0% found this document useful (0 votes)
877 views11 pages

Networking Reviewer

A computer network allows devices to connect and share resources. It transmits and receives data through a series of connection points. A network provides benefits like easy accessibility, flexible sharing of resources and files, and connectivity between users. However, networks can also be memory intensive and spread viruses. Common network types include personal area networks (PANs), local area networks (LANs) within an organization, metropolitan area networks (MANs) spanning a city, and wide area networks (WANs) crossing provinces or countries. The largest network is the Internet, which connects networks globally and enables sharing of information worldwide.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
877 views11 pages

Networking Reviewer

A computer network allows devices to connect and share resources. It transmits and receives data through a series of connection points. A network provides benefits like easy accessibility, flexible sharing of resources and files, and connectivity between users. However, networks can also be memory intensive and spread viruses. Common network types include personal area networks (PANs), local area networks (LANs) within an organization, metropolitan area networks (MANs) spanning a city, and wide area networks (WANs) crossing provinces or countries. The largest network is the Internet, which connects networks globally and enables sharing of information worldwide.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Networking

NETWORKING

Question: WHAT IS A COMPUTER NETWORK?


COMPUTER NETWORK
 A series of connection points that enables us
to transmit, receive and share data in the
form of different file formats.
 It helps us to communicate with each other
and share necessary documents virtually.

ADVANTAGES OF A NETWORK
 Ease of accessibility
 Flexibility
 Convenient resource sharing
 Connectivity
 Security
 Great storage capacity
 Reduced cost

DISADVANTAGES OF A NETWORK
 Memory thirsty
 Spread of computer virus
 Technical issue / implementing issue
 Protecting private data
 Customer control
 Some application programs issue

Question: WHY DO ORGANIZATION NEEDS


SYSTEM AND NETWORK MANAGEMENT?
ADMINISTRATORS ROLES AND FUNCTION IN
AN ORGANIZATION?
Networking
FUNDAMENTALS OF NETWORKING APPLICATIONS OF COMMUNICATION AND
COMPUTER NETWORK / NETWORK
APPLICATIONS
DATA COMMUNICATION AND COMPUTER
 Resource sharing such as printers and storage
NETWORK
devices
DATA COMMUNICATIONS  Exchange of information by means of e-Mails
and FTP
 refers to the transmission of this digital data
 Information sharing by using Web or Internet
between two or more computers
 Interaction with other users using dynamic web
COMPUTER NETWORK / DATA NETWORK pages
 IP phones
 is a telecommunications network that allows
 Video conferences
computers to exchange data.
 Parallel computing
 Instant messaging
physical connection between networked
computing devices.

CLASSIFICATION OF COMPUTER NETWORKS


Question: WHY TO LEARN DATA COMMUNICATION 1. GEOGRAPHICAL SPAN
AND COMPUTER NETWORK?  It may be spanned across your table
 NETWORK BASIC UNDERSTANDING  It may be spanned across a whole building
 A system of interconnected computers and  It may be spanned across a whole city
computerized peripherals such as printers is  It may be spanned across multiple cities or
called COMPUTER NETWORK. This provinces.
interconnection among computers facilitates  It may be one network covering whole world.
information sharing among them. Computers
may connect to each other by either wired or 2. INTER-CONNECTIVITY
wireless media.  NETWORK MESH  Every single device
 NETWORK ENGINEERING can be connected to every other device on
 Involves software, firmware, chip level network.
engineering, hardware, and electric pulses.  BUS LIKE STRUCTURE  All devices can
 To ease network engineering, the whole be connected to a single medium but
networking concept is divided into multiple geographically disconnected.
layers. Each layer is involved in some  LINEAR STRUCTURE  Each device is
particular task and is independent of all other connected to its left and right peers only.
layers. Layers share data between them and  STAR LIKE STRUCTURE  All devices
they depend on each other only to take input connected together with a single device.
and send output.  HYBRID STRUCTURE  All devices
 INTERNET connected arbitrarily using all previous ways
 A network of networks is called an to connect each other.
INTERNETWORK, or simply the internet. It is
the largest network in existence on this 3. ADMINISTRATION
planet.  A network could be:
 Internet uses TCP/IP protocol suite and uses  PRIVATE  belongs a single
IP as its addressing protocol. Present day, autonomous system and cannot be
Internet is widely implemented using IPv4. accessed outside its physical or
Because of shortage of address spaces, it is logical domain.
gradually migrating from IPv4 to IPv6.  PUBLIC  accessed by all.
 Internet enables its users to share and
access enormous amount of information
worldwide.
Networking
 The internet hugely connects all WANs and it
4. NETWORK ARCHITECTURE can have connection to LANs and Home
 CLIENT-SERVER  There can be one or networks.
more systems acting as Server. Other being  Internet enables its users to share and access
Client, requests the Server to serve requests. enormous amount of information worldwide.
Server takes and processes request on behalf  Uses/Benefits:
of Clients. o Web sites
 PEER-TO-PEER  Two systems can be o E-mail
connected Point-to-Point, or in back-to-back o Instant Messaging
fashion. They both reside at the same level o Audio and Video Streaming
and called PEERS. o Blogging and Social Media
 HYBRID  involves network architecture of o Marketing and Networking
both the above types. o Resource Sharing

COMPUTER NETWORK TYPES NETWORK LAN TECHNOLOGIES


1. PERSONAL AREA NETWORK (PAN) 1. ETHERNET
 Smallest network which is very personal to a  Widely deployed LAN technology.
user.  Invented by Metcalfe and Boggs in 1970.
 Connectivity range up to 10 meters Standardized in IEEE 802.3 in 1980.
 Examples: wireless computer keyboard and  Ethernet shares media. Network which uses
mouse, Bluetooth enabled headphones, shared media has high probability of data
wireless printers and TV remotes. collision.
2. LOCAL AREA NETWORK (LAN)  Uses 48-bits MAC address;
 A computer network spanned inside a building  10BASE-T; 10MBPS speed
and operated under single administrative  Uses coaxial cable or Cat-5 twisted pair cable
system. with RJ-45 connector
 Provides a useful way of sharing the  Segment length up to 100 meters
resources between end users. The resources 2. FAST-ETHERNET
such as printers, file servers, scanners, and  Extends Ethernet
internet are easily sharable among computers.  100BASE-T; 100MBPS; Cat-5
 LAN covers an organization’ offices, schools,  Segment length up to 100 meters UP TO
colleges or universities. Number of systems 2000 meters.
connected in LAN may vary from as least as 3. GIGA-ETHERNET
two to as much as 16 million.  introduced in 1995
3. METROPOLITAN AREA NETWORK (MAN)  UTP using Cat-5, Cat-5e and Cat-6 cables
 Expands throughout a city such as cable TV  Speed up to 1000 mbits/seconds
network. 4. VIRTUAL LAN
 Service enables its users to expand their LAN.  Is a solution to divide a single Broadcast
 Example: MAN can help an organization to domain into multiple Broadcast domains.
connect all of its offices in a city.  Host in one VLAN cannot speak to a host in
4. WIDE AREA NETWORK (WAN) another. By default, all hosts are placed into
 Covers a wide area which may span across the same VLAN.
provinces and even a whole country.
 These networks provide connectivity to MANs
and LANs.
NETWORKING TERMS AND CONCEPTS
 Example: Asynchronous Transfer Mode
(ATM), Frame Relay, and Synchronous  IP address
Optical Network (SONET)  Nodes
5. INTERNET WORK  Routers
 A network of networks is called an  Switches
INTERNETWORK, or simply the internet. It is o Circuit Switching
the largest network in existence on this
o Packet Switching
planet.
o Message Switching
 Ports
Networking
 Network cable types
Networking
COMPUTER NETWORK TOPOLOGIES  If Hub is down, all goes down
 Added Cost; Expensive
 High Maintenance
NETWORK TOPOLOGY
4. RING TOPOLOGY
 is the arrangement with which computer systems  Each device is connected to two other
or network devices are connected to each other. devices on either side.
 Topologies may define both physical and logical
aspect of the network. Advantage:
 Both logical and physical topologies could be same
or different in a same network.  Reduces Packet Collision
 Easy to Manage and Maintain
 High Speed-Transfers
NETWORK TOPOLOGY TYPES Disadvantage:
1. POINT-TO-POINT  If one workstation is down, Network failed.
 Simplest topology with dedicated links  Difficult to troubleshoot
between two-end points.  Communication Problem
Advantage:
5. MESH TOPOLOGY
 Easy to maintain  Host is connected to one or multiple host
 Least Delay in communication
TWO TYPES:
 Low cost option
 FULL MESH  All nodes are connected;
Disadvantage:
Expensive Implementation.
 Single link Breakdown  PARTIALLY MESH  All nodes aren’t
 Cannot be Expanded necessary to be connected; Practical.
 If anyone fails, all will stop working
Advantage:

 Failure on single device won’t break the


2. BUS TOPOLOGY (LINE TOPOLOGY) network
 All devices share single communication line  Provides Multiple Paths
or cable.  Robust feature
Advantage: Disadvantage:

 Easiest topology in connecting peripherals /  Costly


removing devices  Power Requirements is High
 Cost Effective  Complex process
 Easy to expand

Disadvantage:

 Not great for large network


 Difficulty in Network Problems
 Slow Network Down 6. TREE TOPOLOGY
 Also known as HIERARCHICAL TOPOLOGY,
 Packet loss is high
this is the most common form of network
topology in use presently.
 Divides the network into multiple
3. STAR TOPOLOGY levels/layers of network.
 All host are connected to a central device
(HUB) Layers:

Advantage:  Core Layer


 Distribution Layer
 Reliable
 Access Layer
 Fault detection
 No Disruptions Advantages:

Disadvantage:  Easy Addition of nodes


Networking
 Straight-forward troubleshooting
 Independent nodes
HOW IP ADDRESS WRITTEN?
Disadvantages:
 DOTTED DECIMAL NOTATION
 Expensive implementation
 Network health depends on root nodes
 Maintenance and Configuration

7. HYBRID TOPOLOGY
 Design contains more than one topology.
 HEXADECIMAL NOTATION
Advantage:

 Combined benefits
 Flexible
 Reliable and Easy Integration

Disadvantage:

 Network Expensive DOTTED DECIMAL NOTATION


 Complex design
 Difficult to Install  Binary to Decimal Conversion

NETWORK DATA TRANSMISSION

 The transfer of data from one digital device to


another.

CLASSIFICATION OF NETWORK DATA


 The 32 bit IP address is divided into five sub-classe
TRANSMISSION

1. UNICAST
 One to one transmission
 Advantage: Personalization
2. MULTICAST
 One to many transmissions
 Advantage: Enhanced Efficiency
3. BROADCAST
 One to all transmission
 Advantage: Massive Audience

CLASSFUL IP ADDRESSING
NETWORK ID AND HOST ID

INTRODUCTION TO CLASSFUL IP ADDRESSING

IP ADDRESSING

 Internet Protocol
 The unique number that gets assigned to the
connected device.
 An address having information about how to reach a
specific host.
Networking
OSI MODEL
 THE TRANSFER LAYER
 responsible for end-to-end
OPEN SYSTEM INTERCONNECTION (OSI) communication between the two
devices.
 Developed by HUBERT ZIMMERMAN
 This includes taking data from the
(France)
session layer and breaking it up into
 A conceptual model created by the
chunks called SEGMENTS before
International Organization for
sending it to the network layer.
Standardization (ISO) which enables
 also responsible for flow control and error
diverse communication systems to
control.
communicate using standard protocols.
o FLOW CONTROL  determines
 Provides a standard for different computer
an optimal speed of
systems to be able to communicate with each
transmission to ensure that a
other.
sender with a fast connection
doesn’t overwhelm a receiver with
a slow connection.
WHY DOES THE OSI MODEL MATTER?
o ERROR CONTROL  ensuring
 It is a guide that the data received is
 It is useful for troubleshooting network complete, and requesting a
problems retransmission if it isn’t.
 clear framework  THE NETWORK LAYER
 responsible for facilitating data transfer
between two different networks.
7 LAYERS OF OSI MODEL  The network layer breaks up segments
from the transport layer into smaller
 THE APPLICATION LAYER units, called PACKETS, on the sender’s
 This is the only layer that directly device, and reassembling these packets
interacts with data from the user. on the receiving device.
 Client software applications are not part of  also finds the best physical path for the
the application layer. data to reach its destination; this is
 Responsible for the protocols and data known as ROUTING.
manipulation that the software relies on to
 THE PHYSICAL LAYER
present meaningful data to the user.
 includes the physical equipment
 Application layer protocols include HTTP
involved in the data transfer, such as
as well as SMTP (Simple Mail Transfer
the cables and switches.
Protocol is one of the protocols that
 data gets converted into a BIT STREAM,
enables email communications)
which is a string of 1s and 0s.
 THE PRESENTATION LAYER  The physical layer of both devices must
 Primarily responsible for preparing data also agree on a signal convention so that
so that it can be used by the application the 1s can be distinguished from the 0s on
layer. both devices.
 responsible for
o translation
o encryption HOW DATA FLOWS THROUGH THE OSI
o compression. MODEL?
 THE SESSION LAYER
 responsible for opening and closing In order for human-readable information to be
communication between the two transferred over a network from one device to
devices. another, the data must travel down the seven
 also synchronizes data transfer with layers of the OSI Model on the sending device
checkpoints.
Networking
and then travel up the seven layers on the o UTP - Unshielded Twisted Pair
receiving end. o STP - Shielded Twisted Pair

Network Devices SIMILARITIES AND DIFFERENCES


Network Cables  Both can transmit data at 10Mbps,
100Mbps, 1Gbps and 10Gbps
TYPES OF NETWORK DEVICES  STP cable is more expensive
 Both uses RJ45 jack
1. HUB  STP provides more noise resistant
 It connects multiple devices
 Both maximum length is 100m or 328ft
 Also acts as repeater
 Simplest in the networking devices
2. SWITCH
 More intelligent than Hubs.
 Improves network efficiency
 Multiport bridge
3. ROUTER
 Intelligent device
 Can divide internal networks
 Interconnect 2 or more heterogeneous
networks
4. BRIDGE
 Connects 2 or more host/network UTP UNSHIELDED TWISTED PAIR
segments
 More intelligent than Repeater
 Phased Out Now
5. GATEWAY
 Connects 2 or more autonomous network
 Computer with multiple NICs
 Similar to Router
6. MODEM
 from Modulator-Demodulators
 MODULATOR  converts digital to
analog
 DEMODULATOR  converts analog
into digital signals
7. ACCESS POINT
 Devices that sends and receives data
wirelessly over radio frequencies (band)
 2.4 GHz
 5 GHz
Things to consider:
 Location
 Attenuation
 Channel Interference

NETWORK CABLES
 TWISTED PAIR CABLES
Networking
Networking
NETWORK INSTALLATION AND 10. LEARN THE BASICS OF NETWORK
CONFIGURATION INSTALLATION
HOW TO MANAGE NETWORK EFFECTIVELY? Benefits:
 Avoid expensive installation/setup
fees
NETWORK INSTALLATION  Strategies
 Saves time
1. DECIDE ON A NETWORK TYPE
Three (3) Basic Network Types:  Business Fit
 Wired Networks
 Wi-Fi Networks
HOW TO MANAGE NETWORK EFFECTIVELY?
 Hybrid Networks
2. PLAN YOUR INSTALLATION 1. Create an inventory of most important
Things to Consider: system
 Start Deciding  Called Critical Infrastructure list
 How many Data Points?  Manually check your Network
 Understand and Get It Right 2. Develop a change control process
3. CALCULATE CABLE AMOUNTS  Document all process
Things to Consider:  Log all the changes implemented
 Choose Location 3. Awareness for the compliance standard
 Measure  Check First
 Add some Extra  System for Compliance and for
4. GET THE RIGHT MATERIAL troubleshooting
Which Network? 4. Have a map with status icon
 Wired  Add an icon for all devices in infrastructure
list
 Wi-Fi
 Display this map
 Hybrid
5. Look at dependencies
5. GATHER THE TOOLS
 Set dependencies monitoring
Tools Needed:
6. Setup alerting
 Punch Down Tools
 Schedule monitoring alerts
 Crimping Tools  Alerts to specific server and apps teams
 Network Test Tool 7. Decide on standards and security
6. POSITION THE WALL PLATES  Alert is backed up with additional
What to do? information
 Mark it o SMNP (Simple Network
 Placed in Convenient and Accessible Management Protocol)
Location o WMI (Windows Management
 Avoid in Switches Instrumentation)
7. CUT HOLES/RUN THE CABLES 8. Getting supplemental data
What to do?  Look at Logs
 Turn off the Power  Capture the network traffic
 Run Cables one at a time  Log Application Information
 Wear PPE 9. Network perimeter
8. TEST THE CABLES  Watch what’s coming in and out
What to do?  IDS (Intrusion Detection System)
 Connect it 10. Tracking users and devices
 Network Test Too EACH  Have a process
9. SET UP THE ROUTER/MODEM  Know who are connected
Things to consider:
 Proper Router/Modem
 Proper Electrical outlet
Networking

NETWORK TROUBLESHOOTING NETWORK TROUBLESHOOTING TOOLS


1. COMMAD-LINE TOOLS
Network Troubleshooting Tools  PING  Transmits a datagram to
another host.
Network Troubleshooting applications  TRACERT / TRACEROUTE 
Hardware Tools Determines the route data takes to get
particular destination.
 IPCONFIG  Verifies network settings
NETWORK TROUBLESHOOTING STEPS and connections.
1. IDENTIFY THE PROBLEM  NSLOOKUP  Locating IP Addresses
 Gather Information associated with a domain name.
 Duplicate the Problem
 Question Users
 Identify the symptoms NETWORK TROUBLESHOOTING
 Determined changes APPLICATIONS
 Define individual problems clearly 1. PACKET SNIFFER  Analyzes traffic on
the network. Identify network vulnerabilities.
2. DEVELOP A THEORY 2. PORT SCANNER  Look for open ports
 Produce a theory about the cause (Open or Closed), Port in used and Port
 Simple Problem Cause vulnerability.
 Complicated Issues 3. WIFI ANALYZER  Detects devices and
points of interference in a WIFI signal.
3. TEST THE THEORY
 Using the tools at your disposal
 Try and Try HARDWARE TOOLS
1. WIRE CRIMPERS  Tools that attaches
4. PLAN OF ACTION media connectors to the ends of the
 Plan to address the problem cables.
 Simple Plan 2. CABLE TESTER  Tools that verifies if a
 Complex Plan signal is transmitted. Diagnosing
connectivity issues.
5. IMPLEMENT THE SOLUTION 3. PUNCH DOWN TOOL  Tool used to
 DIY Solutions connect wires directly to a patch panel.
 Network Administrators approval 4. SPECTRUM ANALYZER  Instrument that
displays the variations of a signal strength
6. VERIFY THE SYSTEM FUNCTIONALITY against frequencies.
 Test the Network
 Make sure the issue has been resolve
 Verification Process

7. DOCUMENT THE ISSUE


 Document each stage:
 Symptoms
 Theory you developed
 Strategy for Testing

You might also like