SlideShare una empresa de Scribd logo
1 de 65
Network Fundamentals: Introduction to Network Structure  and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Concepts in Communication
Basic Concepts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Essentials for Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 5 6
Essentials for Communications Source    Transmitter     Transmission     Receiver    Destination Source System Destination System Workstation/PC Workstation/PC Medium  1 2 3 4 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],5 6
Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
Understanding Networking
Big Picture What do you see here for a typical network?
Key Network Terminology Explained (1) ,[object Object],[object Object],[object Object]
Key Network Terminology Explained (2) ,[object Object],[object Object],[object Object],[object Object],Network architecture  
Common Topologies - Bus  ,[object Object]
Common Topologies - Ring ,[object Object]
Common Topologies - Star ,[object Object],[object Object],[object Object]
Common Topologies - Star ,[object Object]
Common Topologies – Star Bus ,[object Object],[object Object],[object Object]
Other network topologies (architecture) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Key Network Terminology Explained (3) ,[object Object],[object Object],[object Object]
Basic Signal Terminologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Kilo  K 2^10 Mega M 2^20 Giga G 2^30 Tera T 2^40 Peta P 2^50 Exa E 2^60 Zetta Z 2^70 Yotta Y 2^80
Data Transmission ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Transmission Medium
Basic transmission medium concepts ,[object Object],[object Object],[object Object]
Medium examples by type ,[object Object],[object Object],[object Object],[object Object]
Coaxial cable (1) ,[object Object],[object Object],[object Object],   Covered by sheath material    Outer conductor is braided shielded (ground)    Separated by insulating material    Inner conductor is solid copper metal
Coaxial cable (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Twisted Pair Cables ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Categories of Twisted Pairs Cabling System Specs describe cable Material, type of  Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
Optical Fibers (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Repeaters  
Optical Fibers (2) ,[object Object],[object Object]
Wireless Transmission (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless Transmission (2) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Wireless LAN ,[object Object],[object Object],[object Object]
Network Hardware
Hubs ,[object Object],[object Object],Reference to equipment
Gateways ,[object Object],[object Object],[object Object]
Routers ,[object Object],[object Object],[object Object],[object Object]
Bridge ,[object Object],[object Object]
What is the difference between? ,[object Object],[object Object],[object Object]
Switches ,[object Object],[object Object]
WANs and LANs
Major Categories of Networks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (1) ,[object Object],[object Object],[object Object],[object Object]
Data Communications Through WANs (2) ,[object Object],[object Object],[object Object],[object Object]
Circuit Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object]
Packet Switching Technologies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Frame Relay Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object]
Asynchronous Transfer Mode (ATM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISDN and Broadband ISDN Technology ,[object Object],[object Object],[object Object],[object Object],[object Object]
Local Area Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What is ethernet? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Interface Card (NIC) ,[object Object]
How does Ethernet work? ,[object Object]
What is a MAC Address? ,[object Object]
What is a Token Ring? ,[object Object]
How do Token Rings work? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Understanding Network Protocols
Protocols of Computer Communications and Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protocol Architecture ,[object Object],[object Object],[object Object]
ISO/OSI Reference Model (1) ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and   receiving data on a carrier Two party communication: Ethernet   Routing and Forwarding Address: IP   End-to-end control & error checking  (ensure complete data transfer): TCP   Establish/manage connection   ASCII Text, Sound (syntax layer)   File Transfer, Email, Remote Login  
What is TCP/IP? ,[object Object],[object Object],[object Object],[object Object]
TCP/IP Five Independent Levels ,[object Object],[object Object],[object Object],[object Object],[object Object],HTTP / FTP / Telnet /  SMTP / SLIP / PPP   TCP keep track of the  individual packets   And reassemble IP handles actual   delivery of packets
TCP (example) ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP ,[object Object],[object Object],[object Object]
Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol.  SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

basic networking
basic networkingbasic networking
basic networking
 
Introduction & Wireless Transmission
Introduction & Wireless TransmissionIntroduction & Wireless Transmission
Introduction & Wireless Transmission
 
Computer network
Computer networkComputer network
Computer network
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Multiple Access Techniques for 5G
Multiple Access Techniques for 5GMultiple Access Techniques for 5G
Multiple Access Techniques for 5G
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
CS8601 MOBILE COMPUTING
CS8601	MOBILE COMPUTING CS8601	MOBILE COMPUTING
CS8601 MOBILE COMPUTING
 
ADSL
ADSLADSL
ADSL
 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Umts(3g)
Umts(3g)Umts(3g)
Umts(3g)
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Gprs ppt
Gprs pptGprs ppt
Gprs ppt
 
Cellular network presentation
Cellular network presentationCellular network presentation
Cellular network presentation
 
5g-Air-Interface-pptx.pptx
5g-Air-Interface-pptx.pptx5g-Air-Interface-pptx.pptx
5g-Air-Interface-pptx.pptx
 
Introduction to 4G Network
Introduction to 4G NetworkIntroduction to 4G Network
Introduction to 4G Network
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
C n practical file
C n practical fileC n practical file
C n practical file
 
networkmedia presentation1
networkmedia presentation1networkmedia presentation1
networkmedia presentation1
 

Similar a Fundamentals of Networking

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentationurmishabm
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz aliFaraz Faqeer
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYPRINCE KUMAR
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
It infrastructure
It infrastructureIt infrastructure
It infrastructureraptrovic
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentationhassaanashraf1
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI modelManoj Kumar
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptxEvadeDube
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devicesAmril Huda
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptTestUser621581
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptxathars248
 

Similar a Fundamentals of Networking (20)

HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Computer network by faraz ali
Computer network by faraz aliComputer network by faraz ali
Computer network by faraz ali
 
NETWORKS & TOPOLOGY
NETWORKS & TOPOLOGYNETWORKS & TOPOLOGY
NETWORKS & TOPOLOGY
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
3.pptx
3.pptx3.pptx
3.pptx
 
It infrastructure
It infrastructureIt infrastructure
It infrastructure
 
Network topology and media presentation
Network topology and media presentationNetwork topology and media presentation
Network topology and media presentation
 
Computer Network - OSI model
Computer Network - OSI modelComputer Network - OSI model
Computer Network - OSI model
 
Lecture6 Data Networking.pptx
Lecture6 Data Networking.pptxLecture6 Data Networking.pptx
Lecture6 Data Networking.pptx
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
DCCN Unit 1.pdf
DCCN Unit 1.pdfDCCN Unit 1.pdf
DCCN Unit 1.pdf
 
Communication technologies & devices
Communication technologies & devicesCommunication technologies & devices
Communication technologies & devices
 
Arvind Singh
Arvind SinghArvind Singh
Arvind Singh
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Computer project
Computer project Computer project
Computer project
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
Computer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).pptComputer NW Security - Kizza - ch01 (1).ppt
Computer NW Security - Kizza - ch01 (1).ppt
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Fundamentals of Networking

  • 1. Network Fundamentals: Introduction to Network Structure and Protocol LAN, WAN, TCP/IP Prepared & Presented by: Muhammad Junaid Assistant Manager Corporate Services Dancom Online Services (PVT) Ltd. Feb 10, 2007
  • 2.
  • 3. Basic Concepts in Communication
  • 4.
  • 5.
  • 6.
  • 7. Data Communication Tasks Routing Delivery Error Feedback Network MGT Flow Control Signal Distortion Bit Error Network MGT Error Detection & Correction Nature and Timing of Signal Security Exchange Management Signal Begins & Ends Messsage Formatting Synchronization Repeater/Amplifier; Propagation; Interoperable Recovery Signal Generation Router / Server / Media Control / Protocol Routing Interfacing Multiplexing Capacity Congestion Control Addressing Data System Utilization
  • 9. Big Picture What do you see here for a typical network?
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. Categories of Twisted Pairs Cabling System Specs describe cable Material, type of Connectors, and Junction blocks to Conform to a category 100 Mbps 20 Mbps 16 Mbps 4 Mbps Less than 1 Mbps Maximum data rate Usual application Category 100 Mbps TPDDI 155 Mbps asynchronous transfer mode (certify 100 Mhz signal) CAT 5 Used in 16Mbps Token Ring Otherwise not used much CAT 4 Voice and data on 10BASE-T Ethernet (certify 16Mhz signal) CAT 3 Mainly used in the IBM Cabling System for token ring networks CAT 2 analog voice (plain old telephone service) Integrated Services Digital Network Basic Rate Interface in ISDN Doorbell wiring CAT 1
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.
  • 57.
  • 58.
  • 59.
  • 60. ISO/OSI Reference Model (2) How to transmit signal; coding Hardware means of sending and  receiving data on a carrier Two party communication: Ethernet  Routing and Forwarding Address: IP  End-to-end control & error checking (ensure complete data transfer): TCP  Establish/manage connection  ASCII Text, Sound (syntax layer)  File Transfer, Email, Remote Login 
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Associated TCP/IP Protocols & Services SLIP (Serial Line Internet Protocol) and PPP (Point to Point Protocol) encapsulate the IP packets so that they can be sent over a dial up phone connection to an access provider’s modem. SLIP/ PPP Provides meaningful names like achilles.mycorp.com for computers to replace numerical addresses like 123.45.67.89. Stands for the Domain Name System. DNS Used to remotely manage network devices. Stands for the Simple Network Management Protocol. SNMP A remote terminal emulation protocol that enables clients to log on to remote hosts on the network. Telnet This protocol, the core of the World Wide Web, facilitates retrieval and transfer of hypertext (mixed media) documents. Stands for the HyperText Transfer protocol HTTP

Notas del editor

  1. This is intended to be a very general overview of the concepts in computer networking and communication.
  2. Potential topics: TCP/IP and the Internet TCP and UDP Gateway and Routing Protocols Telnet and FTP TCP/IP Configuration TCP/IP and Networks Domain Name Service Network File System
  3. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  4. Transmitter: modem Transmission system: public telephone network Receiver: modem Destination: server
  5. Network - A group of computers connected together in a way that allows information to be exchanged between the computers. Node - Anything that is connected to the network. While a node is typically a computer, it can also be something like a printer or CD-ROM tower. Segment - Any portion of a network that is separated, by a switch, bridge or router, from other parts of the network. Backbone - The main cabling of a network that all of the segments connect to. Typically, the backbone is capable of carrying more information than the individual segments. For example, each segment may have a transfer rate of 10 Mbps (megabits per second: 1 million bits a second), while the backbone may operate at 100 Mbps. Topology - The way that each node is physically connected to the network.
  6. Backbone example: E.g. each segment may have a transfer rate of 10Mbps (megabits per second or 1 million bits a second) while the backbone may operate at 100Mbps
  7. Similar to a bus network, rings have nodes daisy chained, but the end of the network in a ring topology comes back around to the first node, creating a complete circuit. Each node takes a turn sending and receiving information through the use of a token. The token along with any data is sent from the first node to the second node which extracts the data addressed to it and adds any data it wishes to send. Then second node passes the token and data to the third node, etc. until ti comes back around to the first node again. Only the node with the token is allowed to send data . All other nodes must wait for the token to come to them.
  8. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  9. A hub does not perform any type of filtering or routing of the data. A hub is a junction that joins all the different nodes together.
  10. Baud – don’t use; a single state change can involve more than a single bit of data
  11.  we will talk about network cables next
  12. CAT 5 is currently under consideration to be incorporated into the Gigabit Ethernet specification for short distance wiring. While longer connections using Gigabit Ethernet use optical fiber, the goal is to leverage the CAT 5 twisted-pair wiring most organizations already have in place for connections out to the desktop.
  13. Use of optical fibers over ; Optical fiber (or "fiber optic") refers to the medium and the technology associated with the transmission of information as light pulses along a glass or plastic wire or fiber. Optical fiber carries much more information than conventional copper wire and is in general not subject to electromagnetic interference and the need to retransmit signals. Most telephone company long-distance lines are now of optical fiber. Transmission on optical fiber wire requires repeater at distance intervals. The glass fiber requires more protection within an outer cable than copper. For these reasons and because the installation of any new wiring is labor-intensive, few communities yet have optical fiber wires or cables from the phone company's branch office to local customers (known as local loop). single mode fiber fiber is used for longer distances; multimode fiber fiber is used for shorter distances.
  14. Multimode has a larger core than single mode optical fiber
  15. Starband.com DirectDuo DirectPC
  16. In wireless LAN (WLAN) technology, 802.11 refers to a family of specifications developed by a working group of the Institute of Electrical and Electronics Engineers ( IEEE ). There are three specifications in the family: 802.11, 802.11a, and 802.11b. All three of the above mentioned specifications use CSMA/CD carrier sense multiple access with collision detection ( CSMA/CD )as the path sharing protocol. If a source station has a data packet to send, the station checks the system to see if the path medium is busy. If the medium is not busy, the packet is sent; if the medium is busy, the station waits until the first moment that the medium becomes clear. Testing is done repeatedly by the source via a short test message called RTS (ready to send). The data packet is not transmitted until the destination station returns a confirmation message called CTS (clear to send). If two stations send at exactly the same time, CSMA/CD prevents the loss of data that might otherwise occur and provides a system for retrying. The 802.11 and 802.11b specifications apply to wireless Ethernet LANs, and operate at frequencies in the 2.4-GHz region of the radio spectrum. Data speeds are generally 1 Mbps or 2 Mbps for 802.11, and 5.5 Mbps or 11 Mbps for 802.11b, although speeds up to about 20 Mbps are realizable with 802.11b. The 802.11b standard is backward compatible with 802.11. The modulation used in 802.11 has historically been phase-shift keying ( PSK ). The modulation method selected for 802.11b is known as CCK (complementary code keying), which allows higher data speeds and is less susceptible to multipath-propagation interference. The 802.11a specification applies to wireless ATM systems and operates at radio frequencies between 5 GHz and 6 GHz. A modulation scheme known as OFDM (orthogonal frequency-division multiplexing) makes possible data speeds as high as 54 Mbps, but most commonly, communications takes place at 6 Mbps, 12 Mbps, or 24 Mbps.
  17. Nowadays you see hubs with switches; but basically the hub is the place where data comes together while the switch determines how and where data is forwarded from the place where data comes together.
  18. bridge In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or token ring). You can envision a bridge as being a device that decides whether a message from you to someone else is going to the local area network in your building or to someone on the local area network in the building across the street. A bridge examines each message on a LAN, "passing" those known to be within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs). In bridging networks, computer or node addresses have no specific relationship to location. For this reason, messages are sent out to every address on the network and accepted only by the intended destination node. Bridges learn which addresses are on which network and develop a learning table so that subsequent messages can be forwarded to the right network. Bridging networks are generally always interconnected local area networks since broadcasting every message to all possible destinations would flood a larger network with unnecessary traffic. For this reason, router networks such as the Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in one general direction rather than forwarded in all directions. A bridge works at the data-link (physical network) level of a network, copying a data frame from one network to the next network along the communications path. A bridge is sometimes combined with a router in a product called a brouter.
  19. The range for WAN transmission will vary: 56 Kb/s to 1.544 Mb/s
  20. Communication path established between two
  21. What is the third generation speed for ISDN?
  22. http://www.informit.com/newsletter.asp?link=320 The 802.3 standards put down in writing what happens at the very basest level of network communication: that which actually travels through the wires and hardware.
  23. Structure of protocols architecture: file transfer module contains all logic for file transfer applications (transmitting passwords, file commands, and file records). Need is to transmit the files and commands reliably. Some sorts of reliability are relevant to a variety of applications (e.g. e-mail, document transfer) Met by separate communication service modules that can be used by a variety of applications. Communication service modules assumes two computer systems are active and ready for data transfer, and keeps track of data being exchanged to assure delivery. A structured set of modules are used that implements the communication functions.
  24. It is use to guide product implementors so that their products will consistently work with other products.
  25. OSI divides telecommunication into seven layers. The layers are in two groups. The upper four layers are used whenever a message passes from or to a user. The lowest three layers (Up to network layer) are used when any message passes through the host computer. Message intended for this computer pass to the upper layers. Message destined for some other host are not passed up to the upper layers but are forwarded to another host. Physical layer: Bit stream through network at electrical/mechanical level
  26. There are several higher layer application protocols that use TCP/IP to get to the internet. They include World Wide Web’s Hypertext Transfer Protocol; File Transfer Protocol (FTP); Telnet (Telnet) [ allow you to logion to remote computers], Simple Mail Transfer Protocol (SMTP) These and other protocols are often packaged together as a suite. TCP keep track of the individual packets that a message is divided into for efficient routing through the internet