0% found this document useful (0 votes)
63 views

What Is Networking (Module)

The document discusses computer networking concepts including: 1. Networking involves connecting nodes over a shared medium to transport and exchange data. It includes network design, construction, management and policies. 2. Common uses of networks include sharing data, resources, simultaneous access to data, easier data backup, and communication between clients and servers. 3. Key networking devices include network interface cards, repeaters, hubs, switches, bridges, routers, gateways, and firewalls which are used to connect hosts and manage data transmission. 4. Wired and wireless networks use different media like copper cables, fiber optics, WiFi, and Bluetooth to transmit signals between nodes. Communication protocols govern how devices interact on
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views

What Is Networking (Module)

The document discusses computer networking concepts including: 1. Networking involves connecting nodes over a shared medium to transport and exchange data. It includes network design, construction, management and policies. 2. Common uses of networks include sharing data, resources, simultaneous access to data, easier data backup, and communication between clients and servers. 3. Key networking devices include network interface cards, repeaters, hubs, switches, bridges, routers, gateways, and firewalls which are used to connect hosts and manage data transmission. 4. Wired and wireless networks use different media like copper cables, fiber optics, WiFi, and Bluetooth to transmit signals between nodes. Communication protocols govern how devices interact on
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

NETWORKING

SAM 413 - BSINFO 4-A/GROUP 4


Meet the Team

CASABAR, VIRAY, JAYBEL NUCUM, RUSSEL


CHRISTOPHER JOHN
Meet the Team

ESMERALDA, CORTEZ, ROCHELLE


RONELYN
Today's Presentation
POINTS OF DISCUSSION

Network Basic Concepts


Uses of Network
Networking Devices (Nodes)
Network Media
Communication Protocols
The Internet
What is a Networking?
Networking
ALSO KNOWN AS
COMPUTER NETWORKING

is the practice of transporting and


exchanging data between nodes over
a shared medium in an information
system. Networking comprises not
only the design, construction and use
of a network, but also the
management, maintenance and
operation of the network
infrastructure, software and policies.

What is Networking (computer)? - Definition from WhatIs.com (techtarget.com)


COMPUTER NETWORK

Computer Network are group of


computers that are connected to one
another.

What is Networking (computer)? - Definition from WhatIs.com (techtarget.com)


COMPUTER NETWORK
Uses of a Network
The Advantages/Uses of Network
SHARE "DATA"

SHARED PERIPHERAL DEVICES


Hardware, such as a printer

SIMULTANEOUS ACCESS
There are moments in any business when several workers may need to use the
same data at the same time.

EASIER DATA BACKUP


COMMUNICATION BETWEEN CLIENT
AND HOST

CLIENT HOST
COMPUTER NETWORK (HOUSE)
COMPUTER NETWORK (OFFICE)
TYPES OF NETWORKING

Wired Networking Wireless


Networking
What is Wired Networking?
WIRED NETWORK CONSISTS OF WIRED
CONNECTION BETWEEN VARIOUS COMPONENTS
OF THE SYSTEM.
THE NETWORKING DEVICES (NODES)

NIC CARD
REPEATER
HUB
SWITCH
BRIDGE
ROUTER
GATEWAY
FIREWALL
1. NETWORK INTERFACE CARD
- NIC IS USED TO PHYSICALLY CONNECT HOST
DEVICES TO THE NETWORK MEDIA.

- A NIC IS A PRINTED CIRCUIT BOARD THAT FITS


INTO THE EXPANSION SLOT OF A BUS ON A
COMPUTER MOTHERBOARD.

- IT CAN ALSO BE A PERIPHERAL DEVICE. NICS


ARE SOMETIMES CALLED NETWORK ADAPTERS.

- EACH NIC IS IDENTIFIED BY A UNIQUE CODE


CALLED A MEDIA ACCESS CONTROL (MAC)
ADDRESS.

- THIS ADDRESS IS USED TO CONTROL DATA


COMMUNICATION FOR THE HOST ON THE
NETWORK.
2. REPEATERS
- A REPEATER IS A NETWORK DEVICE
USED TO REGENERATE A SIGNAL.

- REPEATERS REGENERATE ANALOG


OR DIGITAL SIGNALS THAT ARE
DISTORTED BY TRANSMISSION LOSS
DUE TO ATTENUATION.

-A REPEATER DOES NOT MAKE AN


INTELLIGENT DECISION
CONCERNING FORWARDING
PACKETS
3. HUBS

- HUBS CONCENTRATE ON
CONNECTIONS.

- IN OTHER WORDS, THEY TAKE A


GROUP OF HOSTS AND ALLOW THE
NETWORK TO SEE THEM AS A SINGLE
UNIT. THIS IS DONE PASSIVELY,
WITHOUT ANY OTHER EFFECT ON THE
DATA TRANSMISSION.

- ACTIVE HUBS CONCENTRATE HOSTS


AND ALSO REGENERATE SIGNALS.
4. BRIDGES
BRIDGES CONVERT NETWORK
DATA FORMATS AND
PERFORM BASIC DATA
TRANSMISSION
MANAGEMENT.
BRIDGES PROVIDE
CONNECTIONS BETWEEN
LANS.
THEY ALSO CHECK DATA TO
DETERMINE IF IT SHOULD
CROSS THE BRIDGE. THIS
MAKES EACH PART OF THE
NETWORK MORE EFFICIENT
5. SWITCHES

SWITCHES ADD MORE


INTELLIGENCE TO DATA TRANSFER
MANAGEMENT.
THEY CAN DETERMINE IF DATA
SHOULD REMAIN ON A LAN AND
TRANSFER DATA ONLY TO THE
CONNECTION THAT NEEDS IT.
ANOTHER DIFFERENCE BETWEEN A
BRIDGE AND SWITCH IS THAT A
SWITCH DOES NOT CONVERT DATA
TRANSMISSION FORMATS
6. ROUTERS
-ROUTERS HAVE ALL THE CAPABILITIES
LISTED ABOVE.

-ROUTERS CAN REGENERATE SIGNALS,


CONCENTRATE MULTIPLE
CONNECTIONS, CONVERT DATA
TRANSMISSION FORMATS, AND
MANAGE DATA TRANSFERS.

-THEY CAN ALSO CONNECT TO A WAN,


WHICH ALLOWS THEM TO CONNECT
LANS THAT ARE SEPARATED BY GREAT
DISTANCES.
7. GATEWAY
- A GATEWAY IS A PIECE OF
NETWORKING HARDWARE IS A PIECE
OF NETWORKING HARDWARE USED IN
TELECOMMUNICATIONS FOR
TELECOMMUNICATIONS NETWORKS
THAT ALLOWS DATA TO FLOW FROM
ONE DISCRETE NETWORK TO ANOTHER.

-GATEWAYS ARE DISTINCT FROM


ROUTERSGATEWAYS ARE DISTINCT
FROM ROUTERS OR SWITCHES IN THAT
THEY COMMUNICATE USING MORE
THAN ONE PROTOCOL TO CONNECT A
BUNCH OF NETWORKS
8. FIREWALL
- A FIREWALL IS A NETWORK DEVICE OR
SOFTWARE FOR CONTROLLING NETWORK
SECURITY AND ACCESS RULES.
- FIREWALLS ARE INSERTED IN CONNECTIONS
BETWEEN SECURE INTERNAL NETWORKS AND
POTENTIALLY INSECURE EXTERNAL NETWORKS
SUCH AS THE INTERNET.
- FIREWALLS ARE TYPICALLY CONFIGURED TO
REJECT ACCESS REQUESTS FROM
UNRECOGNIZED SOURCES WHILE ALLOWING
ACTIONS FROM RECOGNIZED ONES.
THE VITAL ROLE FIREWALLS PLAY IN NETWORK
SECURITY GROWS IN PARALLEL WITH THE
CONSTANT INCREASE IN CYBER ATTACKS.
NETWORK MEDIA

WIRED MEDIA
WIRELESS MEDIA
widely adopted family that uses copper
and fiber media in local area network Wireless Media:- use the
that uses copper and fiber media in local atmosphere, or space, as the
area network (LAN) technology are medium.
collectively known as Ethernet
COAXIAL CABLE
It can be run longer distances than Twisted pair Cables.
Speed: 10-100Mbps
• Cost: Inexpensive
• Media and connector size: Medium
• Maximum cable length: 500m

SHIELDED TWISTED PAIR(STP)


Copper Speed: 0-100Mbps
Cost: Moderate
Cable Media and connector size: Medium to large
Maximum cable length: 100m

UNSHIELDED TWISTED PAIR


UTP is a four-pair wire medium used in a variety of networks.
Each of the eight copper wires in the UTP cable is covered by insulating
material
Speed: 10-100-1000 Mbps*
Cost: Least Expensive
Media and connector size: Small
Maximum cable length: 100m * (Depending on the quality/category of cable)
UTP FIBER OPTIC CABLE
IMPLEMENTATION Glass fiber carrying light pulses, each
pulse a bit.
EIA/TIA specifies an RJ-45 Based on the Total Internal Reflection of
Light.
connector for UTP cable.
High-speed point-to-point transmission
The letters RJ stand for 10-100’s Gbps
registered jack. low error rate:
repeaters spaced far apart
immune to electromagnetic noise
Communication Protocols
INTERNET PROTOCOL SUITE IEEE 802
Also called TCP/IP, is the foundation of all It is a family of IEEE standards
modern networking. dealing with local area
It defines the addressing, identification, networks and metropolitan
and routing specifications for IPv4 and for area networks.
IPv6. They operate mostly at levels 1
It is the defining set of protocols for the and 2 of the OSI model.
Internet.

ETHERNET
It is a family of protocols used in wired LANs, described by a set of standards together
called IEEE 802.3
What is Wireless Networking?
WIRELESS NETWORK IS A TYPE OF COMPUTER
NETWORK THAT USES WIRELESS DATA
CONNECTIONS FOR CONNECTING NETWORK
NODES.
EXAMPLE
-BLUETOOTH
-WI-FI

BLUETOOTH
BLUETOOTH IS A SHORT-RANGE
WIRELESS TECHNOLOGY STANDARD
USED FOR EXCHANGING DATA BETWEEN
FIXED AND MOBILE DEVICES OVER
SHORT DISTANCES.

IT IS USING UHFIT IS USING UHF RADIO


WAVESIT IS USING UHF RADIO WAVES IN
THE ISM BANDS, FROM 2.402 GHZ TO
2.48 GHZ.

THE IEEE STANDARDIZED BLUETOOTH AS


IEEE 802.15.1, BUT NO LONGER MAINTAINS
THE STANDARD.
WI-FI
WI-FI STANDS FOR WIRELESS FIDELITY.
WI-FI, IS A LOCAL AREA WIRELESS
TECHNOLOGY.
WI-FI NETWORKS USE RADIO
TECHNOLOGIES TO TRANSMIT AND
RECEIVE DATA AT HIGH SPEED.
IT IS BASED ON THE IEEE 802.11 FAMILY OF
STANDARDS.

ACCESS POINT: THE ACCESS POINT IS A


WIRELESS LAN TRANSCEIVER OR “ BASE
STATION” THAT CAN CONNECT ONE OR MANY
WIRELESS DEVICES SIMULTANEOUSLY TO THE
INTERNET
INTERNET
THE SIMPLEST DEFINITION
OF THE INTERNET IS THAT
IT'S A NETWORK OF
COMPUTER NETWORKS
How Information Travel Through the Internet
A PAGE ON THE INTERNET—WHETHER IT'S FULL OF WORDS, IMAGES OR
BOTH—DOESN'T COME TO YOU IN ONE SHIPMENT. IT'S TRANSLATED INTO
DIGITAL INFORMATION, CHOPPED INTO 1500 BYTE PIECES CALLED
PACKETS, AND SENT TO YOU LIKE A PUZZLE THAT NEEDS TO BE
REASSEMBLED.
EACH PART OF THE PACKET HAS A SPECIFIC FUNCTION:

HEADER DATA BLOCK SEQUENCE ID END OF MESSAGE


Provides the complete The portion of the overall ID’s where the ID’s the end of the packet
destination address for information carried by the information belongs in
the packet packet relation to the rest of the
information
WHEN YOU CONNECT TO A WEB SITE THROUGH AN ISP AND START
EXCHANGING INFORMATION, THERE ISN'T A FIXED CONNECTION
BETWEEN YOUR COMPUTER AND THE WEB SERVER COMPUTER HOSTING
THE WEB SITE. INSTEAD, INFORMATION IS EXCHANGED USING THE BEST
POSSIBLE PATH AT THAT PARTICULAR TIME. SPECIAL COMPUTERS CALLED
ROUTERS DETERMINE THESE PATHS, AVOIDING SLOW LINKS AND
FAVORING FAST ONES.

YOUR ISP
WEB SERVERS
COMPUTER ROUTERS
What is a Architecture?
What is Architecture?
COMPUTER NETWORK ARCHITECTURE DEFINES
THE PHYSICAL AND LOGICAL FRAMEWORK OF A
COMPUTER NETWORK. IT OUTLINES HOW
COMPUTERS ARE ORGANIZED IN THE NETWORK
AND WHAT TASKS ARE ASSIGNED TO THOSE
COMPUTERS.

PEER-TO-PEER (P2P) CLIENT/SERVER NETWORK


a central server or group of servers
In P2P architecture, two or more
manage resources and deliver
computers are connected as
services to client devices in the
“peers”
network
What is Security?
COMPUTER NETWORK SECURITY PROTECTS THE
INTEGRITY OF INFORMATION CONTAINED BY A
NETWORK AND CONTROLS WHO ACCESS THAT
INFORMATION. NETWORK SECURITY POLICIES
BALANCE THE NEED TO PROVIDE SERVICE TO
USERS WITH THE NEED TO CONTROL ACCESS
TO INFORMATION.

What is Load balancers and


networks?
LOAD BALANCERS EFFICIENTLY DISTRIBUTE
TASKS, WORKLOADS, AND NETWORK TRAFFIC
ACROSS AVAILABLE SERVERS. THINK OF LOAD
BALANCERS LIKE AIR TRAFFIC CONTROL AT AN
AIRPORT.

What is Content delivery


networks?
A CONTENT DELIVERY NETWORK (CDN) IS A
DISTRIBUTED SERVER NETWORK THAT DELIVERS
TEMPORARILY STORED, OR CACHED, COPIES OF
WEBSITE CONTENT TO USERS BASED ON THE
USER’ S GEOGRAPHIC LOCATION.
What is Computer networking
solutions and IBM?
COMPUTER NETWORKING SOLUTIONS HELP
BUSINESSES ENHANCE TRAFFIC, KEEP USERS
HAPPY, SECURE THE NETWORK, AND EASILY
PROVISION SERVICES. THE BEST COMPUTER
NETWORKING SOLUTION IS TYPICALLY A UNIQUE
CONFIGURATION BASED ON YOUR SPECIFIC
BUSINESS TYPE AND NEEDS.
GATEWAY
APPLIANCES
CLOUD INTERNET SERVICES
DIRECT LINK
What is a What are the skills
networking pros need now??

Network Engineer
A NETWORK ENGINEER IS A TECHNOLOGY
PROFESSIONAL WHO HAS THE NECESSARY
SKILLS TO PLAN, IMPLEMENT AND OVERSEE
THE COMPUTER NETWORKS THAT SUPPORT IN-
HOUSE VOICE, DATA, VIDEO AND WIRELESS
NETWORK SERVICES.

What does a network


engineer do?

Network Manager
NETWORK MANAGERS, SOMETIMES REFERRED
TO AS NETWORK AND COMPUTER SYSTEMS
ADMINISTRATORS, IDENTIFY WHAT TYPE OF
COMPUTER NETWORK AN ORGANIZATION
NEEDS. THEY INSTALL NETWORK HARDWARE
AND SOFTWARE PROGRAMS, MONITOR
NETWORKS, COLLECT DATA TO ANALYZE A
NETWORK'S OPERATION, AND TRAIN
INDIVIDUALS ON HOW TO USE THE NETWORK.

Network Analyst
NETWORK ANALYSTS ARE EMPLOYED BY BUSINESSES
TO OPTIMIZE IT NETWORK OPERATIONS. THEIR
DUTIES INCLUDE ANALYZING NETWORK
REQUIREMENTS, SETTING UP COMPUTER NETWORKS
IN ONE OR ACROSS MULTIPLE LOCATIONS, AND
CONFIGURING COMPUTER HARDWARE AND
SOFTWARE FOR OPTIMAL NETWORK
COMMUNICATION. THEY ARE ALSO REQUIRED TO
PROVIDE IT SUPPORT.

Network Analyst
Responsibilities

Network Administrator
NETWORK ADMINISTRATORS ARE RESPONSIBLE FOR
MAINTAINING COMPUTER NETWORKS AND SOLVING
ANY PROBLEMS THAT MAY OCCUR WITH THEM.

Network Administrator
Responsibilities

Network Technicians
A COMPUTER NETWORK TECHNICIAN, ALSO KNOWN
AS A NETWORK TECHNICIAN, MANAGES THE
NETWORK SYSTEM OF AN ORGANIZATION. THE
INDIVIDUAL INSTALLS, OPERATES, MAINTAINS,
UPGRADES, AND FIXES COMPUTERS AND NETWORK
EQUIPMENT.

You might also like