0% found this document useful (0 votes)
27 views14 pages

Networking

Uploaded by

akirayuuki013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views14 pages

Networking

Uploaded by

akirayuuki013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

COMPUTER NETWORK

Computer Network is s a group of interconnected devices connected by a wired or wireless


communication medium to exchange data and share resources.

Internet is a mother of all networks, because it is the largest network currently available and that all
other local network needs resource of internet or internet service. The term mother is used
metaphorically.

What is an example of a computing device? The most commonly is desktop computer, laptop, tablets,
smartphones, telephone, network printers and so on.

When we say connection or interconnection. What comes to your mind?

Answer: Chain, joined, linked, united.

TYPES OF DATA:

 Text
 Audio
 Videos
 Photos
 Link

NETWORK TYPES depend on how large they are and how much of an area they cover geographically.

DIFFERENT TYPES OF NETWORKS:

1. LAN

 Stands for Local Area Network.


 Group of devices (computer, server, switches, and printers) connected together in one physical
location, such as building, office, or home.
 In close proximity to each other.

 Ethernet LAN (Ethernet Local Area Network)


 The most common type of LAN is an Ethernet LAN.
 The data transmission speed of LANs is much higher than MAN and WAN.

 Wireless LAN (Wireless Local Area Network)


 Wireless LAN is under of this type where network uses wireless communication instead of wired
communication.
 WLAN is a LAN without using cables
 At least 2 devices to form WLAN.
 A WLAN typically have a WI-FI router or Wireless Access Point (AP).
2. MAN

 Stands for Metropolitan Area Network.


 A network that connects computers within a metropolitan area, which could be a single large
city, multiple cities and towns, or any given large area within multiple buildings.
 Shares data and resources within a city

3. WAN

 Stands for Wide Area Network.


 Largest type of network that can connect numerous LANs and even MANs. (CAN, PAN, EAN)
 It spans over a large geographical area such as country, continent or even the entire globe.
 The Internet is an example of WAN.

OTHER NETWORK TYPES

4. SAN

 Stands for Storage Area Network.


 Is a high speed that connects network that stores and provide access to large amount of data.
 Dedicated network that used for data storage. (HDD, SSD, Cloud Storage).
 This network consists of multiple disk arrays, switches, and servers.
 SANs are not affected by network traffic because it is not a part of LAN.
 SANs are fault tolerant (If switch or disk array of a server goes down

5. PAN

 Stands for Personal Area Network.


 Falls under the LAN spectrum.
 Used for personal level.
 Small network that connects smartphones, tablets, and laptops using wireless technology (WIFI).
 Wireless technology such as Bluetooth, Infrared or Near Field Communication (NFC).
 Can also connect by wired network using a USB Cable.
 Used for transferring small files such as music, photos, videos, and so on.

6. CAN

 Stands for Campus Area Network.


 Falls under the MAN sub-category.
 A network that can join two or more LANs together within a limited area.
 E.g.: Universities that has multiple buildings in the same general area that are connected to each
other to form a larger network. These buildings could be different departments inside the
University’s property which each building having their own LAN in their departments.

7. EAN

 Stands for Enterprise Area Network.


 Falls under the WAN sub-category.
 Belonging from different organizations (international and local shop) from different parts of the
continent. Eg. LAZADA, SHOPPEE, MICROSOFT (Microsoft 365 subscription), GOOGLE (Gdrive
subscription), ORACLE and so on.

COMMUNICATION TYPES
Unicast, Multicast, Broadcast – Defines the device on a network.

 Unicast – is a type of communication protocol used in computer networks where a message is


sent from one sender to one receiver. In other words, it is a one-to-one communication method.

 Multicast – is a network communication method in which a single message is sent to a group of


recipients at the same time. Unlike unicast, which sends a message to a single recipient,
multicast sends a message to a select group of recipients who have expressed interest in
receiving the message.

 Broadcast – refers to the act of sending a message or signal to a large group of people or devices
simultaneously. In broadcasting, a single source sends information to multiple recipients who are
typically unknown to the sender.

TRANSMISSION MODES
Simplex, Half Duplex, Full Duplex – Defines the flow of data on a network

 Simplex Mode – The communication mode is unidirectional (only in one direction).

E.g. Television, Monitor, Keyboard

 Half-duplex Mode – Either direction, but only one way at a time.

 It uses Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for Ethernet
Technology or Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for
Wireless Technology.

E.g. Walkie-talkie

 Full-duplex Mode – Both directions at the same time.

E.g. Telephone, mobile,

NETWORKING DEVICES
Hub, Switch, and Router are three devices that are similar, but there is a difference in the way they
handle data.

Similarities of Hub, Switch, and Router

 Multiple ports that accept Ethernet connections from network devices.


 Used to create network.
 They look kind similar to each other.

HUB

Considered to be not intelligent because it does not filter any data or has any intelligence as to
where data is supposed to be sent. And that because that only thing a hub knows is when a device is
connected to one of its ports. When the data arrives at one of the ports, it is copied to all the other
ports. So, all the devices on the hub sees that data packets. So, again a data pocket comes into on port
the hub will just rebroadcast that data to every port that has a device connected to it. All computer
received data even though not intended for them. It creates security concern, but it also creates
unnecessary traffic on the network which waste bandwidth.

SWITCHES

Similar to hub. A switch is intelligent because learn physical addresses (MAC Address). It stores
this physical address in switch table. So, when data packet is sent to switch, it’s only directed to intended
destination port, unlike hub will just rebroadcast the data to every port.

HUB and SWITCHES are used to allow connect multiple devices to a single network to exchange data and
resources. They are not used to exchange data outside their own network, such as out of the internet.

To exchange or route data outside their own network to another network, such as internet, a device
needs to be able to read I.P. Addresses. HUB and SWITCH do not read IP Address. So that’s where the
router comes in.

ROUTER is a device that routes or forwards data from one network to another based on their IP Address.
When data packets are received from the router, the router inspects the data’s IP address and
determines if the packet was meant for its own network or if it’s meant fo another network. If the router.
The router is the GATEWAY OF A NETWORK.

Hub – Does not care about MAC Address

Switch, and Bridges – Operates physical address (MAC Addrress)

Router – Operates logical address (IP Address)

PORT

Hub – 4 to 12 ports
Switch – 5, 8, 10, 16, 24, 28, 48, 52

Router – 5 ports

Bridge – 2 ports

Modem – 1 port

WIRELESS COMMUNICATION MEDIA

Infrared waves – transmit data through invisible light waves. Used in remote control, Optical wireless
(comes from fiber optics etc.

Microwaves – radar, satellite and so on.

Radio waves – is a type of electromagnetic radiation. Telecommunication purposes. Radio, Television,


Mobile phones, Satellite, tower, etc.

PUBLIC AND PRIVATE NETWORK

PRIVATE NETWORK nasa loob ng router, papalabas public.. if red network the router also filters red data,
if not red hindi niya papapasukin at irereject lang niya. Yung ip address kasi hindi intended sa network

Ano mas preferred niyo?

MODEM – is responsible for sending and receiving signals from the ISP

ROUTER – disperses/distribute the signal to device on a network

PROTOCOL

Blue guy and red guy. What if no protocols. Blue guy speaks at high-speed receiver cannot handle this.
This communication becomes useless

. They have mutually agreed upon certain rules.

What If blue guy speaks the language which red guy can’t understand. Grammatically correct. This
communication become s useless

Nagsasalita ka pa ng mas mabilis tapos hindi mo binibigyan ng pagkakataon magsalita puro ikaw nalang,
this communication becomes useless. Baka maasar kapa, mabwisit kapa, manuntok kana.

MESSAGE ENCODING – the source computer generates the message, it gives to encoder to convert into
signals, once data is converted it is given to transmitter for transmission and ready to receive data.

MESSAGE ENCAPSULATION restrict/hide data from direct access

Like packaging an item to be delivered to the person or organization.


Example: attach manual to phone (1st layer of encapsulation), put in pouch bag (2nd layer
of encapsulation), put in the box (3rd layer of encapsulation), put in packaging that containing name,
phone number, address found in front of box (4th layer of encapsulation).

Data attached to different protocols and transmission media. Data sa umpisa. Madagdagan ng segment
frame packet. Etc.

MESSAGE SIZE – If the capacity of the is very small, but the data to be transmitted is very big, this
computer should break this big data into smaller units which this transmission medium can handle.

MESSAGE TIMING – Deals with flow control and response timeout. FLOW CONTROL the sender is very
fast the receiver is slow, Since the sender is very fast, it can send data at high speed. The receiver can’t
handle speed. If there is no flow control mechanism, can keep sending data but cannot receive that data
also known request timeout. So, the entire communication becomes useless. Is the responsibility of
protocol to provide flow control mechanism.

MESSAGE DEIVERY OPTION – whether message is for only one destination, or some groups of
destination, or all the destinations in the network (unicast, multicast, broadcast).

PUBLIC IP ADDRESS is publicly registered on the internet. You need public ip address to access internet,
approximately 4 billion IP Addresses available. So, they are limited.

PRIVATE IP ADDRESS is not publicly registered. So, you cannot directly access the internet with a private
IP. It is only used internally such as home and business.

If the device needs to access the internet need a public IP address.

ISP ang nagprovide ng Public IP

Router naman private IP

Router have NAT to translate private IP to Public IP, Public IP to Private IP. Kaya naman kasi ginagawa
yung NAT para masolusyunan yung malimit yung 4billion IP. Sa IPv6 kahit wala ng NAT kasi kaya supplyan
ng IPV6 lahat ng public IP address approximately 340 x10 power 38 or 340 undecillions.

Examples of some task that can be accomplished in using networking in offices:

1. Online meetings and webinar through apps like zoom, google meet and so on.

2. Financial Budgeting is the process of planning company expenses and revenues for a time period.

3. In terms of salary auto compute na ng system, di kana magcompute, pwede ka magpashod online. Sa
online banking you can ask access your account real time like check balance, makakapag withraw and
deposit ka kahit aa bahay lang.

NETWORK PROTOCOLS

A set of rules that a service follows in order to function.


IMAP (INTERNET MESSAGE ACCESS PROTOCOL) – Used for receiving email.

POP3 (POST OFFICE PROTOCOL) – older protocol for receiving email. One way email synchronization.

SMTP (SIMPLE MAIL TRANSFER PROTOCOL) – Used for sending email.

SMTP Server is responsible for sending email. SMTP server validates email details such as the message
and the attachments to make sure it’s in compliance with the email policy and once that’s done it will
place the email in the outgoing queue. So, now the Gmail SMTP Server needs to figure out how to
deliver the email tom.yahoo.com. To do this need to find the recipients’ email server, for example
mailbox. So, the first thing that the SMTP server looks at is at the domain name which is yahoo.com. It
converts domain name (yahoo.com) to numbers (12.250.56.78). SMTP server will ask DNS Server to
resolve yahoo.com into an IP address. If the connection established our email is broken into smaller
pieces called packets and travel over the internet until reaches Yahoo Email Server and once it reaches is
going to perform some security check to make sure there’s no viruses or spam in the email and once that
is complete it will place the email in Tom’s mailbox. When Tom logs into his email account he can view
the email.

EMAIL

Email client – email application that is installed on the user’s devices, such as computer or a
mobile phone. Eg: Mozilla Thunderbird, Outlook, Apple Mail,

Webmail – an email system in which users can access email via a web browser on any device
that is connected to the internet. Eg: Gmail, Yahoo! Mail, and Hotmail.

EMAIL is the one of the convenient ways to send and receive messages, in today’s world the
number one to solve is securing an organization’s email infrastructure. Email is vulnerable to fraud such
as phishing and spoofing with many hackers impersonating and using non-authenticated domain and
they used these methods to trick someone to steal sensitive information such as passwords, bank
accounts, credit card and so on.

NETWORK ADDRESS TRANSLATOR (NAT)

 Translate public IP address to unregistered public IP address.


 Private(local) IP Address and Global (public) IP Address.

IMPTANT WORD

Bottleneck

Carrier Sense Multiple Access with Collision Detection (CSMA/CD) – used in Ethernet Technology.
Access method to help avoid collision and to also respond correctly if collision does happen.

Carrier Sense Multiple Access with Collision Detection (CSMA/CA) – used in Wireless Technology.

Network Complexity – Physical network and network management. (ppt 16)

OSI MODEL

fail – unable to communicate over the network.


limited connectivity – you can connect to network, but an error occurs (corrupted files, incomplete
download, videos not loading, and so on).

OSI Model was develop by the ISO in the late 1970s

If you want to be a network admin/system or network administrator or whatever you need to learn the
OSI Model. Nowadays OSI Model cannot exist (obsolete in 2019) kasi ang ginagamit na nating model ay
TCP/IP Model na. Bakit? Malalaman natin yan sa susunod na chapter.

 Maraming naglalabasang model pero ang pinakaunang model ang na naging standard ay ang OSI
Model kasunod niyan yung TCP/IP. Almost same lang kasi halos yung dalawang yan may hinigsian
lang sa TCP/IP. Hindi natin pagusapan si TCP/IP si OSI pag uusapan natin.
 OSI Model isang framework(real or conceptual structure) na nagdedescribe sa kung paano
nagwowork ang isang networking system).

Standard – have definite rule and principles that used as accepted as normal

ISO – National standard bodies – is an organization who develops and implements standards in the
networking community.

 Founded in Feb, 23, 1943 and published over 25,000 standard covering all almost aspect of
technology and manufacturing.
 Vendor/supplier of different product in food, IT, agri, healthcare and others
 To make life easier, safer, and better.
 Aerospace, Automotive, Food and Drugs (FDA), Medical Devices, Oil and Gas, and Networking,

ISO is non-governmental (NGOs)– voluntary group of individuals or organizations, usually not affiliated
with any government, that is formed to provide services or to advocate a public policy.

 International development and aid


 Run budgets of millions or up billions of dollars each year

IEEE means “Eye-triple-E”.

 Most widely used standards include IEEE 802.11 (Wi-Fi), IEEE 802.3 (Ethernet), IEEE 754 (floating
point arithmetic)

ANSI

 ASCII (American Standard Code for Information Interchange)

Magumpisa tayo kay Application Layer. Meron tayong isang main character w/c is si DATA.
Presentation Layer

EBCIDIC

 28 (256 128 64 32 8 4 2 1)

ASCII

 27 (256 128 64 32 8 4 2 1)

SENDER AND RECEIVER

Data Translation – plain textASCII/UNICODE/EBCIDIC binary form


dataASCII/UNICODE/EBCIDICplain text

Data Compression – binary form data compressorcompressed datadecompressor binary form

 Lossy – data elimination, size reduction, can’t restore the image or file to their original state.
 Lossless – can restore image or file to their original state.

Data Encryption – compressed datapublic keyciphertextprivate key  compressed data

ASCII

Basic ASCII – 128 characters (8 bit or max 11111111)

EXTENDED ASCII - 256 characters.

EBCIDIC – 256 characters.

UNICODE – 149,878 characters. Include characters in latin, Greek, Armenian Hebrew and so on. UTF-8,
UTF-16, UTF-32

HTTPs uses SSL/TSL protocol to encrypt normal HTTP. HTTPs is more secure

Magtrigger na yung HTTPS – SSL – Data Encryption.

SSL uses both symmetric and asymmetric encryption


Transport Layer

End to end connection – Uses TCP or UDP

If you want to view a webpage or download a file or look at an email, you expect to view the web page
intact and in order, with nothing missing. Or if you download a file, dapat maayos yung file. Because if
data is missing and out of order, ayaw mo naman ng ganun siguro. So this is where TCP comes in

TCP stands for Transmission Control Protocol the main protocol used in TCP/IP network. Send slowly
than UDP

Without TCP, then some of the data could be missing or out of order,

 If view a web page without TCP protocol, ang webpage ay sira, kulang kulang, baligtad. The
images could be missing, or the text could be backwards and out of order. It becomes useless
 If you download a file, then you might not get the entire file, or you could get the file out of
order, it becomes useless. So again, this is TCP comes in.

TCP and UDP are for sending and receiving data.

Connection-oriented – because established a connection and session (logical connection) – three-way


handshake

Connectionless – because do not establish a connection and session (logical connection)

ERROR DETECTION

FCS- is an error detection technique such as parity checking, checksum.

CRC –

APPLICATION – Uses software or computer applications. SM

PRESENTATION – translation, compression, encryption

- Translation, decompression, decryption

SESSION – establish (start/create), maintain(manage/resend), and terminate (stop) session.

API – software with distinct function.

API can do:


Authentication, authorization, Error handling

 Establish – create a connection that allows user to share data. It can send data one to one,
selected devices, all devices. AUTHENTICATION – process of verifying who you are?
 DATA TRANSFER: Handle data to exchange half or full duplex mode
 MANAGE: to maintain connection alive, in case of error happens it checks automatically and
provide recovery to active sessions. AUTHORIZE/ PERMISSION from server
 SYNCHRONIZE: When data is transmitted it is received at same time in case error happens.

Fiber optics is composed of three elements – the core, the cladding and the coating.
Infrared waves or infrared light

1. Fiber optics is backbone (central infrastructure interconnects/supports components of computer


network – devices, client/server, protocol, OS, and so on) and provides high speed network connection.
Telecommunication company is the most popular na gumagamit ng fiber optics as backbone.

2. Coaxial Cable: It provides better resistance to EMI compared to twisted pair cable due to the shielding.
Fiber Optic Cable: It is highly immune to EMI since it transmits data using light signals, which are not
affected by electromagnetic interference.

Large office setting typically 1000 square feet (2 school rooms) and accommodating greater number of
employees (more than 10) and workstations

Fragile means easily to broken or damage

Wavelength describes how long the wave is. The distance from the "crest" (top) of one wave to the crest
of the next wave is the wavelength.

Frequency is the number of waves that pass a point in a certain period of time.

 High Frequency – maraming wavelength


 Low Frequency – madalang wavelength

Broadband used in twisted fair and fiber optics cable.

Single mode uses laser diode

Multimode uses light-emitting diodes (LEDs)

ST – Straight Tip, bayonet style – single mode

SC -Subscriber/Standard/Square Connector – single and multi-mode

LC – Lucent/ Local Connector – single and multi-mode

MTRJ – have hybrid connector (combine coaxial cable and fiber optic cable), single and multi-mode

Connectors are smaller in size compared to SC connectors. Latching mechanism: SC connectors use a
push-pull latching mechanism, whereas LC connectors use a clip-locking mechanism to secure the
connector in place.

Density means bigat

Denser medium higher density


Rarer medium lesser density

You might also like