SlideShare a Scribd company logo
1 of 44
CSC341 – NETWORK
MANAGEMENT
Jahan University
Computer Science Department
Lecturer: Islahuddin Jalal
Master in Cyber Security
10/2/2015Jahan University 1
Topics to be discussed
 What is network? Types and levels of network
 Living in the OSI model world, h/w used in network
 Basic TCP/IP: fundamentals
 Basic TCP/IP:TCP and UDP communications
10/2/2015Jahan University 2
Class Policy
 A student must reach the class-room in time. Late comers may join the class
but are not entitled to be marked present.
 Attendance shall be marked at the start of the class and students failing to
secure 75% attendance will not be allowed to sit in final exam.
 The assignment submission deadline must be observed. In case of late
submission, ten percent may be deducted from each day.
 Those who are absent on the announcement date of the assignment/test.
Must get the topic/chapter of test/assignment confirmed through their peers.
 Mobile phones must be switched-off in the class-rooms.
10/2/2015Jahan University 3
Grading Evaluation for Network Management
Internal Evaluation
Midterm Exam 20%
Attendance 5%
Assignment/Presentations 5%
Quizzes/Tests 10%
Total Internal Evaluation 40%
Final-term Examination
Final-term Exam 60%
Total Marks 100%
10/2/2015Jahan University 4
What is Network?
 A collection of computing devices that are connected in various ways in order
to communicate and share resources
Usually, the connections between computers in a network are made using
physical wires or cables
However, some connections are wireless, using radio waves or infrared signals
 The generic term node or host refers to any device on a network
 Data transfer rate The speed with which data is moved from one place on a
network to another
 Data transfer rate is a key issue in computer networks
10/2/2015Jahan University 5
Types of Network
 There are three main types of Networks
 LAN A network that connects a relatively small number of
machines in a relatively close geographical area
 MAN The communication infrastructures that have been
developed in and around large cities
 WAN A network that connects two or more local-area
networks over a potentially large geographic distance
Often one particular node on a LAN is set up to serve as a
gateway to handle all communication going between that
LAN and other networks
10/2/2015Jahan University 6
Types of Network
 HAN A network contained within a user's home that connects a
person's digital devices.
 VPN A network that is constructed by using public wires — usually
the Internet — to connect to a private network, such as a
company's internal network.
 SAN A high-speed network of storage devices that also connects
those storage devices with servers
Communication between networks is called internetworking
The Internet, as we know it today, is essentially the ultimate
wide-area network, spanning the entire globe
10/2/2015Jahan University 7
Network Topologies
 Network Topology: Physical layout of a network is called network topology.
 There are different types of network topologies
 Star Topology
 Bus Topology
 Ring Topology
 Mesh Topology
 Hybrid topology
10/2/2015Jahan University 8
Star Topology
 All the computers are connected through a central connection point (hub,
switch etc)
 A single break in the cable would only take down communication to one
computer
 As hub failure would take down the entire network
10/2/2015Jahan University 9
Bus Topology
 All the computers are connected in straight line
 Terminators must be used at each end of a bus segment to prevent signals
from bouncing
 A single break in the cable would take down the entire network
10/2/2015Jahan University 10
Ring Topology
 All the computers are connected in circular fashion
 Data is passed around the ring from computers to computer
 A break in the cable would take down the entire network
10/2/2015Jahan University 11
Mesh Topology
 All the computers are connected to all other computers
 Typicallly used in a WAN environment
 Provides fault tolerance in the event of a connection failure
10/2/2015Jahan University 12
Hybrid Topology
 Different types of topologies can be used together to form a hybrid topology.
10/2/2015Jahan University 13
Questions Regarding Topologies
 Which kinds of network topologies connect all devices to a central device?
 What kind of network topology is this?
 What kind of network topologies is used in 802.11 wireless network?
10/2/2015Jahan University 14
Basic Network
10/2/2015Jahan University 15
Hub
Pamir Khkula
How would you say the
PC named Pamir
communicates with the
PC named Khkula?
“Hey Khkula, I love you”
or
“Hey 192.168.0.3, I love
you”
Which one is right?
Both are wrong But why?
Basic Networking
 Because Pamir is actually going to use Khkula’s MAC address
 But what would happen if pamir only knows her name and doesn’t know her IP
address and Mac Address?
 Pamir query
Khkula Response
10/2/2015Jahan University 16
This Problem is solved by
ARP
Source Destination protocol Info
192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2
Source Destination protocol Info
192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e
192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
Questions
 What would happen if the network grows and grows and become a large
network?
 What would be the solution?
 What is the Process to split a larger network into a smaller Networks?
 Which devices are needed for network Segmentation?
10/2/2015Jahan University 17
The Network speed become low
To split the network into a smaller Network
Network Segmentation
Routers, Switches and Bridges
Network Appliances
 Load balancer
 Proxy Server
 Content filter
 VPN Concentrator
 Cache Engine
 WAN Optimizer
10/2/2015Jahan University 18
Load Balancer
 A load balancer is a device that acts as a reverse proxy and distributes
network or application traffic across a number of servers. Load balancers are
used to increase capacity (concurrent users) and reliability of applications.
10/2/2015Jahan University 19
Proxy Server
 Functions as an intermediary b/w a web browser and the internet
 E.g. Tor (application)
10/2/2015Jahan University 20
Content filter
 Can be S.W and H.W
 Prevent access to certain items harmful if opened or accessed
 The most common items to filter are executables, emails or websites.
 E.g Firewall
10/2/2015Jahan University 21
VPN Concentrator
 Networking device like router
 Specifically designed for creating and managing VPN communication
infrastructures
 Provides secure creation of VPN connections and delivery of messages b/w
VPN nodes
10/2/2015Jahan University 22
Cache Engine
 Also called cache server
 Save web pages or other internet content locally
 By placing previously requested information in temporary storage
 Speeds up access to data and reduces demand on an enterprise’s bandwidth.
10/2/2015Jahan University 23
WAN Optimizer
 WAN Optimization = WAN acceleration
 It is a device used to maximize the efficiency of data flow across a WAN
 Increase the speed of access to critical applications and information
10/2/2015Jahan University 24
Assignment (Network Devices)
 Define all Network devices along with their functions and advantages and
disadvantages using Internet, books, conference paper, journals etc.
10/2/2015Jahan University 25
Internetworking Model
 OSI Reference Model (ISO)
 TCP/IP suite (DARPA)
10/2/2015Jahan University 26
OSI Reference Model
10/2/2015Jahan University 27
OSI Reference Model (late 1970)
 Why OSI model came into being?
 Before 1970s computers on the network communicate only with other computers of
the same manufacturer e.g IBM devices communicate only with IBM devices.
 To breakup this barrier, the ISO brought up OSI Model
What is OSI Reference Model?
 The OSI model is the primary architectural model for networks
 It describes how data and network information are communicated from an
application on computer, through the network media, to an application on
another computer.
 The OSI Reference model break up this approach into seven layers
Please Do Not Throw Sausage Pizza Away
 Physical Layer (1)
 Data Link Layer (2)
 Network Layer (3)
 Transport Layer (4)
 Session Layer (5)
 Presentation Layer (6)
 Application Layer (7)
Application Layer (7)
 Provide a user interface
 To allow access network resources
 Also responsible for identifying and establishing the availability of the
intended communication partner and determining whether sufficient
resources for the intended communication exist.
 Protocols are
 FTP, SMTP, HTTP etc
Presentation Layer (6)
 Presents data to the Application layer
 Responsible for
 data translation
 Data encryption and compression
 Protocols are
 ASCII, MPEG, JPEG etc
Session Layer (5)
 Responsible for setting up, managing and tearing down the sessions.
 It also provide dialogue control b/w devices or nodes
 It coordinates communication between systems, and serves to organize their
communication by offering three different modes such as
 Simplex
 Half duplex
 Full duplex
 Protocols are RPC, NFS (to allow transparent access to network resources) etc
Transport Layer (4)
 Segment and reassemble data into a data stream
 Establish a logical connection b/w sending host and receiving host
 Provides reliable or unreliable delivery
 Data integrity is ensured by maintaining flow control
 Performs error correction before retransmit
 Protocols are
 TCP
 UDP
 etc
Flow Control
 Data integrity is ensured
 Prevents a sending host from overflowing the buffer in the receiving host
 Properties of flow control
 The segments delivered are acknowledged back to the sender upon their reception
 Any segments not acknowledged are retransmitted
 Segments are sequenced back into their proper order upon arrival at their
destination
 A manageable data flow is maintained in order to avoid congestion, overloading
and data lost
10/2/2015Jahan University 35
Connection-oriented communication
10/2/2015Jahan University 36
Three-way Handshake
 The first “connection agreement” segment is a request for synchronization
 The next segments acknowledge the request and establish connection
parameters – the rules- b/w hosts. These segments request that the receiver’s
sequencing is synchronized here as well so that a bidirectional connection is
formed
 The final segment is also an acknowledgment. It notifies the destination host
that the connection agreement has been accepted and that the actual
connection has been established. Data transfer can now begin.
10/2/2015Jahan University 37
Characteristics of connection oriented
communication
 A virtual circuit is set up
 It uses sequencing
 It uses acknowledgements
 It uses flow control
10/2/2015Jahan University 38
TCP Flags (TCP control bits)
 SYN
 ACK
 PSH
 URG
 FIN
 RST
10/2/2015Jahan University 39
Network Layer (3)
 Also called layer 3
 Provides logical addressing which routers use for path determination
 Track the location of the devices on the network, determine the best way to
move data
 Routers are specified at this layer
 Protocol is IP
Data Link Layer (2)
 Combine packets into bytes and bytes into frames
 Provides access to media using MAC address
 Performs error detection not correction
 Protocols are
 Ethernet (to share the same bandwidth among all hosts)
 Token Ring(circulating in the ring)
 etc
Sublayers of Data link layer
 MAC (Media Access Control):
 Defines how packets are placed on the media.
 Every one share the same bandwidth
 Error Notification is done here
 LLC (Logical Link Control)
 Identifying network layer protocols
 LLC header Inform the data link layer what to do with the frames when received.
 Also provide flow control and sequencing of control bits
10/2/2015Jahan University 42
Physical Layer (1)
 Moves bits between devices
 Specifies voltage, wire speed
 Pin-out of cables
END
Thanks for
hearing…………………….

More Related Content

What's hot

Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7AfiqEfendy Zaen
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes SAhammedShakil
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed SystemSunita Sahu
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP AddressingKushal Sheth
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)Ismail Mukiibi
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionShubham Khedekar
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcastNetProtocol Xpert
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing marwan aldulaimy
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsPeter R. Egli
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesRubal Sagwal
 

What's hot (20)

Wifi & 802.11 Standards
Wifi & 802.11 StandardsWifi & 802.11 Standards
Wifi & 802.11 Standards
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Network Security Chapter 7
Network Security Chapter 7Network Security Chapter 7
Network Security Chapter 7
 
Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes Distributed system Tanenbaum chapter 1,2,3,4 notes
Distributed system Tanenbaum chapter 1,2,3,4 notes
 
Introduction to Distributed System
Introduction to Distributed SystemIntroduction to Distributed System
Introduction to Distributed System
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Lan network
Lan networkLan network
Lan network
 
Mac addresses(media access control)
Mac addresses(media access control)Mac addresses(media access control)
Mac addresses(media access control)
 
TCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer DescriptionTCP/IP Protocols With All Layer Description
TCP/IP Protocols With All Layer Description
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Unicast multicast & broadcast
Unicast multicast & broadcastUnicast multicast & broadcast
Unicast multicast & broadcast
 
Firewalls
FirewallsFirewalls
Firewalls
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing Osi , tcp/ip protocol and Addressing
Osi , tcp/ip protocol and Addressing
 
RARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE ProtocolsRARP, BOOTP, DHCP and PXE Protocols
RARP, BOOTP, DHCP and PXE Protocols
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Application Layer
Application Layer Application Layer
Application Layer
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 

Similar to Csc341 – Lecture 1 network management

Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Lakeisha Jones
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdfDakshBaveja
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture NotesFellowBuddy.com
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Renee Jones
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxmashfiqislam
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheHansa Edirisinghe
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptdeeplearning6
 

Similar to Csc341 – Lecture 1 network management (20)

Csc339 – lecture 1 network fundamental
Csc339 – lecture 1 network fundamentalCsc339 – lecture 1 network fundamental
Csc339 – lecture 1 network fundamental
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
C C N A Day1
C C N A  Day1C C N A  Day1
C C N A Day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
OSI Layer
OSI LayerOSI Layer
OSI Layer
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
Open Systems Interconnection
Open Systems InterconnectionOpen Systems Interconnection
Open Systems Interconnection
 
CN project 713711699701-5.pdf
CN project 713711699701-5.pdfCN project 713711699701-5.pdf
CN project 713711699701-5.pdf
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
nv.ppt
nv.pptnv.ppt
nv.ppt
 
Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
CN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.pptCN Module 1 ppt final 20.08.2020.ppt
CN Module 1 ppt final 20.08.2020.ppt
 

More from Kabul Education University

More from Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
ITIL # Lecture 8
ITIL # Lecture 8ITIL # Lecture 8
ITIL # Lecture 8
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
ITIL # Lecture 7
ITIL # Lecture 7ITIL # Lecture 7
ITIL # Lecture 7
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
ITIL # Lecture 6
ITIL # Lecture 6ITIL # Lecture 6
ITIL # Lecture 6
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
ITIL # Lecture 5
ITIL # Lecture 5ITIL # Lecture 5
ITIL # Lecture 5
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
ITIL # Lecture 4
ITIL # Lecture 4ITIL # Lecture 4
ITIL # Lecture 4
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
ITIL # Lecture 3
ITIL # Lecture 3ITIL # Lecture 3
ITIL # Lecture 3
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
ITIL # Lecture 2
ITIL # Lecture 2ITIL # Lecture 2
ITIL # Lecture 2
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
ITIL # Lecture 1
ITIL # Lecture 1ITIL # Lecture 1
ITIL # Lecture 1
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Csc341 – Lecture 1 network management

  • 1. CSC341 – NETWORK MANAGEMENT Jahan University Computer Science Department Lecturer: Islahuddin Jalal Master in Cyber Security 10/2/2015Jahan University 1
  • 2. Topics to be discussed  What is network? Types and levels of network  Living in the OSI model world, h/w used in network  Basic TCP/IP: fundamentals  Basic TCP/IP:TCP and UDP communications 10/2/2015Jahan University 2
  • 3. Class Policy  A student must reach the class-room in time. Late comers may join the class but are not entitled to be marked present.  Attendance shall be marked at the start of the class and students failing to secure 75% attendance will not be allowed to sit in final exam.  The assignment submission deadline must be observed. In case of late submission, ten percent may be deducted from each day.  Those who are absent on the announcement date of the assignment/test. Must get the topic/chapter of test/assignment confirmed through their peers.  Mobile phones must be switched-off in the class-rooms. 10/2/2015Jahan University 3
  • 4. Grading Evaluation for Network Management Internal Evaluation Midterm Exam 20% Attendance 5% Assignment/Presentations 5% Quizzes/Tests 10% Total Internal Evaluation 40% Final-term Examination Final-term Exam 60% Total Marks 100% 10/2/2015Jahan University 4
  • 5. What is Network?  A collection of computing devices that are connected in various ways in order to communicate and share resources Usually, the connections between computers in a network are made using physical wires or cables However, some connections are wireless, using radio waves or infrared signals  The generic term node or host refers to any device on a network  Data transfer rate The speed with which data is moved from one place on a network to another  Data transfer rate is a key issue in computer networks 10/2/2015Jahan University 5
  • 6. Types of Network  There are three main types of Networks  LAN A network that connects a relatively small number of machines in a relatively close geographical area  MAN The communication infrastructures that have been developed in and around large cities  WAN A network that connects two or more local-area networks over a potentially large geographic distance Often one particular node on a LAN is set up to serve as a gateway to handle all communication going between that LAN and other networks 10/2/2015Jahan University 6
  • 7. Types of Network  HAN A network contained within a user's home that connects a person's digital devices.  VPN A network that is constructed by using public wires — usually the Internet — to connect to a private network, such as a company's internal network.  SAN A high-speed network of storage devices that also connects those storage devices with servers Communication between networks is called internetworking The Internet, as we know it today, is essentially the ultimate wide-area network, spanning the entire globe 10/2/2015Jahan University 7
  • 8. Network Topologies  Network Topology: Physical layout of a network is called network topology.  There are different types of network topologies  Star Topology  Bus Topology  Ring Topology  Mesh Topology  Hybrid topology 10/2/2015Jahan University 8
  • 9. Star Topology  All the computers are connected through a central connection point (hub, switch etc)  A single break in the cable would only take down communication to one computer  As hub failure would take down the entire network 10/2/2015Jahan University 9
  • 10. Bus Topology  All the computers are connected in straight line  Terminators must be used at each end of a bus segment to prevent signals from bouncing  A single break in the cable would take down the entire network 10/2/2015Jahan University 10
  • 11. Ring Topology  All the computers are connected in circular fashion  Data is passed around the ring from computers to computer  A break in the cable would take down the entire network 10/2/2015Jahan University 11
  • 12. Mesh Topology  All the computers are connected to all other computers  Typicallly used in a WAN environment  Provides fault tolerance in the event of a connection failure 10/2/2015Jahan University 12
  • 13. Hybrid Topology  Different types of topologies can be used together to form a hybrid topology. 10/2/2015Jahan University 13
  • 14. Questions Regarding Topologies  Which kinds of network topologies connect all devices to a central device?  What kind of network topology is this?  What kind of network topologies is used in 802.11 wireless network? 10/2/2015Jahan University 14
  • 15. Basic Network 10/2/2015Jahan University 15 Hub Pamir Khkula How would you say the PC named Pamir communicates with the PC named Khkula? “Hey Khkula, I love you” or “Hey 192.168.0.3, I love you” Which one is right? Both are wrong But why?
  • 16. Basic Networking  Because Pamir is actually going to use Khkula’s MAC address  But what would happen if pamir only knows her name and doesn’t know her IP address and Mac Address?  Pamir query Khkula Response 10/2/2015Jahan University 16 This Problem is solved by ARP Source Destination protocol Info 192.168.0.2 Broadcast ARP Who has 192.168.0.3? Tell 192.168.0.2 Source Destination protocol Info 192.168.0.3 192.168.0.2 ARP 192.168.0.3 is at 00:0b:db:99:d3:5e 192.168.0.3 192.168.0.2 NBNS Name query response NB 192.168.0.3
  • 17. Questions  What would happen if the network grows and grows and become a large network?  What would be the solution?  What is the Process to split a larger network into a smaller Networks?  Which devices are needed for network Segmentation? 10/2/2015Jahan University 17 The Network speed become low To split the network into a smaller Network Network Segmentation Routers, Switches and Bridges
  • 18. Network Appliances  Load balancer  Proxy Server  Content filter  VPN Concentrator  Cache Engine  WAN Optimizer 10/2/2015Jahan University 18
  • 19. Load Balancer  A load balancer is a device that acts as a reverse proxy and distributes network or application traffic across a number of servers. Load balancers are used to increase capacity (concurrent users) and reliability of applications. 10/2/2015Jahan University 19
  • 20. Proxy Server  Functions as an intermediary b/w a web browser and the internet  E.g. Tor (application) 10/2/2015Jahan University 20
  • 21. Content filter  Can be S.W and H.W  Prevent access to certain items harmful if opened or accessed  The most common items to filter are executables, emails or websites.  E.g Firewall 10/2/2015Jahan University 21
  • 22. VPN Concentrator  Networking device like router  Specifically designed for creating and managing VPN communication infrastructures  Provides secure creation of VPN connections and delivery of messages b/w VPN nodes 10/2/2015Jahan University 22
  • 23. Cache Engine  Also called cache server  Save web pages or other internet content locally  By placing previously requested information in temporary storage  Speeds up access to data and reduces demand on an enterprise’s bandwidth. 10/2/2015Jahan University 23
  • 24. WAN Optimizer  WAN Optimization = WAN acceleration  It is a device used to maximize the efficiency of data flow across a WAN  Increase the speed of access to critical applications and information 10/2/2015Jahan University 24
  • 25. Assignment (Network Devices)  Define all Network devices along with their functions and advantages and disadvantages using Internet, books, conference paper, journals etc. 10/2/2015Jahan University 25
  • 26. Internetworking Model  OSI Reference Model (ISO)  TCP/IP suite (DARPA) 10/2/2015Jahan University 26
  • 28. OSI Reference Model (late 1970)  Why OSI model came into being?  Before 1970s computers on the network communicate only with other computers of the same manufacturer e.g IBM devices communicate only with IBM devices.  To breakup this barrier, the ISO brought up OSI Model
  • 29. What is OSI Reference Model?  The OSI model is the primary architectural model for networks  It describes how data and network information are communicated from an application on computer, through the network media, to an application on another computer.  The OSI Reference model break up this approach into seven layers
  • 30. Please Do Not Throw Sausage Pizza Away  Physical Layer (1)  Data Link Layer (2)  Network Layer (3)  Transport Layer (4)  Session Layer (5)  Presentation Layer (6)  Application Layer (7)
  • 31. Application Layer (7)  Provide a user interface  To allow access network resources  Also responsible for identifying and establishing the availability of the intended communication partner and determining whether sufficient resources for the intended communication exist.  Protocols are  FTP, SMTP, HTTP etc
  • 32. Presentation Layer (6)  Presents data to the Application layer  Responsible for  data translation  Data encryption and compression  Protocols are  ASCII, MPEG, JPEG etc
  • 33. Session Layer (5)  Responsible for setting up, managing and tearing down the sessions.  It also provide dialogue control b/w devices or nodes  It coordinates communication between systems, and serves to organize their communication by offering three different modes such as  Simplex  Half duplex  Full duplex  Protocols are RPC, NFS (to allow transparent access to network resources) etc
  • 34. Transport Layer (4)  Segment and reassemble data into a data stream  Establish a logical connection b/w sending host and receiving host  Provides reliable or unreliable delivery  Data integrity is ensured by maintaining flow control  Performs error correction before retransmit  Protocols are  TCP  UDP  etc
  • 35. Flow Control  Data integrity is ensured  Prevents a sending host from overflowing the buffer in the receiving host  Properties of flow control  The segments delivered are acknowledged back to the sender upon their reception  Any segments not acknowledged are retransmitted  Segments are sequenced back into their proper order upon arrival at their destination  A manageable data flow is maintained in order to avoid congestion, overloading and data lost 10/2/2015Jahan University 35
  • 37. Three-way Handshake  The first “connection agreement” segment is a request for synchronization  The next segments acknowledge the request and establish connection parameters – the rules- b/w hosts. These segments request that the receiver’s sequencing is synchronized here as well so that a bidirectional connection is formed  The final segment is also an acknowledgment. It notifies the destination host that the connection agreement has been accepted and that the actual connection has been established. Data transfer can now begin. 10/2/2015Jahan University 37
  • 38. Characteristics of connection oriented communication  A virtual circuit is set up  It uses sequencing  It uses acknowledgements  It uses flow control 10/2/2015Jahan University 38
  • 39. TCP Flags (TCP control bits)  SYN  ACK  PSH  URG  FIN  RST 10/2/2015Jahan University 39
  • 40. Network Layer (3)  Also called layer 3  Provides logical addressing which routers use for path determination  Track the location of the devices on the network, determine the best way to move data  Routers are specified at this layer  Protocol is IP
  • 41. Data Link Layer (2)  Combine packets into bytes and bytes into frames  Provides access to media using MAC address  Performs error detection not correction  Protocols are  Ethernet (to share the same bandwidth among all hosts)  Token Ring(circulating in the ring)  etc
  • 42. Sublayers of Data link layer  MAC (Media Access Control):  Defines how packets are placed on the media.  Every one share the same bandwidth  Error Notification is done here  LLC (Logical Link Control)  Identifying network layer protocols  LLC header Inform the data link layer what to do with the frames when received.  Also provide flow control and sequencing of control bits 10/2/2015Jahan University 42
  • 43. Physical Layer (1)  Moves bits between devices  Specifies voltage, wire speed  Pin-out of cables