SlideShare una empresa de Scribd logo
1 de 30
Networking Concepts
LAN
• Concepts
  – Attenuation, Noise
• Hardware
  –   Repeater, Amplifier
  –   Bridge, Router, Gateway, Switch, Hub
  –   Twisted pair, Coaxial cable, Fiber optics
  –   Server, Workstation
  –   Wireless access point
• Topology
  – Bus, Tree, Star, Ring
LAN
• Standard
  –   OSI (Open Systems Interconnection)
  –   IEEE (Institute of Electrical and Electronic Engineers)
  –   ITU-T (Int’l Telephone Union – Telecom. Sector)
  –   ISO (International Standards Organization)
  –   EIA (Electronic Industries Association)
  –   ETS (European Telecom. Standard)
Communications Hardware
• Repeater
  – Extends distance limitation on networks (both voice
    and data)
  – Filters noise
  – Regenerates signals
  – For twisted pair wire, repeaters are placed every 100
    meters
• Amplifier
  – Extends distance limitation on networks (both voice
    and data)
  – Amplifies both signal and noise
Communications Hardware
• Bridge
  – Connects two LANs using same protocol
  – Single path between LANs
  – Minimal sophistication
• Router
  – Connects multiple LANs using same protocol
  – Choice of paths between LANs
  – Mainstay of internetworking
Communications Hardware
• Gateway
  – Connects multiple LANs using any protocol
  – Very sophisticated
  – Supports today’s internet by providing access
    points to several networks
• Hub
  – Connects nodes to a network
  – Sometimes acts as repeater
Communications Hardware
• Switch
  – Connects multiple LAN segments using the
    same protocol
  – Connections may use twisted pair, coaxial
    cable, or fiber optics wiring
  – Faster than bridges
  – Enables simultaneous communication between
    multiple network segments
Ethernet
• Ethernet was developed jointly by Xerox, Intel,
  and DEC in 1980
• DEC (Digital Equipment Corporation) a computer
  company that specialized in mini-computers in the
  1970s. It was acquired by Compaq and Compaq
  merged with HP.
• This was the first commercial LAN system
• Ethernet is a simple protocol to implement
• Ethernet addresses the layers 1 and 2 functionality
  for the OSI model
• Ethernet standard is very close to IEEE 802.3
  standard, but has some minor differences
Ethernet
• Ethernet uses bus topology (which we will discuss
  next)
• Ethernet transmits a baseband signal at 10 Mbps
• Baseband signals are digital and bidirectional
• Ethernet allows the user data to have a variable
  length up to 1500 bytes
• Unlike HDLC and SDLC protocols, ethernet uses
  a length field in the header to identify the length
  of the user data in bytes. Because of this, no
  special bit pattern is needed to recognize the start
  and end of the user data.
Ethernet frame format
 6-bytes       6-bytes    2-bytes   Variable length   4-bytes




Destination     Source    length       User data      CRC-32
 address        address
Ethernet diagram
PC1         PC3
                      Segment 1



      PC2


                         Repeater




                                                     PC-B   PC-C
                                  Segment 2



                                              PC-A
Bus topology
• It is a contention-based topology, which means that each
  node on the network must contend for access
• Each node listens to traffic on the network
• When a node has packets to transfer and the bus is not
  busy, then the packets are put on the bus in both directions,
  with the destination address marked on the packets
• All nodes listen to traffic on the network and the node that
  has packets addressed to it, receives the packets
• No routing or switching is involved in data transfer
Bus topology diagram


   PC1   PC2   PC3   PC4




                           Tap for a new node
Tree topology
• Tree topology is a variation on bus topology
• A special node is designated as root
• The primary reason for this topology is to
  segment nodes so that not all nodes need to
  listen to packets broadcast on a segment
• This adds a layer of security in the form of
  unwanted nodes not listening to the network
  traffic
• Speeds up data transfer since there will be
  fewer nodes on each segment
Tree topology diagram

                      Root



                                     PC 7




                                      PC 6
PC 1    PC 2
               PC 3

                       PC 4
                              PC 5
Star topology
•   This is another variation on bus topology
•   This has a central hub, a passive device
•   Star is a logical bus and a physical ring
•   Hub has ports in multiples of 8. Multiple hubs can be
    connected in a daisy chain format
•   Easy to add nodes to the network and remove nodes from
    the network
•   Central node does switching between nodes
•   Multiple nodes can communicate simultaneously without
    collision
•   Potential problem is the single point of failure for the
    network when the central node fails
Star topology diagram

          PC 3
   PC 2          PC 4

PC 1      Hub      PC 5


  PC 8           PC 6
          PC 7
Ring topology
• The nodes are connected in a ring pattern
• Unlike bus topology, each node on the ring acts as a
  repeater on the network
• Nodes access the network using a token, which eliminates
  the need for contention as in bus topology
• Token is a series of bits that identifies the node that has the
  right to transmit at any given time
• Example of a token: Assume that there are 6 nodes on the
  network. The nodes are labeled 1 through 6 and the token
  would consist of 3 bits. The token 100 will indicate that
  node 4 has the token.
• Tokens circulate in a single direction from a node to its
  neighbor
Ring topology diagram
         PC 4


                 PC 3
  PC 5




  PC 6
                 PC 2


          PC 1
OSI 7-layer model
 Source              Destination
Application          Application
Presentation         Presentation
  Session              Session
 Transport            Transport
 Network               Network
 Data link            Data link
 Physical              Physical
IEEE 802
• 802.1     General LAN management of OSI
            layers 3 through 7
•   802.2   LLC sublayer
•   802.3   Ethernet
•   802.4   Token bus
•   802.5   Token ring
•   802.6   MAN
•   802.7   Broadband, in general
IEEE 802
•   802.10   Network Security
•   802.11   Wireless LAN
•   802.12   100VG-AnyLAN (Voice Grade)
•   802.13   unused
•   802.14   Cable Modem
WAN
• Concepts
  – Gateway, Frame Relay, ATM, DSL, T1, T3,
    STS (Synchronous Transport Signal)
• Standard
  – TCP/IP (Transmission Control Protocol
    /Internet Protocol)
  – IETF (Internet Engineering Task Force)
  – ATM Forum (Asynchronous Transfer Mode)
STS, STM, OC equivalencies
 STS level    STM level    OC level    Data Rate
STS-1        --           OC-1        52 Mbps
STS-3        STM-1        OC-3        155 Mbps
STS-9        STM-3        OC-9        467 Mbps
STS-12       STM-4        OC-12       622 Mbps
STS-18       STM-6        OC-18       933 Mbps
STS-24       STM-8        OC-24       1.2 Gbps
STS-36       STM-12       OC-36       1.9 Gbps
STS-48       STM-16       OC-48       2.5 Gbps
ATM VPI and VCI
                         VP I 1                  VP I5
  VC I 1                                                    VC I 1
  VC I 2                                                    VC I 2

                                                          VCI 4
                                                 VP I6
                                                            VCI 7
   V C I 2            V P I 2
   V C I 6




                                                                     V C I 2
                                                                     V C I 6

             VP I 3                              VP I 3

VCI 4

VCI 7



                                  V P Sw itc h
TCP/IP functions
• Establish a connection between nodes
• Manage data flow on the network
• Handle transmission errors
• Terminate connection at the end
• TCP is a connection-oriented protocol, meaning that a
  packet sent to the next node is monitored for proper receipt
• IP is a connection-less protocol, meaning that a packet sent
  to the next node is not monitored for proper delivery
• Since TCP and IP work together, the packet delivery is
  reliable
• Connection-less mode is known as User Datagram
  Protocol (UDP)
TCP/IP 5-layer model
• TCP/IP protocol is divided into 5 layers
  –   Application layer
  –   Transport layer
  –   Network layer
  –   Data link layer
  –   Physical layer
IP Addressing
• IP address consists of 4 octets: n.n.n.n
  where n is in the range 0 to 255
• This form of IP address is known as IPv4,
  denoting IP address Version 4
• A new form of IP address known as IPv6,
  denoting IP address Version 6, has been
  proposed. It uses 128-bit addressing instead
  of 32-bit addressing.
IP Address Hierarchy
• There are 3 main classes of IP addresses in use
  and two additional classes of IP addresses
  available for multicast and testing
• Class A First octet range: 1 – 126
   – IBM, AT&T, HP, Merck, Stanford University
• Class B     First octet range: 128 – 191
   – U of L and most other universities
• Class C     First octet range: 192 – 223
   – IGLOU, Louisville’s first ISP
UDP
•   User Datagram Protocol is a ‘best effort’ protocol
•   ‘best effort’ means no guarantee of delivery
•   This is a connection-less protocol
•   UDP does not provide reliability
•   UDP sends out packets without first establishing a
    connection
•   RFC 768 describes UDP
•   UDP header consists of source port, destination port,
    length, checksum
•   Example of UDP: TFTP (Trivial File Transfer Protocol).
    TFTP is used when bootsrapping diskless system
•   TFTP is on UDP port 69

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Mpls
MplsMpls
Mpls
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Mpls technology
Mpls technologyMpls technology
Mpls technology
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Mpls
MplsMpls
Mpls
 
Part 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGPPart 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGP
 
MPLS
MPLSMPLS
MPLS
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Mpls te
Mpls teMpls te
Mpls te
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
Network layer
Network layerNetwork layer
Network layer
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 

Similar a Networking concepts

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4mlrbrown
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptHODElex
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal DistributionrAVe [PUBS]
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report SlidesBassam Kanber
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Network Protocol
Network ProtocolNetwork Protocol
Network ProtocolKetan Nayak
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idchiya123jes
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdfmashiur
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...Adam Dunkels
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network SecuritySam Bowne
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mrwael-b1
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnectKinza Razzaq
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22Techvilla
 

Similar a Networking concepts (20)

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
Ppt seminar noc
Ppt seminar nocPpt seminar noc
Ppt seminar noc
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 

Más de Yogesh Thawait

Más de Yogesh Thawait (13)

C.f
C.fC.f
C.f
 
Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstruction
 
Sebi
SebiSebi
Sebi
 
It act
It actIt act
It act
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property law
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers right
 
Idra,1951
Idra,1951Idra,1951
Idra,1951
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)
 
Consumer
ConsumerConsumer
Consumer
 
Competition act,2002
Competition act,2002Competition act,2002
Competition act,2002
 
Securties contract act
Securties contract actSecurties contract act
Securties contract act
 
Mis 3
Mis 3Mis 3
Mis 3
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtel
 

Último

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Networking concepts

  • 2. LAN • Concepts – Attenuation, Noise • Hardware – Repeater, Amplifier – Bridge, Router, Gateway, Switch, Hub – Twisted pair, Coaxial cable, Fiber optics – Server, Workstation – Wireless access point • Topology – Bus, Tree, Star, Ring
  • 3. LAN • Standard – OSI (Open Systems Interconnection) – IEEE (Institute of Electrical and Electronic Engineers) – ITU-T (Int’l Telephone Union – Telecom. Sector) – ISO (International Standards Organization) – EIA (Electronic Industries Association) – ETS (European Telecom. Standard)
  • 4. Communications Hardware • Repeater – Extends distance limitation on networks (both voice and data) – Filters noise – Regenerates signals – For twisted pair wire, repeaters are placed every 100 meters • Amplifier – Extends distance limitation on networks (both voice and data) – Amplifies both signal and noise
  • 5. Communications Hardware • Bridge – Connects two LANs using same protocol – Single path between LANs – Minimal sophistication • Router – Connects multiple LANs using same protocol – Choice of paths between LANs – Mainstay of internetworking
  • 6. Communications Hardware • Gateway – Connects multiple LANs using any protocol – Very sophisticated – Supports today’s internet by providing access points to several networks • Hub – Connects nodes to a network – Sometimes acts as repeater
  • 7. Communications Hardware • Switch – Connects multiple LAN segments using the same protocol – Connections may use twisted pair, coaxial cable, or fiber optics wiring – Faster than bridges – Enables simultaneous communication between multiple network segments
  • 8. Ethernet • Ethernet was developed jointly by Xerox, Intel, and DEC in 1980 • DEC (Digital Equipment Corporation) a computer company that specialized in mini-computers in the 1970s. It was acquired by Compaq and Compaq merged with HP. • This was the first commercial LAN system • Ethernet is a simple protocol to implement • Ethernet addresses the layers 1 and 2 functionality for the OSI model • Ethernet standard is very close to IEEE 802.3 standard, but has some minor differences
  • 9. Ethernet • Ethernet uses bus topology (which we will discuss next) • Ethernet transmits a baseband signal at 10 Mbps • Baseband signals are digital and bidirectional • Ethernet allows the user data to have a variable length up to 1500 bytes • Unlike HDLC and SDLC protocols, ethernet uses a length field in the header to identify the length of the user data in bytes. Because of this, no special bit pattern is needed to recognize the start and end of the user data.
  • 10. Ethernet frame format 6-bytes 6-bytes 2-bytes Variable length 4-bytes Destination Source length User data CRC-32 address address
  • 11. Ethernet diagram PC1 PC3 Segment 1 PC2 Repeater PC-B PC-C Segment 2 PC-A
  • 12. Bus topology • It is a contention-based topology, which means that each node on the network must contend for access • Each node listens to traffic on the network • When a node has packets to transfer and the bus is not busy, then the packets are put on the bus in both directions, with the destination address marked on the packets • All nodes listen to traffic on the network and the node that has packets addressed to it, receives the packets • No routing or switching is involved in data transfer
  • 13. Bus topology diagram PC1 PC2 PC3 PC4 Tap for a new node
  • 14. Tree topology • Tree topology is a variation on bus topology • A special node is designated as root • The primary reason for this topology is to segment nodes so that not all nodes need to listen to packets broadcast on a segment • This adds a layer of security in the form of unwanted nodes not listening to the network traffic • Speeds up data transfer since there will be fewer nodes on each segment
  • 15. Tree topology diagram Root PC 7 PC 6 PC 1 PC 2 PC 3 PC 4 PC 5
  • 16. Star topology • This is another variation on bus topology • This has a central hub, a passive device • Star is a logical bus and a physical ring • Hub has ports in multiples of 8. Multiple hubs can be connected in a daisy chain format • Easy to add nodes to the network and remove nodes from the network • Central node does switching between nodes • Multiple nodes can communicate simultaneously without collision • Potential problem is the single point of failure for the network when the central node fails
  • 17. Star topology diagram PC 3 PC 2 PC 4 PC 1 Hub PC 5 PC 8 PC 6 PC 7
  • 18. Ring topology • The nodes are connected in a ring pattern • Unlike bus topology, each node on the ring acts as a repeater on the network • Nodes access the network using a token, which eliminates the need for contention as in bus topology • Token is a series of bits that identifies the node that has the right to transmit at any given time • Example of a token: Assume that there are 6 nodes on the network. The nodes are labeled 1 through 6 and the token would consist of 3 bits. The token 100 will indicate that node 4 has the token. • Tokens circulate in a single direction from a node to its neighbor
  • 19. Ring topology diagram PC 4 PC 3 PC 5 PC 6 PC 2 PC 1
  • 20. OSI 7-layer model Source Destination Application Application Presentation Presentation Session Session Transport Transport Network Network Data link Data link Physical Physical
  • 21. IEEE 802 • 802.1 General LAN management of OSI layers 3 through 7 • 802.2 LLC sublayer • 802.3 Ethernet • 802.4 Token bus • 802.5 Token ring • 802.6 MAN • 802.7 Broadband, in general
  • 22. IEEE 802 • 802.10 Network Security • 802.11 Wireless LAN • 802.12 100VG-AnyLAN (Voice Grade) • 802.13 unused • 802.14 Cable Modem
  • 23. WAN • Concepts – Gateway, Frame Relay, ATM, DSL, T1, T3, STS (Synchronous Transport Signal) • Standard – TCP/IP (Transmission Control Protocol /Internet Protocol) – IETF (Internet Engineering Task Force) – ATM Forum (Asynchronous Transfer Mode)
  • 24. STS, STM, OC equivalencies STS level STM level OC level Data Rate STS-1 -- OC-1 52 Mbps STS-3 STM-1 OC-3 155 Mbps STS-9 STM-3 OC-9 467 Mbps STS-12 STM-4 OC-12 622 Mbps STS-18 STM-6 OC-18 933 Mbps STS-24 STM-8 OC-24 1.2 Gbps STS-36 STM-12 OC-36 1.9 Gbps STS-48 STM-16 OC-48 2.5 Gbps
  • 25. ATM VPI and VCI VP I 1 VP I5 VC I 1 VC I 1 VC I 2 VC I 2 VCI 4 VP I6 VCI 7 V C I 2 V P I 2 V C I 6 V C I 2 V C I 6 VP I 3 VP I 3 VCI 4 VCI 7 V P Sw itc h
  • 26. TCP/IP functions • Establish a connection between nodes • Manage data flow on the network • Handle transmission errors • Terminate connection at the end • TCP is a connection-oriented protocol, meaning that a packet sent to the next node is monitored for proper receipt • IP is a connection-less protocol, meaning that a packet sent to the next node is not monitored for proper delivery • Since TCP and IP work together, the packet delivery is reliable • Connection-less mode is known as User Datagram Protocol (UDP)
  • 27. TCP/IP 5-layer model • TCP/IP protocol is divided into 5 layers – Application layer – Transport layer – Network layer – Data link layer – Physical layer
  • 28. IP Addressing • IP address consists of 4 octets: n.n.n.n where n is in the range 0 to 255 • This form of IP address is known as IPv4, denoting IP address Version 4 • A new form of IP address known as IPv6, denoting IP address Version 6, has been proposed. It uses 128-bit addressing instead of 32-bit addressing.
  • 29. IP Address Hierarchy • There are 3 main classes of IP addresses in use and two additional classes of IP addresses available for multicast and testing • Class A First octet range: 1 – 126 – IBM, AT&T, HP, Merck, Stanford University • Class B First octet range: 128 – 191 – U of L and most other universities • Class C First octet range: 192 – 223 – IGLOU, Louisville’s first ISP
  • 30. UDP • User Datagram Protocol is a ‘best effort’ protocol • ‘best effort’ means no guarantee of delivery • This is a connection-less protocol • UDP does not provide reliability • UDP sends out packets without first establishing a connection • RFC 768 describes UDP • UDP header consists of source port, destination port, length, checksum • Example of UDP: TFTP (Trivial File Transfer Protocol). TFTP is used when bootsrapping diskless system • TFTP is on UDP port 69