Networking Reviewer
Networking Reviewer
NETWORKING
ADVANTAGES OF A NETWORK
Ease of accessibility
Flexibility
Convenient resource sharing
Connectivity
Security
Great storage capacity
Reduced cost
DISADVANTAGES OF A NETWORK
Memory thirsty
Spread of computer virus
Technical issue / implementing issue
Protecting private data
Customer control
Some application programs issue
Disadvantage:
7. HYBRID TOPOLOGY
Design contains more than one topology.
HEXADECIMAL NOTATION
Advantage:
Combined benefits
Flexible
Reliable and Easy Integration
Disadvantage:
1. UNICAST
One to one transmission
Advantage: Personalization
2. MULTICAST
One to many transmissions
Advantage: Enhanced Efficiency
3. BROADCAST
One to all transmission
Advantage: Massive Audience
CLASSFUL IP ADDRESSING
NETWORK ID AND HOST ID
IP ADDRESSING
Internet Protocol
The unique number that gets assigned to the
connected device.
An address having information about how to reach a
specific host.
Networking
OSI MODEL
THE TRANSFER LAYER
responsible for end-to-end
OPEN SYSTEM INTERCONNECTION (OSI) communication between the two
devices.
Developed by HUBERT ZIMMERMAN
This includes taking data from the
(France)
session layer and breaking it up into
A conceptual model created by the
chunks called SEGMENTS before
International Organization for
sending it to the network layer.
Standardization (ISO) which enables
also responsible for flow control and error
diverse communication systems to
control.
communicate using standard protocols.
o FLOW CONTROL determines
Provides a standard for different computer
an optimal speed of
systems to be able to communicate with each
transmission to ensure that a
other.
sender with a fast connection
doesn’t overwhelm a receiver with
a slow connection.
WHY DOES THE OSI MODEL MATTER?
o ERROR CONTROL ensuring
It is a guide that the data received is
It is useful for troubleshooting network complete, and requesting a
problems retransmission if it isn’t.
clear framework THE NETWORK LAYER
responsible for facilitating data transfer
between two different networks.
7 LAYERS OF OSI MODEL The network layer breaks up segments
from the transport layer into smaller
THE APPLICATION LAYER units, called PACKETS, on the sender’s
This is the only layer that directly device, and reassembling these packets
interacts with data from the user. on the receiving device.
Client software applications are not part of also finds the best physical path for the
the application layer. data to reach its destination; this is
Responsible for the protocols and data known as ROUTING.
manipulation that the software relies on to
THE PHYSICAL LAYER
present meaningful data to the user.
includes the physical equipment
Application layer protocols include HTTP
involved in the data transfer, such as
as well as SMTP (Simple Mail Transfer
the cables and switches.
Protocol is one of the protocols that
data gets converted into a BIT STREAM,
enables email communications)
which is a string of 1s and 0s.
THE PRESENTATION LAYER The physical layer of both devices must
Primarily responsible for preparing data also agree on a signal convention so that
so that it can be used by the application the 1s can be distinguished from the 0s on
layer. both devices.
responsible for
o translation
o encryption HOW DATA FLOWS THROUGH THE OSI
o compression. MODEL?
THE SESSION LAYER
responsible for opening and closing In order for human-readable information to be
communication between the two transferred over a network from one device to
devices. another, the data must travel down the seven
also synchronizes data transfer with layers of the OSI Model on the sending device
checkpoints.
Networking
and then travel up the seven layers on the o UTP - Unshielded Twisted Pair
receiving end. o STP - Shielded Twisted Pair
NETWORK CABLES
TWISTED PAIR CABLES
Networking
Networking
NETWORK INSTALLATION AND 10. LEARN THE BASICS OF NETWORK
CONFIGURATION INSTALLATION
HOW TO MANAGE NETWORK EFFECTIVELY? Benefits:
Avoid expensive installation/setup
fees
NETWORK INSTALLATION Strategies
Saves time
1. DECIDE ON A NETWORK TYPE
Three (3) Basic Network Types: Business Fit
Wired Networks
Wi-Fi Networks
HOW TO MANAGE NETWORK EFFECTIVELY?
Hybrid Networks
2. PLAN YOUR INSTALLATION 1. Create an inventory of most important
Things to Consider: system
Start Deciding Called Critical Infrastructure list
How many Data Points? Manually check your Network
Understand and Get It Right 2. Develop a change control process
3. CALCULATE CABLE AMOUNTS Document all process
Things to Consider: Log all the changes implemented
Choose Location 3. Awareness for the compliance standard
Measure Check First
Add some Extra System for Compliance and for
4. GET THE RIGHT MATERIAL troubleshooting
Which Network? 4. Have a map with status icon
Wired Add an icon for all devices in infrastructure
list
Wi-Fi
Display this map
Hybrid
5. Look at dependencies
5. GATHER THE TOOLS
Set dependencies monitoring
Tools Needed:
6. Setup alerting
Punch Down Tools
Schedule monitoring alerts
Crimping Tools Alerts to specific server and apps teams
Network Test Tool 7. Decide on standards and security
6. POSITION THE WALL PLATES Alert is backed up with additional
What to do? information
Mark it o SMNP (Simple Network
Placed in Convenient and Accessible Management Protocol)
Location o WMI (Windows Management
Avoid in Switches Instrumentation)
7. CUT HOLES/RUN THE CABLES 8. Getting supplemental data
What to do? Look at Logs
Turn off the Power Capture the network traffic
Run Cables one at a time Log Application Information
Wear PPE 9. Network perimeter
8. TEST THE CABLES Watch what’s coming in and out
What to do? IDS (Intrusion Detection System)
Connect it 10. Tracking users and devices
Network Test Too EACH Have a process
9. SET UP THE ROUTER/MODEM Know who are connected
Things to consider:
Proper Router/Modem
Proper Electrical outlet
Networking