMPUTER SYSTEM ??
under the control set of instructions
processes
raw data
from the user an advanced gives the result
Input electronic Output
device
saves
In the storage space
INTRODUCTION TO NETWORKING
COMPUTER NETWORK??
• Network comprise 2
or MORE computers
that have been
connected
• A group of device,
known as a node
connected to media
transmission.
INTRODUCTION TO NETWORKING
COMPUTER NETWORK??
The computers can be
geographically located
anywhere.
Enable them to
communicate with
each other and share
resources and files.
ATM
TELEKOM MALAYSIA
REPEATERS SERVER
ROUTER
HUB HUB
HUB HUB
BRIDGE
HUB BRIDGE
HUB
HUB
WORKSTATION
INTRODUCTION TO NETWORKING
Computer networks can be used for
several purposes:
Facilitating communications.
Sharing hardware.
Sharing files, data, and information.
Sharing software.
people can communicate
each computerefficiently and easily
on a network may
via : access
user mayandaccess
use hardware
data andresources
Email,
Usersinstant messaging,
on
information
connected chat
thetonetwork, rooms,
such
which
a network as printing
stored
may a
on other
Telephone, video
run application telephone
programs
document
computers calls
the and
aon
onon shared network
network.
remote
video computers.
conferencing.
printer.
INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
NETWORK COMPUTER
INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
• Connected to Printer / scanner
individually
• Stored on Workstations / Pendrive
/ CD
• Connected to internet
• Security software installed On
each computer. User keeps
security software updated.
Physical security typically poor
• Connecting teams through phone
INTRODUCTION TO NETWORKING
STAND-ALONE COMPUTER
NETWORK COMPUTER
A single stand-alone
computer can be very
useful BUT it is when
connected to other
computers that it
becomes possible to
do some of the most
powerful things.
INTRODUCTION TO NETWORKING
NETWORK COMPUTER
• Share Printer / scanner
• Stored on server . All files can be
shared
• Shared internet connection
• Security software installed on
server. Client for security software
installed on workstations. Server
auto updates workstations.
Physical security for servers good
• Connecting teams through email /
INTRODUCTION TO NETWORKING
2 TYPES of NETWORK
P2P NETWORK
CLIENT/SERVER NETWORK
INTRODUCTION TO NETWORKING
P2P NETWORK
aremore commonly
implemented where less
then ten computers are
involved and where strict
security is not necessary.
INTRODUCTION TO NETWORKING
P2P NETWORK
each computer in the
network act as both client or
server for the other
computers in the network
allowing shared access to
files/email with every other
computer on the network
and peripherals without the
need for a central server
INTRODUCTION TO NETWORKING
P2P NETWORK
allcomputers in the
network to use the same or
a compatible program to
connect to each other and
access files and other
resources found on the
other computer.
INTRODUCTION TO NETWORKING
CLIENT/SERVER NETWORK
Suitable for larger network
A computer network in which one
centralized
Powerful computer is a hub to
which many less powerful
personal computers or
workstations are connected
Clients run programs and access
data that are stored on the server
INTRODUCTION TO NETWORKING
P2P vs C/S
PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK
More time consuming to maintain the Less time consuming to maintain the
software being used (as computers must software being used (as most of the
be managed individually). maintenance is managed from the
server).
INTRODUCTION TO NETWORKING
P2P vs C/S
PEER-TO-PEER NETWORK CLIENT/SERVER NETWORK
Very low levels of security supported or High levels of security are supported, all
none at all. These can be very of which are controlled from the server.
cumbersome to set up, depending on the Such measures prevent the deletion of
operating system being used. essential system files or the changing of
settings.
Ideal for networks with less than 10 No limit to the number of computers that
computers. can be supported by the network.
Does not require a server. Requires a server running a server
operating system.
Demands a moderate level of skill to Demands that the network administrator
administer the network. has a high level of IT skills with a good
working knowledge of a server operating
system.
INTRODUCTION TO NETWORKING
8 Backbone
10. Topology
1. Server
7. Connectivity
Device 2 . Client
Novell NetWare.
INTRODUCTION TO NETWORKING
CATEGORIES OF NETWORK
WIDE AREA
a Alarger
group
the network
largest NETWORK
of computers that share a common
than LAN
network
connection
high speed
connects computer
in a small usersininthe
area or even a particular
same
geographic
building METROPOLITAN
area or region.
very expensive to setup
AREA NETWORK
an office or home network
smaller than a WAN.
Can send data, audio and video at long distances around the world.
INTRODUCTION TO NETWORKING
INTERNET
is a global network
that links computer
networks around the
world
Internet is from
„Internetworking‟
word, that meaning
of communication
between networks.
a network of
network.
INTRODUCTION TO NETWORKING
INTRANET
A contained collection of computers and
networks within an organizations
connecting the organization's members
and/or employees to a range of computer
services, resources, and information.
firewall is used to separate the Intranet from
the Internet and to get permission to access
the source.
INTRODUCTION TO NETWORKING
INTERNET VS INTRANET
INTRODUCTION TO NETWORKING
NETWORK TOPOLOGY
Defines
the way in which computers, printers, and other
devices are connected.
the layout of the wire and devices as well as the
paths used by data transmissions.
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
Commonly referred to as a
linear bus, all the devices on a
bus topology are connected by
one single cable.
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
Bus is a passive network.
messages are usually broadcasted to every
computer
Computers in a network bus lines just listen in
to find out whether there is data that is sent.
This computer does not respond to send data to
the computer next to it.
If the computer fails, it does not give effect to
the entire network.
INTRODUCTION TO NETWORKING
BUS TOPOLOGY
Advantages Disadvantages
Quick, reliable in building a small make a lot of network traffic is extremely
network, easy to use and slow bus. Because any computer can
understand send signals at any time, these interfere
with each other
cable to connect your computer Each barrel connector will weaken the
does not need much, so prices are signal, if too many connections can result
cheap in signal is not received correctly
Easy to expand the bus. Two cables difficult to be recovered
can be connected to become
longer with BNC barrel
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
The star topology is the
most commonly used
architecture in Ethernet
LANs.
It connecting all the cables
from the computer to a
central location, where
everything will be
connected to a device
known as a hub
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
Each computer in a star
topology communicate with the
central hub that sends the
message to the all computers
(in a star network broadcast) or
only to a certain destination
computer
INTRODUCTION TO NETWORKING
STAR TOPOLOGY
Advantages disadvantages
Easier to update and add computers in the If the central hub fails, the network
stars without disrupting network fails
Repairs of the network easily done in the Requires device in the center of stars
center of the stars for rebroadcast, or convert (switch)
network traffic
A damaged computer does not necessarily higher price because of all the cables
affect the network must be pulled from the center
RING TOPOLOGY
circuit arrangement in which
each network device is attached
along the same signal path to
other devices, forming a path in
the shape of a ring.
Each device in the network
(node) handles every message
that flows through the ring.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each node in the ring has a unique
address.
Since in a ring topology there is only
one pathway between any two nodes,
ring networks are generally disrupted
by the failure of a single link.
Similarly in the Ring topology
message can travel in only one
direction i.e clockwise or
anticlockwise.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
The redundant topologies are used
to eliminate network downtime
caused by a single point of failure.
It is used to produce high-
performance network: the network
require special bandwidth for the
features such as video and audio,
or high performance is required
when many users access the
network
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each computer receives the signal from the
computer next to it and send these signals to
the next computer
Since each computer send the signal it
receives, then the ring topology is an active
network.
No terminator is required because there is no
end in this topology
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Since the data is transferred as a sequence
of the same route the possibility of the
occurrence of data collisions do not occur
Maintenance work for this system is
somewhat similar to the star topology.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Each node can be connected to the network
and can also be removed at any time without
affecting the whole system directly.
But one problem is if a node fails, the whole
network system is likely to be affected.
INTRODUCTION TO NETWORKING
RING TOPOLOGY
Advantages disadvantages
As each computer is given the The failure of a computer will cause
same to achieve the token, a network failure
not a single computer can be
a monopoly network
MESH/HYBRID TOPOLOGY
there is only one possible path
from one node to another node.
If any cable in that path is
broken, the nodes cannot
communicate.
INTRODUCTION TO NETWORKING
MESH/HYBRID TOPOLOGY
Advantages disadvantages
As each computer is given the Durable, eg failure media is not
same to achieve the token, disrupt the network when compared
not a single computer can be with other topologies
a monopoly network
It is easy to be recovered
INTRODUCTION TO NETWORKING
NETWORK STANDARD
NETWORK STANDARD
a. American National Standard Institute (ANSI)
is a private organization that coordinates all
standards organizations in the United States.
ANSI standards are among the organizations
involved in COMPUTER AND DATA
COMMUNICATIONS
INTRODUCTION TO NETWORKING
NETWORK STANDARD
b. Electronics Industries Association (EIA)
is an organization representing many of
expenditures in the ELECTRONICS INDUSTRY.
Duties and responsibilities of EIA is more
focused on ELECTRICAL STANDARD
includingEIA-232-D and EIA-499: important
interface in the delivery / receipt of information
INTRODUCTION TO NETWORKING
NETWORK STANDARD
c. Institute of Electrical and Electronic Engineers
(IEEE)
is a professional organization will issue a
standard in their respective fields and this
standard will be adopted by consumers.
In the computer world, better known in the
developing IEEE standard Local Area Network
(LAN) which is designated as IEEE 802.
INTRODUCTION TO NETWORKING
NETWORK STANDARD
d. Internatinal Standards Organization (ISO)
is a voluntary organization with membership
from several countries.
ISO to work with other organizations such as
CCITT and ANSI standards to create some
standards such as HDLC (High-level data link
control)
INTRODUCTION TO NETWORKING
NETWORK STANDARD
e. Internatinal Telecommunication Union (ITU)
an intergovernmental organization through
which public and private organizations develop
telecommunications.
The ITU was founded in 1865 and became a
United Nations agency in 1947.
INTRODUCTION TO NETWORKING
NETWORK STANDARD
e. Internatinal Telecommunication Union (ITU)
It is responsible for adopting international
treaties, regulations and standards governing
telecommunications.
The standardization functions were formerly
performed by a group within the ITU called
CCITT, but after a 1992 reorganization the
CCITT no longer exists as a separate entity.
INTRODUCTION TO NETWORKING
PRINCIPLES
OF COMMUNICATION
NETWORKING
CHANNEL
SOURCE DESTINATIONS
INTRODUCTION TO NETWORKING
PRINCIPLES
OF COMMUNICATION
NETWORKING
CHANNEL
SOURCE DESTINATIONS
INTRODUCTION TO NETWORKING
PRINCIPLESOF COMMUNICATION
NETWORKING
the media that provides the
pathway over which the message
can travel from source to
destination.
SOURCE DESTINATIONS
CHANNEL
Message sources are people The receiver of the
or electronic devices, that message
need to send a message to
other individuals or devices.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Most networks has one feature in common:
Transmitting information by breaking the original
information into a set of message (packets)
Transmitting packets sequentially
Connections
Counters
Startcommand
Stop command
With acknowledgment
the router can acknowledge packets received from DTE A before it has received
acknowledgments from the network for the forwarded packets.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Acknowledgement of Command
Acknowledgment is transmitted between local
hops much faster and more efficiently than
between end-to-end hops.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Dissection Message
Proxies are good firewalls because the entire
packet is dissected and each section can be
examined for invalid data at each layer of the
OSI model.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Dissection Message
a proxy can examine a packet for information
contained in everything from the packet header
to the contents of the message.
Attachments can also be checked for viruses.
Messages can be searched for keywords that
might indicate the source of a packet.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Error Detection and Correction
Data can be corrupted during transmission.
Burst Error
A burst error means that 2 or more bits in the data unit have
changed.
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Error Detection and Correction
INTRODUCTION TO NETWORKING
LSB 0 0 1 0 0 0 0 1 0 0 1 MSB
8 bits words
INTRODUCTION TO NETWORKING
LSB 0 0 0 0 0 0 0 1 0 0 1 MSB
8 bits words
INTRODUCTION TO NETWORKING
CHECKSUM
Sender Receiver
Bin Dec Dec Bin
0111 0000
7 7
1011 1011
11 11
1010 1010
12 12
0000 0000
0 0
0110 0110
6 6
0000 1001
0 7,11,12,0,6,9 9
Sum 36 Sum 45
Wrapped Sum 6 Wrapped Sum 15
Checksum 9 Checksum 0
10 0100 36 10 1101 45
10 10
0110 6 1111 15
1001 9 0000 0
INTRODUCTION TO NETWORKING
PRINCIPLES OF COMMUNICATION
NETWORKING
Error Detection VS Error Correction
Detecting Error
Looking only to see if any error occurred.
Correcting Error
More difficult because need to know the exact number of
bits are corrupted and more importantly the location of
the message
Number of error and size of message are also important
factors
INTRODUCTION TO NETWORKING
PRINCIPLES
OF COMMUNICATION
NETWORKING
Termination of Transmission
each side of the connection terminating
independently.
When an endpoint wishes to stop its
half of the connection, it transmits a
FIN packet, which the other end
acknowledges with an ACK.
Therefore, a typical tear-down requires
a pair of FIN and ACK segments from
each TCP endpoint.
INTRODUCTION TO NETWORKING
PRINCIPLES
OF COMMUNICATION
NETWORKING
Termination of Transmission
After both FIN/ACK exchanges are
concluded, the terminating side waits for a
timeout before finally closing the
connection, during which time the local
port is unavailable for new connections;
this prevents confusion due to delayed
packets being delivered during
subsequent connections.
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING The destination host receives and
decodes the signals in order to
Message Encoding interpret the message.
Messages sent
across the network Each bit is encoded into a pattern of light waves
are first converted or electrical impulses depending on the network
into bits by the media over which the bits are transmitted.
sending host.
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Encapsulation
Messages are encapsulated before being sent to the
appropriate location
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Formatting
On a network messages are formatted into frames
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Formatting
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Size
Messages have size restrictions depending on the
channel used
Messages must be of a particular size
Start
Tx Msg
Start
Start listening Min time to ACK
Rx Msg
Rx Msg wait Rx Msg
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Timing
Access method
Determines when a message can be sent to avoid
collisions
Flow control
Determines how much information can be sent at any
given time
Response timeout
Determines what action to take if there is no response in a
reasonable time period
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Timing
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Timing
The packet transmission time in seconds can be
obtained from the packet size in bit and the bit rate
in bit/s as:
Packet transmission time = Packet size
Bit rate
INTRODUCTION TO NETWORKING
TERMINOLOGIES IN COMMUNICATION
NETWORKING
Message Timing
Example:
PCMCIA
On Board NIC
Wireless NIC
INTRODUCTION TO NETWORKING
signal signal
Long Distance Cable
INTRODUCTION TO NETWORKING
1st Network
BRIDGE
INTRODUCTION TO NETWORKING
1st Network
2nd Network
INTRODUCTION TO NETWORKING
1st Network
2nd Network
INTRODUCTION TO NETWORKING
REFLECTION
Tell the class, what is the function of
computer network hardware?
Name 2 out of 5 of the computer network
hardware that u remember.
Identify which computer network hardware
can select the best path to bring a message,
based on the destination address and origin.
INTRODUCTION TO NETWORKING
ACTIVITIES
ACTIVITIES
ACTIVITIES