Grade 11 - Week 7 Infosheet The Basic of Networking

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

TVL/ Computer Systems Servicing 11

SETTING-UP COMPUTER NETWORKS (SUCN)

After completing this lesson, you should be able to:


1. know the basics of networking;
2. Understand Internet Protocol
3. Compare the difference among network;
4. Enumerate and explain different OSI layers
5. Appreciate the importance of the basics of networking and OSI layers.

THE BASIC OF NETWORKING


The first computer network was invented when ancient mathematicians associated their abacuses or abaci with kite string
so they could immediately share their information with each other. The concept of linking these devices over the years have
become the very foundation of the concept of computer network nowadays.

Throughout the years, the longing for a better and faster way of sharing information have become more complicated.
Instead of using strings, people use electrical cables to connect devices to each other. Nowadays, we use fiber optic cables and
wireless radio signal for faster communication. Whether we use strings or cables, the purpose remains the same: sharing
information and getting work done faster.

This Lesson describes the basics of what computer networking is and how it works.

DEFINING A NETWORK

A network is a collection of computers and devices connected together so that they can exchange information (like email
messages and documents) or share resources (like disk storage and printers). A network can be internal to an organization or
company or span the world by connecting to the Internet.

WHY DO BUSINESSMEN CREATE THEIR OWN NETWORK?

● Facilitate communications

No one would ever deny the fact that communication is more efficient in the business industry when using a network. It
would be an advantage for a businessman to communicate over a network which is faster than a physical mail sent through the
mailbox. People communicate efficiently and easily via email, instant messaging, chat rooms, blogs, wikis, online social
networks, video calls, online meetings, videoconferencing, Voice over IP, wireless messaging services etc. Some messages might
occur within an internal network or maybe in a secured network communication.

● Share Hardware

Each computer or device connected to a network can be provided access to hardware over the network. For example,
each computer and mobile device user can access a printer on the network every time they need it. It would be easier and
cheaper to install one printer that could be use by all computers in a network than to install one printer for each computer in a
company. Thus, home and business users create networks to save money on hardware expenses.

● Share Data and Information

1
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

In a network, any authorized users can access data and information like files, proposals, financial reports, confidential
information about the contract, memorandum and even the customers’ information stored over a network. Most businesses
use a standard such as EDI (Electronic Data Interchange) that defines how business documents can be transmitted across a
network. For instance, they use EDI to send bids and proposals or place and track orders like sending a sales invoice.

● Share Software

Similar with sharing hardware resources, any authorized users connected to a network can also access the servers’
software resource. For example, the whole network now is sharing resources on a particular software like MS Office, Photoshop,
GIMP etc.

To support multiple users’ software access, vendors like Microsoft often sell versions of their software designed to run on
a network. The network versions of software may cost less than buying individual copies. It depends on the network license a
company would purchase. Network License is a legal agreement that allows multiple users to access the software on a server
simultaneously. The fee usually is based on the number of computers attached to a network.

● Transfer Fund

Everyone knows about the GCASH or Paymaya and how it works. Both application use a standard called EFT (Electronic
Fund Transfer) that allows users connected to a network exchange money from one account to another. Other examples include
wire transfers, use of credit cards and debit cards, online banking and online bill payment.

VALUE-ADDED NETWORK

Instead of using the Internet or investing in and administering an internal network, some companies hire a value-added
network provider for network functions. A value-added network (VAN) provider is a third-party business that provides network
services such as EDI services, secure data and information transfer, storage, or email. A VAN is a closed network, which means
only members of the network can access the data. Typical provider of VANs includes the telecommunication companies, industry
groups and specialized service providers.

NETWORK TOPOLOGY

A network topology refers to the layout of the computers and devices in a communication network. The three basic
network topologies are star, bus and ring. Most networks, including the internet, use the combinations of these basic topologies.

Star Network Topology

2
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

https://www.sciencedirect.com/topics/computer-science/star-topology

● All of the computers and devices on a star network connects to a central device. This central device may be a hub or a
switch.
● Any devices or computers connected to a network is called a node.
● All the data that has been transmitted from one node will pass through the central device before reaching the other node.
● Nodes can be added or removed from the network with little or no disruption to the entire network.
● Star network are fairly easy to install and maintain.

What will happen if a node or the central device fails on a star network? If one node fails, only that node is affected. The
other nodes continue to operate normally. However, if the central device fails, the entire network is inoperable until the
device is repaired.

Bus Network Topology

http://www.telecomabc.com/b/bus-topology.html

● The bus has a single central cable (physical cable) to which all computers and other devices connected.
● It transmits data, instructions and information in both directions.
● Bus network are cheap and easy to install.  Computers and devices can be attached or detached at any point on the bus.
● Failure of one device usually does not affect the rest of the bus network.

What is the greatest risk to a bus network? If the bus itself become inoperable, the network remains inoperable until the bus
is back in working order.

Ring Network Topology

3
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

https://www.computerhope.com/jargon/r/ringtopo.htm

● On a ring network, a cable forms a closed loop (ring) with all computers and devices.
● Data is being transmitted from one device to other around the entire ring in one direction.  If one computer on a ring
network fails, the entire network could stop functioning.

Introduction Internet Protocol


INTRODUCTION Have you ever thought about how messages gets from one place to another each time you are
using your email over the Internet?

Our language is very different from the language that a computer uses. So the messages that we create need to
be translated from an alphabetic text into an electronic signal before they can be sent. This translation is handled in the
computer by the separate modules in the communication protocol. These protocols or rules of conduct usually
communicate with two or more modules. Therefore, they are best described as layers in a stack of protocols.

These layers are the application, presentation, session, transport, network, data-link and physical layers. It is often
referred to as the OSI seven-layer model.

All People Seem To Need Data Processing is not only a fact of life, it’s also a mnemonic to help computer network
technicians remember the OSI model and help isolate problems when troubleshooting networks.

Even though the OSI model utilizes the TCP/IP protocol, the model was originally designed by the Open Systems
Interconnection group to promote the OSI protocol in its attempt to create a standardized network architecture for
network communications. Unfortunately, though the OSI protocol supported more virtual addresses, its complexity made
the TCP/IP protocol the more popular choice among network technicians. Ironically, the simplicity of the TCP/IP protocol
has led to IPv4 address exhaustion and its newer IPv6 protocol very much resembles the original OSI protocol in
complexity.

The Open System Interconnection Reference Model (OSI Reference Model or OSI Model) is an abstract description
for layered communications and computer network protocol design. It was developed as part of the Open Systems
Interconnection (OSI) initiative.

4
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

OSI Layer

APPLICATION LAYER

The application layer is the user interface that internet users interact with to send or receive data through email,
online games, peer to peer file transfer, and other applications.

Common protocols associated with the application layer: Hypertext Transfer Protocol (TTP), Hypertext Transfer
Protocol Secure (HTTPS), Telnet, Secure Shell (SSH), File Transfer Protocol (FTP), Trivial File Transfer Protocol (TFTP),
Simple Mail Transfer Protocol (SMTP), Post Office Protocol 3 (POP3), Dynamic Host Configuration Protocol (DHCP), Domain
Name System (DNS), Network Time Protocol (NTP).

PRESENTATION LAYER

The presentation layer translates the commands received from the application layer into universal, well-known
networking formats. Think of the presentation layer as a more effective version of Google Translate but for networks. This
is the layer where data encryption and character set conversion occur. Common protocols: Joint Photographic Experts
Group (JPEG), Graphics Interchange Format (GIF),(Tagged Image Format File (TIFF), Moving Picture Experts Group (MPEG),
American Standards Code for Information Interchange [ASCII], Extended Binary Coded Decimal Interchange Code
[EBCDIC], Secure Sockets Layer (SSL), Hyperxt Transfer Protocol (HTTP), HyperText MarkUp Language (HTML), File Transfer
Protocol (FTP) AppleTalk Filing Protocols, JAVA

SESSION LAYER

In order for a packet to reach its destination, the session layer establishes a “mechanism for opening, closing and
managing a session between end-user application processes and responses”. The session layer makes it possible to
establish an open communication line to send the requested packets. This layer can be compared to making a phone call
and having the other person pick up the phone. Without another party on the line, no food-related or network-related
conversation would occur.

SINGLE MODE HALF DUPLEX FULL-DUPLEX

One device transmits at a time until MODE Device takes turns transmitting When the device can transmit and
all the information has been such as occurs when speaking receive information simultaneously,
completely sent through walkie talkies such as in a phone conversation

TRANSPORT LAYER

The transport layer not only defines how data is sent, but also provides validation and firewall security. You can
think of the transport layer as quality control. Suspicious packets will not make it past a firewall. Similarly, suspicious
looking pizzas will not go out for delivery.

TRANSMISSION CONTROL PROTOCOL USER DATAGRAM PROTOCOL

Connection Oriented Connectionless Oriente

5
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

3 way Handshake During an unreliable session, lost packets will not be


resent so as to avoid disrupting live communication

During a reliable session, lost packets will be re-sent Examples: VoIP, (TFTP) and online multi player games

Examples: E-mail (SMTP) and File Transfer Protocol (FTP)

Other Functions:

• Flow control

• Error detection

• Correction

Common protocols: Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Sequenced Packet
Exchange (SPX), Name-Binding Protocol (NBP)

NETWORK LAYER

The network layer seeks for the best-known path to route information to reach its destination similar to searching
for an address on a GPS. In the same way that the network layer determines the best way to route information, our pizza
delivery person will rely on a GPS to map out a customer’s location.

LOGICAL ADDRESSING DATA ENCAPSULATION FRAGMENTATION AND RE-ASSEMBLY

These virtual IP addresses help packets The router encapsulates data with a When packets are too large, the layer is
navigate a network to reach their header with a source and destination IP responsible for defragmenting
destination using IPv4 or IPv6 protocols address information into sizable chunks for the
Data Link Layer

DATA LINK LAYER

The Data Link Layer ensures that a transmission occurs without any errors. The Data Link Layer consists of two sub-
layers, Logical Link Control (LLC) and the Media Access Control (MAC), that ensure a successful transmission across different
mediums.

6
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

One of the major functions of the data link layer is to provide a physical MAC address so that requested information
can find its destination. Without a physical address, our pizza delivery man would not be able to complete his delivery.
Preparing network layer packets for delivery:

LOGICAL LINK CONTROL (LLC) MEDIA ACCESS CONTROL (MAC)

The LLC subplayer frames bits and bytes and encapsulates The MAC address, also known as the physical address is a
data with a header and trailer as shown below. 48-bit address burnt onto the Network Interface Card (NIC).

Common protocols: Ethernet, Token Ring, Fiber Distributed Data Interface (FDDI), and Point-to-Point Protocol
(PPP), Frame Relay, and Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

PHYSICAL LAYER

The physical layer consists of the physical components in a Local Area Network (LAN) such as networking hardware
and Ethernet cables. Cabling issues in the physical layer sometimes emerge due to the wrong types of cables (straight through
vs. cross over cables) used or faulty cables.

The physical layer comprises of the physical hardware components in a network. In this final step, our now starving
customer will receive her delivery. Common protocols: Fast Ethernet, RS232, and ATM

Reference

Vermaat, S. Sebok, S., and Freund, S. 2014. Discovering Computers: Technology in a World of Computers, Mobile Devices, and
the Internet. Boston: Course Technology, Cengage Learning

http://www.environment.nsw.gov.au/resources/heritagebranch/heritage /maintenanc e21risingdamp.pdf

https://www.scribd.com/document/317539266/computer-sciencecompetence- based-syllabus-final-printing-version

https://www.scribd.com/document/317079621/Network-pdf

https://www.versatek.com/blog/you-wont-believe-what-the-osi-modeland-pizza- have-in-common/

https://en.wikibooks.org/wiki/Network_Plus_Certification/Management/ OSI_Model

http://www.gargasz.info/osi-model-how-internet-works/

https://blog.dotnetframework.org/2015/05/21/wireshark-supportedprotocols-how- many-have-you-heard-of/

https://www.computernetworkingnotes.com/networking-tutorials/typesof-network- protocols-explained-with-functions.html

http://cpassignments.blogspot.com/2015/05/introduction-data-linklayer-is-layer- 2.html

7
TVL/ Computer Systems Servicing 11
SETTING-UP COMPUTER NETWORKS (SUCN)

You might also like