Networking
Networking
Internet is a mother of all networks, because it is the largest network currently available and that all
other local network needs resource of internet or internet service. The term mother is used
metaphorically.
What is an example of a computing device? The most commonly is desktop computer, laptop, tablets,
smartphones, telephone, network printers and so on.
TYPES OF DATA:
Text
Audio
Videos
Photos
Link
NETWORK TYPES depend on how large they are and how much of an area they cover geographically.
1. LAN
3. WAN
4. SAN
5. PAN
6. CAN
7. EAN
COMMUNICATION TYPES
Unicast, Multicast, Broadcast – Defines the device on a network.
Broadcast – refers to the act of sending a message or signal to a large group of people or devices
simultaneously. In broadcasting, a single source sends information to multiple recipients who are
typically unknown to the sender.
TRANSMISSION MODES
Simplex, Half Duplex, Full Duplex – Defines the flow of data on a network
It uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for Ethernet
Technology or Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for
Wireless Technology.
E.g. Walkie-talkie
NETWORKING DEVICES
Hub, Switch, and Router are three devices that are similar, but there is a difference in the way they
handle data.
HUB
Considered to be not intelligent because it does not filter any data or has any intelligence as to
where data is supposed to be sent. And that because that only thing a hub knows is when a device is
connected to one of its ports. When the data arrives at one of the ports, it is copied to all the other
ports. So, all the devices on the hub sees that data packets. So, again a data pocket comes into on port
the hub will just rebroadcast that data to every port that has a device connected to it. All computer
received data even though not intended for them. It creates security concern, but it also creates
unnecessary traffic on the network which waste bandwidth.
SWITCHES
Similar to hub. A switch is intelligent because learn physical addresses (MAC Address). It stores
this physical address in switch table. So, when data packet is sent to switch, it’s only directed to intended
destination port, unlike hub will just rebroadcast the data to every port.
HUB and SWITCHES are used to allow connect multiple devices to a single network to exchange data and
resources. They are not used to exchange data outside their own network, such as out of the internet.
To exchange or route data outside their own network to another network, such as internet, a device
needs to be able to read I.P. Addresses. HUB and SWITCH do not read IP Address. So that’s where the
router comes in.
ROUTER is a device that routes or forwards data from one network to another based on their IP Address.
When data packets are received from the router, the router inspects the data’s IP address and
determines if the packet was meant for its own network or if it’s meant fo another network. If the router.
The router is the GATEWAY OF A NETWORK.
PORT
Hub – 4 to 12 ports
Switch – 5, 8, 10, 16, 24, 28, 48, 52
Router – 5 ports
Bridge – 2 ports
Modem – 1 port
Infrared waves – transmit data through invisible light waves. Used in remote control, Optical wireless
(comes from fiber optics etc.
PRIVATE NETWORK nasa loob ng router, papalabas public.. if red network the router also filters red data,
if not red hindi niya papapasukin at irereject lang niya. Yung ip address kasi hindi intended sa network
MODEM – is responsible for sending and receiving signals from the ISP
PROTOCOL
Blue guy and red guy. What if no protocols. Blue guy speaks at high-speed receiver cannot handle this.
This communication becomes useless
What If blue guy speaks the language which red guy can’t understand. Grammatically correct. This
communication become s useless
Nagsasalita ka pa ng mas mabilis tapos hindi mo binibigyan ng pagkakataon magsalita puro ikaw nalang,
this communication becomes useless. Baka maasar kapa, mabwisit kapa, manuntok kana.
MESSAGE ENCODING – the source computer generates the message, it gives to encoder to convert into
signals, once data is converted it is given to transmitter for transmission and ready to receive data.
Data attached to different protocols and transmission media. Data sa umpisa. Madagdagan ng segment
frame packet. Etc.
MESSAGE SIZE – If the capacity of the is very small, but the data to be transmitted is very big, this
computer should break this big data into smaller units which this transmission medium can handle.
MESSAGE TIMING – Deals with flow control and response timeout. FLOW CONTROL the sender is very
fast the receiver is slow, Since the sender is very fast, it can send data at high speed. The receiver can’t
handle speed. If there is no flow control mechanism, can keep sending data but cannot receive that data
also known request timeout. So, the entire communication becomes useless. Is the responsibility of
protocol to provide flow control mechanism.
MESSAGE DEIVERY OPTION – whether message is for only one destination, or some groups of
destination, or all the destinations in the network (unicast, multicast, broadcast).
PUBLIC IP ADDRESS is publicly registered on the internet. You need public ip address to access internet,
approximately 4 billion IP Addresses available. So, they are limited.
PRIVATE IP ADDRESS is not publicly registered. So, you cannot directly access the internet with a private
IP. It is only used internally such as home and business.
Router have NAT to translate private IP to Public IP, Public IP to Private IP. Kaya naman kasi ginagawa
yung NAT para masolusyunan yung malimit yung 4billion IP. Sa IPv6 kahit wala ng NAT kasi kaya supplyan
ng IPV6 lahat ng public IP address approximately 340 x10 power 38 or 340 undecillions.
1. Online meetings and webinar through apps like zoom, google meet and so on.
2. Financial Budgeting is the process of planning company expenses and revenues for a time period.
3. In terms of salary auto compute na ng system, di kana magcompute, pwede ka magpashod online. Sa
online banking you can ask access your account real time like check balance, makakapag withraw and
deposit ka kahit aa bahay lang.
NETWORK PROTOCOLS
POP3 (POST OFFICE PROTOCOL) – older protocol for receiving email. One way email synchronization.
SMTP Server is responsible for sending email. SMTP server validates email details such as the message
and the attachments to make sure it’s in compliance with the email policy and once that’s done it will
place the email in the outgoing queue. So, now the Gmail SMTP Server needs to figure out how to
deliver the email tom.yahoo.com. To do this need to find the recipients’ email server, for example
mailbox. So, the first thing that the SMTP server looks at is at the domain name which is yahoo.com. It
converts domain name (yahoo.com) to numbers (12.250.56.78). SMTP server will ask DNS Server to
resolve yahoo.com into an IP address. If the connection established our email is broken into smaller
pieces called packets and travel over the internet until reaches Yahoo Email Server and once it reaches is
going to perform some security check to make sure there’s no viruses or spam in the email and once that
is complete it will place the email in Tom’s mailbox. When Tom logs into his email account he can view
the email.
Email client – email application that is installed on the user’s devices, such as computer or a
mobile phone. Eg: Mozilla Thunderbird, Outlook, Apple Mail,
Webmail – an email system in which users can access email via a web browser on any device
that is connected to the internet. Eg: Gmail, Yahoo! Mail, and Hotmail.
EMAIL is the one of the convenient ways to send and receive messages, in today’s world the
number one to solve is securing an organization’s email infrastructure. Email is vulnerable to fraud such
as phishing and spoofing with many hackers impersonating and using non-authenticated domain and
they used these methods to trick someone to steal sensitive information such as passwords, bank
accounts, credit card and so on.
IMPTANT WORD
Bottleneck
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) – used in Ethernet Technology.
Access method to help avoid collision and to also respond correctly if collision does happen.
Carrier Sense Multiple Access with Collision Detection (CSMA/CA) – used in Wireless Technology.
OSI MODEL
If you want to be a network admin/system or network administrator or whatever you need to learn the
OSI Model. Nowadays OSI Model cannot exist (obsolete in 2019) kasi ang ginagamit na nating model ay
TCP/IP Model na. Bakit? Malalaman natin yan sa susunod na chapter.
Maraming naglalabasang model pero ang pinakaunang model ang na naging standard ay ang OSI
Model kasunod niyan yung TCP/IP. Almost same lang kasi halos yung dalawang yan may hinigsian
lang sa TCP/IP. Hindi natin pagusapan si TCP/IP si OSI pag uusapan natin.
OSI Model isang framework(real or conceptual structure) na nagdedescribe sa kung paano
nagwowork ang isang networking system).
Standard – have definite rule and principles that used as accepted as normal
ISO – National standard bodies – is an organization who develops and implements standards in the
networking community.
Founded in Feb, 23, 1943 and published over 25,000 standard covering all almost aspect of
technology and manufacturing.
Vendor/supplier of different product in food, IT, agri, healthcare and others
To make life easier, safer, and better.
Aerospace, Automotive, Food and Drugs (FDA), Medical Devices, Oil and Gas, and Networking,
ISO is non-governmental (NGOs)– voluntary group of individuals or organizations, usually not affiliated
with any government, that is formed to provide services or to advocate a public policy.
Most widely used standards include IEEE 802.11 (Wi-Fi), IEEE 802.3 (Ethernet), IEEE 754 (floating
point arithmetic)
ANSI
Magumpisa tayo kay Application Layer. Meron tayong isang main character w/c is si DATA.
Presentation Layer
EBCIDIC
28 (256 128 64 32 8 4 2 1)
ASCII
27 (256 128 64 32 8 4 2 1)
Lossy – data elimination, size reduction, can’t restore the image or file to their original state.
Lossless – can restore image or file to their original state.
ASCII
UNICODE – 149,878 characters. Include characters in latin, Greek, Armenian Hebrew and so on. UTF-8,
UTF-16, UTF-32
HTTPs uses SSL/TSL protocol to encrypt normal HTTP. HTTPs is more secure
If you want to view a webpage or download a file or look at an email, you expect to view the web page
intact and in order, with nothing missing. Or if you download a file, dapat maayos yung file. Because if
data is missing and out of order, ayaw mo naman ng ganun siguro. So this is where TCP comes in
TCP stands for Transmission Control Protocol the main protocol used in TCP/IP network. Send slowly
than UDP
Without TCP, then some of the data could be missing or out of order,
If view a web page without TCP protocol, ang webpage ay sira, kulang kulang, baligtad. The
images could be missing, or the text could be backwards and out of order. It becomes useless
If you download a file, then you might not get the entire file, or you could get the file out of
order, it becomes useless. So again, this is TCP comes in.
ERROR DETECTION
CRC –
Establish – create a connection that allows user to share data. It can send data one to one,
selected devices, all devices. AUTHENTICATION – process of verifying who you are?
DATA TRANSFER: Handle data to exchange half or full duplex mode
MANAGE: to maintain connection alive, in case of error happens it checks automatically and
provide recovery to active sessions. AUTHORIZE/ PERMISSION from server
SYNCHRONIZE: When data is transmitted it is received at same time in case error happens.
Fiber optics is composed of three elements – the core, the cladding and the coating.
Infrared waves or infrared light
2. Coaxial Cable: It provides better resistance to EMI compared to twisted pair cable due to the shielding.
Fiber Optic Cable: It is highly immune to EMI since it transmits data using light signals, which are not
affected by electromagnetic interference.
Large office setting typically 1000 square feet (2 school rooms) and accommodating greater number of
employees (more than 10) and workstations
Wavelength describes how long the wave is. The distance from the "crest" (top) of one wave to the crest
of the next wave is the wavelength.
Frequency is the number of waves that pass a point in a certain period of time.
MTRJ – have hybrid connector (combine coaxial cable and fiber optic cable), single and multi-mode
Connectors are smaller in size compared to SC connectors. Latching mechanism: SC connectors use a
push-pull latching mechanism, whereas LC connectors use a clip-locking mechanism to secure the
connector in place.