SlideShare una empresa de Scribd logo
1 de 48
Chapter 9A
Network Basics
Instructor : Shakra MehakInstructor : Shakra Mehak
Department Of Information TechnologyDepartment Of Information Technology
Network Definition
• Set of technologies that connects computers
• Allows communication and collaboration between
users
9A-
2
The Uses of a Network
• Simultaneous access to data
• Data files are shared
• Access can be limited
• Shared files stored on a server
• Software can be shared
• Site licenses
• Network versions
• Application servers
9A-
3
The Uses of a Network
• Shared peripheral device
• Printers and faxes are common shares
• Reduces the cost per user
• Devices can be connected to the network
• Print servers control network printing
• Manage the print queue
9A-
4
Sharing Data
9A-
5
File server contains documentsFile server contains documents
used by other computers.used by other computers.
The Uses of a Network
• Personal communication
• Email
• Instantaneous communication
• Conferencing
• Tele conferencing
• Videoconferencing
• Audio-conferencing
• Data-conferencing
• Voice over IP
• Phone communication over network wires
9A-
6
Voice Over IP
9A-
7
The Uses of a Network
• Easier data backup
• Backup copies data to removable media
• Server data backed up in one step
9A-
8
Common Network Types
• Local Area Network (LAN)
• Contains printers, servers and computers
• Systems are close to each other
• Contained in one office or building
• Organizations often have several LANS
9A-
9
Common Network Types
• Wide Area Networks (WAN)
• Two or more LANs connected
• Over a large geographic area
• Typically use public or leased lines
• Phone lines
• Satellite
• The Internet is a WAN
9A-
10
Hybrid Network Types
• Campus Area Networks (CAN)
• A LAN in one large geographic area
• Resources related to the same organization
• Each department shares the LAN
9A-
11
Hybrid Network Types
• Metropolitan Area Network (MAN)
• Large network that connects different organizations
• Shares regional resources
• A network provider sells time
9A-
12
Hybrid Network Types
• Home Area Network (HAN)
• Small scale network
• Connects computers and entertainment appliances
• Found mainly in the home
9A-
13
Hybrid Network Types
• Personal Area Network (PAN)
• Very small scale network
• Range is very limited
• Cell phones, PDAs, MP3 players
9A-
14
How Networks Are Structured
• Server based network
• Node is any network device
• Servers control what the node accesses
• Users gain access by logging in
• Server is the most important computer
9A-
15
How Networks Are Structured
• Client/Server network
• Nodes and servers share data roles
• Nodes are called clients
• Servers are used to control access
• Database software
• Access to data controlled by server
• Server is the most important computer
9A-
16
How Networks Are Structured
• Peer to peer networks (P2PN)
• All nodes are equal
• Nodes access resources on other nodes
• Each node controls its own resources
• Most modern OS allow P2PN
• Distributing computing is a form
• Kazaa(Kazaa Media Desktop was commonly used to exchange MP3
 music files and other file types, such as videos, applications, and
documents over the Internet.) 9A-
17
Network Topologies
• Topology
• Logical layout of wires and equipment
• Choice affects
• Network performance
• Network size
• Network collision detection
• Several different types
9A-
18
Network Topologies
• Packets
• Pieces of data transmitted over a network
• Packets are created by sending node
• Data is reassembled by receiving node
• Packet header
• Sending and receiving address
• Packet payload
• Number and size of data
• Actual data
• Packet error control
9A-
19
Network Topologies
• Bus topology
• Also called linear bus
• One wire connects all nodes
• Terminator ends the wires
• Advantages
• Easy to setup
• Small amount of wire
• Disadvantages
• Slow
• Easy to crash
9A-
20
Network Topologies
• Star topology
• All nodes connect to a hub
• Packets sent to hub
• Hub sends packet to destination
• Advantages
• Easy to setup
• One cable can not crash network
• Disadvantages
• One hub crashing downs entire network
• Uses lots of cable
• Most common topology
9A-
21
Star Topology
9A-
22
Network Topologies
• Ring topology
• Nodes connected in a circle
• Tokens used to transmit data
• Nodes must wait for token to send
• Advantages
• Time to send data is known
• No data collisions
• Disadvantages
• Slow
• Lots of cable
9A-
23
Network Topologies
• Mesh topology
• All computers connected together
• Internet is a mesh network
• Advantage
• Data will always be delivered
• Disadvantages
• Lots of cable
• Hard to setup
9A-
24
Mesh Topology
9A-
25
Network Media
• Links that connect nodes
• Choice impacts
• Speed
• Security
• Size
9A-
26
Wire Based Media
• Twisted-pair cabling
• Most common LAN
cable
• Called Cat5 or 100BaseT
• Four pairs of copper
cable twisted
• May be shielded from
interference
• Speeds range from
1 Mbps to 1,000 Mbps
9A-
27
Wire Based Media
• Coaxial cable
• Similar to cable TV wire
• One wire runs through cable
• Shielded from interference
• Speeds up to 10 Mbps
• Nearly obsolete
9A-
28
Wire Based Media
• Fiber-optic cable
• Data is transmitted with
light pulses
• Glass strand instead of
cable
• Immune to interference
• Very secure
• Hard to work with
• Speeds up to
100 Gbps
9A-
29
Wireless Media
• Data transmitted through the air
• LANs use radio waves
• WANs use microwave signals
• Easy to setup
• Difficult to secure
9A-
30
Network Hardware
• Network interface cards
• Network adapter
• Connects node to the media
• Unique Machine Access Code (MAC)
9A-
31
Network Hardware
• Network linking devices
• Connect nodes in the network
• Cable runs from node to device
• Crossover cable connects two computers
9A-
32
Network Hardware
• Hubs
• Center of a star network
• All nodes receive transmitted packets
• Slow and insecure
9A-
33
Network Hardware
• Switches
• Replacement for hubs
• Only intended node receives transmission
• Fast and secure
9A-
34
Network Hardware
• Bridge
• Connects two or more LANs together
• Packets sent to remote LAN cross
• Other packets do not cross
• Segments the network on MAC addresses
9A-
35
Network Hardware
• Router
• Connects two or more LANs together
• Packets sent to remote LAN cross
• Network is segmented by IP address
• Connect internal networks to the Internet
• Need configured before installation
9A-
36
Network Hardware
• Gateway
• Connects two dissimilar networks
• Connects coax to twisted pair
• Most gateways contained in other devices
9A-
37
Network Cabling
• Cabling specifications
• Bandwidth measures cable speed
• Typically measured in Mbps
• Maximum cable length
• Connector describes the type of plug
9A-
38
Network Cabling
• Ethernet
• Very popular cabling technology
• 10 Base T, 10Base2, 10Base5
• Maximum bandwidth 10 Mbps
• Maximum distances100 to 500 meters
9A-
39
Network Cabling
• Fast Ethernet
• Newer version of Ethernet
• Bandwidth is 100 Mbps
• Uses Cat5 or greater cable
• Sometimes called 100Base T
• Requires a switch
9A-
40
Network Cabling
• Gigabit Ethernet
• High bandwidth version of Ethernet
• 1 to 10 Gbps
• Cat 5 or fiber optic cable
• Video applications
9A-
41
Network Cabling
• Token ring
• Uses shielded twisted pair cabling
• Bandwidth between 10 and 25 Mbps
• Uses a multiple access unit (MAU)
• Popular in manufacturing and finance
9A-
42
Network Protocols
• Language of the network
• Rules of communication
• Error resolution
• Defines collision and collision recovery
• Size of packet
• Naming rules for computers
9A-
43
Network Protocols
• TCP/IP
• Transmission Control Protocol/Internet Protocol
• Most popular protocol
• Machines assigned a name of 4 numbers
• IP address
• 209.8.166.179 is the White House’s web site
• Dynamic Host Configuration Protocol
• Simplifies assignment of IP addresses
• Required for Internet access
9A-
44
Network Protocols
• IPX/SPX
• Internet Packet Exchange/Sequenced Packet Exchange
• Older protocol
• Associated with Novell Netware
• Replaced by TCP/IP
9A-
45
Network Protocols
• NetBEUI
• Network BIOS Extended User Interface
• Used by Windows to name computers
• Transmission details handled by TCP/IP
9A-
46
Network Protocols
• Token ring
• Popular in manufacturing and finance
• Nodes communicate when they have the token
9A-
47
Chapter 9A
End of Chapter

Más contenido relacionado

La actualidad más candente (20)

Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5
 
Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
Networking Chapter 16
Networking Chapter 16Networking Chapter 16
Networking Chapter 16
 
MVA slides lesson 1
MVA slides lesson 1MVA slides lesson 1
MVA slides lesson 1
 
Networking Chapter 12
Networking Chapter 12Networking Chapter 12
Networking Chapter 12
 
98 366 mva slides lesson 5
98 366 mva slides lesson 598 366 mva slides lesson 5
98 366 mva slides lesson 5
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
98 366 mva slides lesson 7
98 366 mva slides lesson 798 366 mva slides lesson 7
98 366 mva slides lesson 7
 
Networking Chapter 13
Networking Chapter 13Networking Chapter 13
Networking Chapter 13
 
Chap1 networking
Chap1 networkingChap1 networking
Chap1 networking
 
98 366 mva slides lesson 8
98 366 mva slides lesson 898 366 mva slides lesson 8
98 366 mva slides lesson 8
 
MVA slides lesson 7
MVA slides lesson 7MVA slides lesson 7
MVA slides lesson 7
 
MVA slides lesson 3
MVA slides lesson 3MVA slides lesson 3
MVA slides lesson 3
 
Understanding local area networking
Understanding local area networkingUnderstanding local area networking
Understanding local area networking
 
MVA slides lesson 5
MVA slides lesson 5MVA slides lesson 5
MVA slides lesson 5
 
Week 3
Week 3Week 3
Week 3
 
MVA slides lesson 2
MVA slides lesson 2MVA slides lesson 2
MVA slides lesson 2
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 

Destacado

Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basicsanandraje
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basicsDavid Busby, CISSP
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architectureMuhammad ismail Shah
 
Musica & Mercado Revista #18
Musica & Mercado Revista #18Musica & Mercado Revista #18
Musica & Mercado Revista #18Música & Mercado
 
Catalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaCatalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaĐỗ Bá Tùng
 
Servifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaServifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaCIT Marbella
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule
 
Open source software to assist lower socio economic
Open source software to assist lower socio economicOpen source software to assist lower socio economic
Open source software to assist lower socio economicMaurice Dawson
 
Legio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationLegio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationvalerio italia
 
Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Jose Martin Sosa Granados
 
Sistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariaSistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariambformacion
 
Supporting the Digital Scholar: Experiences from the British Library Labs
Supporting the Digital Scholar:Experiences from the British Library LabsSupporting the Digital Scholar:Experiences from the British Library Labs
Supporting the Digital Scholar: Experiences from the British Library Labslabsbl
 
La canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralLa canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralcamiloroblesc
 

Destacado (20)

Mobile Security Basics
Mobile Security BasicsMobile Security Basics
Mobile Security Basics
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Plmce mysql-101-security-basics
Plmce mysql-101-security-basicsPlmce mysql-101-security-basics
Plmce mysql-101-security-basics
 
Network security chapter 6 and 7 internet architecture
Network security chapter  6 and 7 internet   architectureNetwork security chapter  6 and 7 internet   architecture
Network security chapter 6 and 7 internet architecture
 
Musica & Mercado Revista #18
Musica & Mercado Revista #18Musica & Mercado Revista #18
Musica & Mercado Revista #18
 
Catalogue Sản phẩm Cassida
Catalogue Sản phẩm CassidaCatalogue Sản phẩm Cassida
Catalogue Sản phẩm Cassida
 
Servifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT MarbellaServifone - IV Negocio Abierto Provincial CIT Marbella
Servifone - IV Negocio Abierto Provincial CIT Marbella
 
Programa de intercambio de estudiantes del consorcio para la colaboración en ...
Programa de intercambio de estudiantes del consorcio para la colaboración en ...Programa de intercambio de estudiantes del consorcio para la colaboración en ...
Programa de intercambio de estudiantes del consorcio para la colaboración en ...
 
Bulling
BullingBulling
Bulling
 
Fax machine3
Fax machine3Fax machine3
Fax machine3
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Yolimar
YolimarYolimar
Yolimar
 
Open source software to assist lower socio economic
Open source software to assist lower socio economicOpen source software to assist lower socio economic
Open source software to assist lower socio economic
 
Legio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communicationLegio xiii vs panthers parma : american football teams -business communication
Legio xiii vs panthers parma : american football teams -business communication
 
Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014Cartel curso defensa policial contra arma blanca 2014
Cartel curso defensa policial contra arma blanca 2014
 
Feliz navidad prospero_2014
Feliz navidad prospero_2014Feliz navidad prospero_2014
Feliz navidad prospero_2014
 
Sistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestariaSistemas de financiación y gestión presupuestaria
Sistemas de financiación y gestión presupuestaria
 
Supporting the Digital Scholar: Experiences from the British Library Labs
Supporting the Digital Scholar:Experiences from the British Library LabsSupporting the Digital Scholar:Experiences from the British Library Labs
Supporting the Digital Scholar: Experiences from the British Library Labs
 
La canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coralLa canica ingravida (recuperacion) camilo coral
La canica ingravida (recuperacion) camilo coral
 

Similar a Network basics

Similar a Network basics (20)

Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Intro Ch 09A.ppt
Intro Ch 09A.pptIntro Ch 09A.ppt
Intro Ch 09A.ppt
 
Network basics
Network basicsNetwork basics
Network basics
 
Network basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.pptNetwork basicsssssssssssssssssssssss.ppt
Network basicsssssssssssssssssssssss.ppt
 
Chapter 9A
Chapter 9AChapter 9A
Chapter 9A
 
Computernetworks.ppt
Computernetworks.pptComputernetworks.ppt
Computernetworks.ppt
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
 
Computernet.ppt
Computernet.pptComputernet.ppt
Computernet.ppt
 
Computernetworksss.ppt
Computernetworksss.pptComputernetworksss.ppt
Computernetworksss.ppt
 
Network basics
Network basicsNetwork basics
Network basics
 
Networkuses.ppt
Networkuses.pptNetworkuses.ppt
Networkuses.ppt
 
VOip.ppt
VOip.pptVOip.ppt
VOip.ppt
 
Commonnetwork.ppt
Commonnetwork.pptCommonnetwork.ppt
Commonnetwork.ppt
 
Networktypes.ppt
Networktypes.pptNetworktypes.ppt
Networktypes.ppt
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Basic networking
Basic networkingBasic networking
Basic networking
 
NETWORKS.pptx
NETWORKS.pptxNETWORKS.pptx
NETWORKS.pptx
 

Último

fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project17mos052
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch17mos052
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhidelhiescort
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxReaper61
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsSocioCosmos
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT17mos052
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesNetqom Solutions
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenSapana Sha
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!andrekr997
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxjenrobinson12
 

Último (19)

young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
fraud storyboards powerpoint media project
fraud storyboards powerpoint media projectfraud storyboards powerpoint media project
fraud storyboards powerpoint media project
 
The--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media PitchThe--Fraud: Netflix Original Media Pitch
The--Fraud: Netflix Original Media Pitch
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏩7838079806 ⏩Escort Service In Patel Nagar Delhi
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptx
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the StarsUnveiling SOCIO COSMOS: Where Socializing Meets the Stars
Unveiling SOCIO COSMOS: Where Socializing Meets the Stars
 
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Ramesh Nagar🔝 9953056974 🔝 Delhi escort Service
 
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECTTHE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
THE FRAUD NETFLIX ORIGINAL MEDIA PITCH PROJECT
 
Amplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing ServicesAmplify Your Brand with Our Tailored Social Media Marketing Services
Amplify Your Brand with Our Tailored Social Media Marketing Services
 
O9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking MenO9654467111 Call Girls In Shahdara Women Seeking Men
O9654467111 Call Girls In Shahdara Women Seeking Men
 
Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!Protecting Your Little Explorer at Home!
Protecting Your Little Explorer at Home!
 
Music Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptxMusic Video Codes and Conventions 2 .pptx
Music Video Codes and Conventions 2 .pptx
 

Network basics

  • 1. Chapter 9A Network Basics Instructor : Shakra MehakInstructor : Shakra Mehak Department Of Information TechnologyDepartment Of Information Technology
  • 2. Network Definition • Set of technologies that connects computers • Allows communication and collaboration between users 9A- 2
  • 3. The Uses of a Network • Simultaneous access to data • Data files are shared • Access can be limited • Shared files stored on a server • Software can be shared • Site licenses • Network versions • Application servers 9A- 3
  • 4. The Uses of a Network • Shared peripheral device • Printers and faxes are common shares • Reduces the cost per user • Devices can be connected to the network • Print servers control network printing • Manage the print queue 9A- 4
  • 5. Sharing Data 9A- 5 File server contains documentsFile server contains documents used by other computers.used by other computers.
  • 6. The Uses of a Network • Personal communication • Email • Instantaneous communication • Conferencing • Tele conferencing • Videoconferencing • Audio-conferencing • Data-conferencing • Voice over IP • Phone communication over network wires 9A- 6
  • 8. The Uses of a Network • Easier data backup • Backup copies data to removable media • Server data backed up in one step 9A- 8
  • 9. Common Network Types • Local Area Network (LAN) • Contains printers, servers and computers • Systems are close to each other • Contained in one office or building • Organizations often have several LANS 9A- 9
  • 10. Common Network Types • Wide Area Networks (WAN) • Two or more LANs connected • Over a large geographic area • Typically use public or leased lines • Phone lines • Satellite • The Internet is a WAN 9A- 10
  • 11. Hybrid Network Types • Campus Area Networks (CAN) • A LAN in one large geographic area • Resources related to the same organization • Each department shares the LAN 9A- 11
  • 12. Hybrid Network Types • Metropolitan Area Network (MAN) • Large network that connects different organizations • Shares regional resources • A network provider sells time 9A- 12
  • 13. Hybrid Network Types • Home Area Network (HAN) • Small scale network • Connects computers and entertainment appliances • Found mainly in the home 9A- 13
  • 14. Hybrid Network Types • Personal Area Network (PAN) • Very small scale network • Range is very limited • Cell phones, PDAs, MP3 players 9A- 14
  • 15. How Networks Are Structured • Server based network • Node is any network device • Servers control what the node accesses • Users gain access by logging in • Server is the most important computer 9A- 15
  • 16. How Networks Are Structured • Client/Server network • Nodes and servers share data roles • Nodes are called clients • Servers are used to control access • Database software • Access to data controlled by server • Server is the most important computer 9A- 16
  • 17. How Networks Are Structured • Peer to peer networks (P2PN) • All nodes are equal • Nodes access resources on other nodes • Each node controls its own resources • Most modern OS allow P2PN • Distributing computing is a form • Kazaa(Kazaa Media Desktop was commonly used to exchange MP3  music files and other file types, such as videos, applications, and documents over the Internet.) 9A- 17
  • 18. Network Topologies • Topology • Logical layout of wires and equipment • Choice affects • Network performance • Network size • Network collision detection • Several different types 9A- 18
  • 19. Network Topologies • Packets • Pieces of data transmitted over a network • Packets are created by sending node • Data is reassembled by receiving node • Packet header • Sending and receiving address • Packet payload • Number and size of data • Actual data • Packet error control 9A- 19
  • 20. Network Topologies • Bus topology • Also called linear bus • One wire connects all nodes • Terminator ends the wires • Advantages • Easy to setup • Small amount of wire • Disadvantages • Slow • Easy to crash 9A- 20
  • 21. Network Topologies • Star topology • All nodes connect to a hub • Packets sent to hub • Hub sends packet to destination • Advantages • Easy to setup • One cable can not crash network • Disadvantages • One hub crashing downs entire network • Uses lots of cable • Most common topology 9A- 21
  • 23. Network Topologies • Ring topology • Nodes connected in a circle • Tokens used to transmit data • Nodes must wait for token to send • Advantages • Time to send data is known • No data collisions • Disadvantages • Slow • Lots of cable 9A- 23
  • 24. Network Topologies • Mesh topology • All computers connected together • Internet is a mesh network • Advantage • Data will always be delivered • Disadvantages • Lots of cable • Hard to setup 9A- 24
  • 26. Network Media • Links that connect nodes • Choice impacts • Speed • Security • Size 9A- 26
  • 27. Wire Based Media • Twisted-pair cabling • Most common LAN cable • Called Cat5 or 100BaseT • Four pairs of copper cable twisted • May be shielded from interference • Speeds range from 1 Mbps to 1,000 Mbps 9A- 27
  • 28. Wire Based Media • Coaxial cable • Similar to cable TV wire • One wire runs through cable • Shielded from interference • Speeds up to 10 Mbps • Nearly obsolete 9A- 28
  • 29. Wire Based Media • Fiber-optic cable • Data is transmitted with light pulses • Glass strand instead of cable • Immune to interference • Very secure • Hard to work with • Speeds up to 100 Gbps 9A- 29
  • 30. Wireless Media • Data transmitted through the air • LANs use radio waves • WANs use microwave signals • Easy to setup • Difficult to secure 9A- 30
  • 31. Network Hardware • Network interface cards • Network adapter • Connects node to the media • Unique Machine Access Code (MAC) 9A- 31
  • 32. Network Hardware • Network linking devices • Connect nodes in the network • Cable runs from node to device • Crossover cable connects two computers 9A- 32
  • 33. Network Hardware • Hubs • Center of a star network • All nodes receive transmitted packets • Slow and insecure 9A- 33
  • 34. Network Hardware • Switches • Replacement for hubs • Only intended node receives transmission • Fast and secure 9A- 34
  • 35. Network Hardware • Bridge • Connects two or more LANs together • Packets sent to remote LAN cross • Other packets do not cross • Segments the network on MAC addresses 9A- 35
  • 36. Network Hardware • Router • Connects two or more LANs together • Packets sent to remote LAN cross • Network is segmented by IP address • Connect internal networks to the Internet • Need configured before installation 9A- 36
  • 37. Network Hardware • Gateway • Connects two dissimilar networks • Connects coax to twisted pair • Most gateways contained in other devices 9A- 37
  • 38. Network Cabling • Cabling specifications • Bandwidth measures cable speed • Typically measured in Mbps • Maximum cable length • Connector describes the type of plug 9A- 38
  • 39. Network Cabling • Ethernet • Very popular cabling technology • 10 Base T, 10Base2, 10Base5 • Maximum bandwidth 10 Mbps • Maximum distances100 to 500 meters 9A- 39
  • 40. Network Cabling • Fast Ethernet • Newer version of Ethernet • Bandwidth is 100 Mbps • Uses Cat5 or greater cable • Sometimes called 100Base T • Requires a switch 9A- 40
  • 41. Network Cabling • Gigabit Ethernet • High bandwidth version of Ethernet • 1 to 10 Gbps • Cat 5 or fiber optic cable • Video applications 9A- 41
  • 42. Network Cabling • Token ring • Uses shielded twisted pair cabling • Bandwidth between 10 and 25 Mbps • Uses a multiple access unit (MAU) • Popular in manufacturing and finance 9A- 42
  • 43. Network Protocols • Language of the network • Rules of communication • Error resolution • Defines collision and collision recovery • Size of packet • Naming rules for computers 9A- 43
  • 44. Network Protocols • TCP/IP • Transmission Control Protocol/Internet Protocol • Most popular protocol • Machines assigned a name of 4 numbers • IP address • 209.8.166.179 is the White House’s web site • Dynamic Host Configuration Protocol • Simplifies assignment of IP addresses • Required for Internet access 9A- 44
  • 45. Network Protocols • IPX/SPX • Internet Packet Exchange/Sequenced Packet Exchange • Older protocol • Associated with Novell Netware • Replaced by TCP/IP 9A- 45
  • 46. Network Protocols • NetBEUI • Network BIOS Extended User Interface • Used by Windows to name computers • Transmission details handled by TCP/IP 9A- 46
  • 47. Network Protocols • Token ring • Popular in manufacturing and finance • Nodes communicate when they have the token 9A- 47
  • 48. Chapter 9A End of Chapter

Notas del editor

  1. Teaching Tip Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes. Spend time discussing why application servers need to be so powerful.
  2. Teaching tip Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
  3. Teaching tip It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
  4. Insider information The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
  5. Teaching tip Use a real world example to describe an organization with interconnected LANs.
  6. Teaching tip Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
  7. Teaching tip An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
  8. Insider information PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.
  9. Teaching tip Spend a few minutes here discussing password policies. Describe why it is important not to give out a password. Also describe why longer, more complicated passwords are important.
  10. Teaching tip Discuss how users managing their own security settings can be bad.
  11. Teaching tip Discuss how your network topology handles collisions. If your students are technical, contrast this with an inferior topology.
  12. Teaching tip For technical students take the time to draw the packet structure on the board. The typical structure is destination address | sending address | packet number | total packets | data size | payload | error control.
  13. Teaching tip Pages 352 and 353 have diagrams of each network topology
  14. Insider information Interference is usually electrical. Magnets, solar flares or electronic devices generate interference.
  15. Teaching tip Remind students that bps is bits per second. Gbps then is billion bits per second.
  16. Teaching tip Now is the time to briefly discuss 802.11 standards. A full discussion of 802.11 is covered in the next section.
  17. A network interface controller (NIC, also known as a network interface card, network adapter, LAN adapter, and by similar terms) is a computer hardware component that connects a computer to acomputer network. Newer computers have a network interface built into the motherboard.
  18. Insider information Twisted pair networks cannot achieve higher than 10 Mbps using a hub. Switches are necessary to achieve 100 Mbps or higher.
  19. Discussion point Ask who in the class has high speed Internet. Then determine if anyone is sharing this to the rest of the house or dorm. If they are, see if they can describe the setup. Most likely, the sharing is done with a router.
  20. Teaching tip Point out that the speed of the cable is the number before the word Base.
  21. The word protocol comes from the Greek protocollon, meaning a leaf of paper glued to a manuscript volume that describes the contents.
  22. Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level
  23. Short for Internetwork Packet Exchange, a networking protocolused by the Novell NetWare operating systems. Like UDP/IP, IPX is a datagram protocol used for connectionless communications. Higher-level protocols, such as SPX and NCP, are used for additional error recovery services.
  24. Pronounced net-booey, NetBEUI is short for NetBios ExtendedUser Interface. It is an enhanced version of the NetBIOS protocolused by network operating systems such as LAN Manager, LAN Server, Windows for Workgroups, Windows 95 and Windows NT.Netbeui was originally designed by IBM for their LAN Manager
  25.