Cyber Security Lesson 1 Slides
Cyber Security Lesson 1 Slides
Cyber Security
Exploring the Fundamentals of Networking
Look at the history of networking and some
common networking terms
Explore network data transmission
Examine various network topologies
Objectives
Introduction to
networking
History of computer
networking
• The earliest concept of computer
networking was proposed by
Leonard Kleinrock in 1961.
• First network to use packet
switching.
What is computer
networking?
(Cisco , 2015)
User Datagram
Protocol (UDP)
• A protocol used in networking
in an area where a higher
speed of transmission is
required, and data loss
tolerance is low
• Used in voice, calls, DNS look-
up and video streaming
For example:
In a scenario where John sends a mail
to Kate, the NTP tracks the time the
mail was sent and the time it took for
Kate to receive it
Point-to-Point Protocol
(PPP)
• Performs a convenient means for transporting multi-
protocol datagrams over point-to-point links
• Could also be used for trunking between switches or
routers
Netware Core
Protocol (NCP)
A file-sharing protocol between client
and a server. NCP generally enables
the communication between point-
to-point protocol
File Transfer Protocol (FTP)
• Aids the provision for uploading and
downloading files and data from a remote
host running on an FTP server
• Gives users the ability to view, edit, and
even delete the file on the server
Hypertext Transfer
Protocol (HTTP)
For example:
With the aid of RDP, John could
connect to Kate's computer
remotely and be able to view,
edit and even download content
from her computer which will be
displayed on his as a local
application.
Voice-over Internet
Protocol (VoIP)
• Network cables
• Switches
• Routers
• Hubs
• Repeaters
• Bridges
• Extenders
• Network interface cards
Network cables
(jackleachipt, 2020)
Extender
(jackleachipt, 2020)
Network data
transmission
Open Systems
Interconnection Model
(OSI Model)
( Tuples , 2020)
Network
topologies
Introduction to
network topology
• Easily managed
• In the case of a network attack, if one of the
connected devices goes offline, the other part of the
network is still functional
• Easily scalable
Disadvantages of star
topology
• Cost
• Time
• Management
• Redundancy