SlideShare una empresa de Scribd logo
1 de 31
1
Enterprise Network Management
& Administration
BBC
Makerere University Business School
2012-2013
BWIRE SEDRICK
Introduction to computer networking
Objective:
To be acquainted with:
• The definitions of networking and concepts
• Network topology
• Network peripherals, hardware and software
Why Study Networking?
Indispensable part of modern society
 Commercial – e-commerce, banking, inventorying,
telecommunications, archiving, health
 Social – critical infrastructure, homeland security,
policing
 Human interaction/communication – email, chat,
videoconferencing, social networking, entertainment
Appears in every facet of engineering
 Modern trend – Network every (electronic) device
(computers, phones, sensors, planes, cars, TVs,
appliances, heart monitors, …) 3
Definitions
A network can be defined as two or more
computing devices connected together in such a
way that they can share resources.
The purpose of a network is to share resources.
A resource may be:
 A file, A folder, A printer, A disk drive, Or just about
anything else that exists on a computer.
Definitions (cont..)
A network is simply a collection of computers or
other hardware devices that are connected
together, either physically or logically, using
special hardware and software, to allow them to
exchange information and cooperate. Networking
is the term that describes the processes involved
in designing, implementing, upgrading, managing
and otherwise working with networks and
network technologies.
Advantages of networking
Connectivity and Communication
Data Sharing
Hardware Sharing
Internet Access
Internet Access Sharing
Data Security and Management
Performance Enhancement and Balancing
Entertainment
The Disadvantages (Costs) of Networking
Network Hardware, Software and Setup Costs
Hardware and Software Management and
Administration Costs
Undesirable Sharing
Illegal or Undesirable Behavior
Data Security Concerns
Network Classifications
Networks can be classified by either network
geography or component roles within the network.
Classification by Network Geography - Networks
are frequently classified according to the
geographical boundaries spanned by the network
itself
A local area network (LAN) is a computer network
covering a small geographic area, like a home, office, or
group of buildings
Network Classifications Cont
Wide Area Network (WAN) is a computer network that covers a
broad area (i.e., any network whose communications links cross
metropolitan, regional, or national boundaries). Or, less formally, a
network that uses routers and public communications links. The largest
and most well-known example of a WAN is the Internet.
WANs are used to connect LANs and other types of networks together, so
that users and computers in one location can communicate with users and
computers in other locations
A Metropolitan Area Network (MAN) is a network that
interconnects users in a geographic area or region larger than that covered
by even a large local area network (LAN) but smaller than the area covered
by a wide area network (WAN). The term is applied to the
interconnection of networks in a city into a single larger network. It is also
used to mean the interconnection of several local area networks by
bridging them with backbone lines. The latter usage is also sometimes
referred to as a campus network.
Fundamental Network Classifications (cont)
Wide Area Network
Fundamental Network Classifications (cont)
Metropolitan Area Network (MAN)
Classification by Component Roles
Networks can also be classified according to the roles that the
networked computers play in the network’s operation.
Peer-to-peer, server-based, and client-based are the types of
roles into which networks are classified.
Classification by Component Roles
Peer-to-peer:
 In a peer-to-peer network, all computers are considered
equal. Each computer controls its own information and
is capable of functioning as either a client or a server
depending upon the requirement. Peer-to-peer networks
are inexpensive and easy to install.
 They are popular as home networks and for use in small
companies.
Classification by Component Roles
Peer-to-peer (continued):
 Most operating systems come with built-in peer-
to-peer networking capability.
 Peer-to-peer networks become difficult to manage
when more security is added to resources, since
the users control their security by password-
protecting shares.
 Shares can be document
folders, printers, peripherals, and any other
resource that they control on their computers.
Classification by Component Roles
Peer-to-peer network
Classification by Component Roles
Server-based:
 A server-based network offers centralized control
and is designed for secure operations. In a server-
based network, a dedicated server controls the
network.
 A dedicated server is one that services the
network by storing data, applications, resources,
and also provides access to resources required by
the client. These servers can also control the
network’s security from one centralized location
or share it with other specially configured servers.
Client/Server Networking (cont..)
Classification by Component Roles
Client-based:
 Client-based network servers process requests
from clients and return just the results.
 These networks take advantage of the powerful
processing capabilities of both the client and
the server.
 Application servers and communications
servers are examples of client-based networks.
Classification by Component Roles
Client-based network
Intranet and Internet Specifications
Intranet: An intranet is a private network that is contained within
an enterprise. It may consist of many interlinked local area
networks and also use leased lines in the wide area network. An
intranet uses TCP/IP, HTTP, and other Internet protocols and in
general looks like a private version of the Internet.
Extranet – a network that connects people within your company
with people who are outside your company--all within a secure,
password-protected network that can be accessed from anywhere
Internet: is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if
they have permission, get information from any other computer
(and sometimes talk directly to users at other computers).
Network topology
A topology is a way of “laying out” the network. Topologies can
be either physical or logical.
Physical topologies describe how the cables are run.
Logical topologies describe how the network messages travel
Network topology (cont.)
Bus (can be both logical and physical)
Star (physical only)
Ring (can be both logical and physical)
Mesh (can be both logical and physical)
Network topology (cont.)
Bus
• A bus is the simplest physical topology. It consists of a
single cable that runs to every workstation. This topology
uses the least amount of cabling, but also covers the
shortest amount of distance.
• Each computer shares the same data and address path.
With a logical bus topology, messages pass through the
trunk, and each workstation checks to see if the message
is addressed to itself. If the address of the message matches
the workstation’s address, the network adapter copies the
message to the card’s on-board memory.
Network topology (cont.)
Star Topology
• A physical star topology branches each network device off
a central device called a hub, making it very easy to add a
new workstation.
• Also, if any workstation goes down it does not affect the
entire network. (But, as you might expect, if the central
device goes down, the entire network goes down.)
• Some types of Ethernet and ARCNet use a physical star
topology. Figure 8.7 gives an example of the organization
of the star network.
Network topology (cont.)
Star topologies are easy to install. A cable is run from each
workstation to the hub. The hub is placed in a central location
in the office.
Star topologies are more expensive to install than bus networks,
because there are several more cables that need to be installed,
plus the cost of the hubs that are needed.
Network topology (cont.)
Star Topology
Network topology (cont.)
Ring
• Each computer connects to two other computers,
joining them in a circle creating a unidirectional
path where messages move workstation to
workstation.
• Each entity participating in the ring reads a
message, then regenerates it and hands it to its
neighbor on a different network cable.
Network topology (cont.)
The ring makes it difficult to add new computers.
Unlike a star topology network, the ring topology network will
go down if one entity is removed from the ring.
Physical ring topology systems don’t exist much
anymore, mainly because the hardware involved was fairly
expensive and the fault tolerance was very low.
Network topology (cont.)
Mesh
• The mesh topology is the simplest logical topology in terms of data flow, but
it is the most complex in terms of physical design.
• In this physical topology, each device is connected to every other device .
This topology is rarely found in LANs, mainly because of the complexity of
the cabling.
• Because of its design, the physical mesh topology is very expensive to
install and maintain. Cables must be run from each device to every other
device. The advantage you gain from it is its high fault tolerance.
• With a logical mesh topology, however, there will always be a way of
getting the data from source to destination.
• It may not be able to take the direct route, but it can take an alternate,
indirect route. It is for this reason that the mesh topology is still found in
WANs to connect multiple sites across WAN links. It uses devices called
routersto search multiple routes through the mesh and determine the best
path.
Network topology (cont.)
Mesh Topology
Network topology (cont.)
Advantages and Disadvantages of Network Topologies
Topology Advantages Disadvantages
Bus Cheap. Easy to install. Difficult to reconfigure.
Break in bus disables entire network.
Star Cheap. Easy to install.
Easy to reconfigure. Fault tolerant.
More expensive than bus.
Ring Efficient. Easy to install. Reconfiguration difficult.
Very expensive.
Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult.
Extremely expensive. Very complex.

Más contenido relacionado

La actualidad más candente

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
David Livingston J
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)
Kapil Rode
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
Steven Cahill
 

La actualidad más candente (20)

Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Computer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhuComputer networks and its components by narender singh sandhu
Computer networks and its components by narender singh sandhu
 
WLAN
WLANWLAN
WLAN
 
networking device router,switches & bridges
networking device router,switches & bridgesnetworking device router,switches & bridges
networking device router,switches & bridges
 
Local area network
Local area networkLocal area network
Local area network
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)Computer network and networking peripherals (ITM)
Computer network and networking peripherals (ITM)
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Wan technologies
Wan technologiesWan technologies
Wan technologies
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
Computer Networking fundamentals
Computer Networking fundamentals Computer Networking fundamentals
Computer Networking fundamentals
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
networking devices
networking devicesnetworking devices
networking devices
 
Distribution File System DFS Technologies
Distribution File System DFS TechnologiesDistribution File System DFS Technologies
Distribution File System DFS Technologies
 
Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,Introduction of VLAN and VSAN with its benefits,
Introduction of VLAN and VSAN with its benefits,
 

Destacado

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
Jai Kumar
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
ali814
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
martuj
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Besar Limani
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
hazirma
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
slide_site
 

Destacado (20)

( Network topology) )final
( Network topology) )final( Network topology) )final
( Network topology) )final
 
Traffic types in internet
Traffic types in internetTraffic types in internet
Traffic types in internet
 
Ali hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber opticsAli hassan khan gurmani fiber optics
Ali hassan khan gurmani fiber optics
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Topologia estrella
Topologia estrellaTopologia estrella
Topologia estrella
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Data communication and computer networks
Data communication and computer networksData communication and computer networks
Data communication and computer networks
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
Topologies
TopologiesTopologies
Topologies
 
Components of client server application
Components of client server applicationComponents of client server application
Components of client server application
 
Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)Advanced enterprise campus design. routed access (2015 milan)
Advanced enterprise campus design. routed access (2015 milan)
 
Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Multilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design PrinciplesMultilayer Campus Architectures and Design Principles
Multilayer Campus Architectures and Design Principles
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Trends In Telecommunication Services
Trends In Telecommunication ServicesTrends In Telecommunication Services
Trends In Telecommunication Services
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Chapter 1 introduction to scaling networks
Chapter 1   introduction to scaling networksChapter 1   introduction to scaling networks
Chapter 1 introduction to scaling networks
 
Personal area networks (PAN)
Personal area networks (PAN)Personal area networks (PAN)
Personal area networks (PAN)
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Memory types
Memory typesMemory types
Memory types
 

Similar a ENTERPRISE NETWORKING

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
shiv balapure
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Anuja Lad
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
Khan Rahimeen
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
Ardit Meti
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
jeronimored
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
flyinimohamed
 

Similar a ENTERPRISE NETWORKING (20)

1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Introduction to-computer-networking
Introduction to-computer-networkingIntroduction to-computer-networking
Introduction to-computer-networking
 
1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt1-introduction-to-computer-networking.ppt
1-introduction-to-computer-networking.ppt
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide1 introduction-to-computer-networking slide
1 introduction-to-computer-networking slide
 
introduction-to-computer-networking
introduction-to-computer-networkingintroduction-to-computer-networking
introduction-to-computer-networking
 
Networking
NetworkingNetworking
Networking
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)Cisco Certified Networking Associate(Project Report)
Cisco Certified Networking Associate(Project Report)
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Lecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.pptLecture 1_Introduction to Networking_1.ppt
Lecture 1_Introduction to Networking_1.ppt
 
Networking Concepts.pdf
Networking Concepts.pdfNetworking Concepts.pdf
Networking Concepts.pdf
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 

Más de bwire sedrick

Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
bwire sedrick
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
bwire sedrick
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
bwire sedrick
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
bwire sedrick
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
bwire sedrick
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
bwire sedrick
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
bwire sedrick
 

Más de bwire sedrick (20)

Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...Effect of poor customer care on the image of police a case study of uganda po...
Effect of poor customer care on the image of police a case study of uganda po...
 
Planning for a good presentation
Planning for a good presentationPlanning for a good presentation
Planning for a good presentation
 
Marketing channels
Marketing channelsMarketing channels
Marketing channels
 
Principles of ict concepts and data processing
Principles of ict   concepts and data processingPrinciples of ict   concepts and data processing
Principles of ict concepts and data processing
 
Computer systems
Computer systemsComputer systems
Computer systems
 
Ura taxation handbook
Ura  taxation handbookUra  taxation handbook
Ura taxation handbook
 
E learning slide
E learning slideE learning slide
E learning slide
 
INTRODUCTION TO HTML
INTRODUCTION TO HTMLINTRODUCTION TO HTML
INTRODUCTION TO HTML
 
NETWORK COMPONENTS
NETWORK COMPONENTSNETWORK COMPONENTS
NETWORK COMPONENTS
 
Osi model
Osi modelOsi model
Osi model
 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
 
Strategy implementation
Strategy implementationStrategy implementation
Strategy implementation
 
Strategic management process
Strategic management processStrategic management process
Strategic management process
 
Strategic management overview
Strategic management   overviewStrategic management   overview
Strategic management overview
 
Strategic choice
Strategic choiceStrategic choice
Strategic choice
 
Industry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysisIndustry analysis, swot & portfolio analysis
Industry analysis, swot & portfolio analysis
 
Industry analysis, swot & portfolio analysis spare
Industry analysis, swot & portfolio analysis   spareIndustry analysis, swot & portfolio analysis   spare
Industry analysis, swot & portfolio analysis spare
 
Establishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan productsEstablishing sustainable markets for ugandan products
Establishing sustainable markets for ugandan products
 
Course outline
Course outlineCourse outline
Course outline
 
Busgrowth
BusgrowthBusgrowth
Busgrowth
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

ENTERPRISE NETWORKING

  • 1. 1 Enterprise Network Management & Administration BBC Makerere University Business School 2012-2013 BWIRE SEDRICK
  • 2. Introduction to computer networking Objective: To be acquainted with: • The definitions of networking and concepts • Network topology • Network peripherals, hardware and software
  • 3. Why Study Networking? Indispensable part of modern society  Commercial – e-commerce, banking, inventorying, telecommunications, archiving, health  Social – critical infrastructure, homeland security, policing  Human interaction/communication – email, chat, videoconferencing, social networking, entertainment Appears in every facet of engineering  Modern trend – Network every (electronic) device (computers, phones, sensors, planes, cars, TVs, appliances, heart monitors, …) 3
  • 4. Definitions A network can be defined as two or more computing devices connected together in such a way that they can share resources. The purpose of a network is to share resources. A resource may be:  A file, A folder, A printer, A disk drive, Or just about anything else that exists on a computer.
  • 5. Definitions (cont..) A network is simply a collection of computers or other hardware devices that are connected together, either physically or logically, using special hardware and software, to allow them to exchange information and cooperate. Networking is the term that describes the processes involved in designing, implementing, upgrading, managing and otherwise working with networks and network technologies.
  • 6. Advantages of networking Connectivity and Communication Data Sharing Hardware Sharing Internet Access Internet Access Sharing Data Security and Management Performance Enhancement and Balancing Entertainment
  • 7. The Disadvantages (Costs) of Networking Network Hardware, Software and Setup Costs Hardware and Software Management and Administration Costs Undesirable Sharing Illegal or Undesirable Behavior Data Security Concerns
  • 8. Network Classifications Networks can be classified by either network geography or component roles within the network. Classification by Network Geography - Networks are frequently classified according to the geographical boundaries spanned by the network itself A local area network (LAN) is a computer network covering a small geographic area, like a home, office, or group of buildings
  • 9. Network Classifications Cont Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network whose communications links cross metropolitan, regional, or national boundaries). Or, less formally, a network that uses routers and public communications links. The largest and most well-known example of a WAN is the Internet. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations A Metropolitan Area Network (MAN) is a network that interconnects users in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN). The term is applied to the interconnection of networks in a city into a single larger network. It is also used to mean the interconnection of several local area networks by bridging them with backbone lines. The latter usage is also sometimes referred to as a campus network.
  • 10. Fundamental Network Classifications (cont) Wide Area Network
  • 11. Fundamental Network Classifications (cont) Metropolitan Area Network (MAN)
  • 12. Classification by Component Roles Networks can also be classified according to the roles that the networked computers play in the network’s operation. Peer-to-peer, server-based, and client-based are the types of roles into which networks are classified.
  • 13. Classification by Component Roles Peer-to-peer:  In a peer-to-peer network, all computers are considered equal. Each computer controls its own information and is capable of functioning as either a client or a server depending upon the requirement. Peer-to-peer networks are inexpensive and easy to install.  They are popular as home networks and for use in small companies.
  • 14. Classification by Component Roles Peer-to-peer (continued):  Most operating systems come with built-in peer- to-peer networking capability.  Peer-to-peer networks become difficult to manage when more security is added to resources, since the users control their security by password- protecting shares.  Shares can be document folders, printers, peripherals, and any other resource that they control on their computers.
  • 15. Classification by Component Roles Peer-to-peer network
  • 16. Classification by Component Roles Server-based:  A server-based network offers centralized control and is designed for secure operations. In a server- based network, a dedicated server controls the network.  A dedicated server is one that services the network by storing data, applications, resources, and also provides access to resources required by the client. These servers can also control the network’s security from one centralized location or share it with other specially configured servers.
  • 18. Classification by Component Roles Client-based:  Client-based network servers process requests from clients and return just the results.  These networks take advantage of the powerful processing capabilities of both the client and the server.  Application servers and communications servers are examples of client-based networks.
  • 19. Classification by Component Roles Client-based network
  • 20. Intranet and Internet Specifications Intranet: An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and also use leased lines in the wide area network. An intranet uses TCP/IP, HTTP, and other Internet protocols and in general looks like a private version of the Internet. Extranet – a network that connects people within your company with people who are outside your company--all within a secure, password-protected network that can be accessed from anywhere Internet: is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • 21. Network topology A topology is a way of “laying out” the network. Topologies can be either physical or logical. Physical topologies describe how the cables are run. Logical topologies describe how the network messages travel
  • 22. Network topology (cont.) Bus (can be both logical and physical) Star (physical only) Ring (can be both logical and physical) Mesh (can be both logical and physical)
  • 23. Network topology (cont.) Bus • A bus is the simplest physical topology. It consists of a single cable that runs to every workstation. This topology uses the least amount of cabling, but also covers the shortest amount of distance. • Each computer shares the same data and address path. With a logical bus topology, messages pass through the trunk, and each workstation checks to see if the message is addressed to itself. If the address of the message matches the workstation’s address, the network adapter copies the message to the card’s on-board memory.
  • 24. Network topology (cont.) Star Topology • A physical star topology branches each network device off a central device called a hub, making it very easy to add a new workstation. • Also, if any workstation goes down it does not affect the entire network. (But, as you might expect, if the central device goes down, the entire network goes down.) • Some types of Ethernet and ARCNet use a physical star topology. Figure 8.7 gives an example of the organization of the star network.
  • 25. Network topology (cont.) Star topologies are easy to install. A cable is run from each workstation to the hub. The hub is placed in a central location in the office. Star topologies are more expensive to install than bus networks, because there are several more cables that need to be installed, plus the cost of the hubs that are needed.
  • 27. Network topology (cont.) Ring • Each computer connects to two other computers, joining them in a circle creating a unidirectional path where messages move workstation to workstation. • Each entity participating in the ring reads a message, then regenerates it and hands it to its neighbor on a different network cable.
  • 28. Network topology (cont.) The ring makes it difficult to add new computers. Unlike a star topology network, the ring topology network will go down if one entity is removed from the ring. Physical ring topology systems don’t exist much anymore, mainly because the hardware involved was fairly expensive and the fault tolerance was very low.
  • 29. Network topology (cont.) Mesh • The mesh topology is the simplest logical topology in terms of data flow, but it is the most complex in terms of physical design. • In this physical topology, each device is connected to every other device . This topology is rarely found in LANs, mainly because of the complexity of the cabling. • Because of its design, the physical mesh topology is very expensive to install and maintain. Cables must be run from each device to every other device. The advantage you gain from it is its high fault tolerance. • With a logical mesh topology, however, there will always be a way of getting the data from source to destination. • It may not be able to take the direct route, but it can take an alternate, indirect route. It is for this reason that the mesh topology is still found in WANs to connect multiple sites across WAN links. It uses devices called routersto search multiple routes through the mesh and determine the best path.
  • 31. Network topology (cont.) Advantages and Disadvantages of Network Topologies Topology Advantages Disadvantages Bus Cheap. Easy to install. Difficult to reconfigure. Break in bus disables entire network. Star Cheap. Easy to install. Easy to reconfigure. Fault tolerant. More expensive than bus. Ring Efficient. Easy to install. Reconfiguration difficult. Very expensive. Mesh Simplest. Most fault tolerant. Reconfiguration extremely difficult. Extremely expensive. Very complex.