0% found this document useful (0 votes)
23 views

Computer Network Fundmentals

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views

Computer Network Fundmentals

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 75

Computer Networks

Course Objectives
 Introduction to Computer Networks
 OSI Model
 TCP/IP Model
 Network Devices
 Network media
 Wireless Networks
 Virtualization
 Security Fundamentals
Introduction
What is the Computer Network (CN) ?
Computer Network: a collection of computers, and
other devices, or peripherals connected together
through connecting media to perform certain task
such as share resources.
Benefits of Computer Networks.
◦ Resources Sharing
◦ File Sharing
◦ Devices Sharing
◦ Software Sharing with multi-user licenses.
◦ Voice and Video calls
◦ Shared Internet Access
Networks Classifications
According to Covered Area
◦ How large is the network?

According to network topology


◦ How the computer are connected?

According to network model


◦ What type of model?
According to Covered Area
PAN (Personal Area Networks): A computer network for interconnecting devices centered on
an individual person's workspace.
LAN (Local Area Networks): a group of computers connected in small geographical area,
limited area such as a residence, school, laboratory High speed of communications, Under your
administrative Control.
MAN (Metropolitan Area Networks): A MAN connects an area larger than a LAN but smaller
than a WAN such as a city.
WAN (Wide Area Networks):A WAN is a group of computers connected in Large geographical
area such as country. Under your A WAN often connects two LANs (WAN Link) ISP Administrative
control
According to Network Topology
refers to the shape of a network, or the network's
layout.
Two types of Network topologies:
◦ The physical topology: physical way (how computers
connected to each other physically :_wired or wireless)
◦ The logical topology: the way the he message are sent.
(how to send message from device to other)
The choice of topology is dependent upon :
◦ Type and number of equipment being used
◦ Cost
Each topology has its own advantages and
disadvantages
According to Network Model
Peer to Peer Networks:
• No dedicated resources to present specific service.
• Easy to work with.
• All nodes are the same (equal to use the resources.

Client/Server Networks:
• Some nodes (SERVER) are dedicated to present
services to other nodes (CLIENTS).
• Server is more powerful.
Peer to peer vs client/server model
Basic Network Elements
Hardware
 Computers / Peripherals
 NICs
 Connecting Media
 Networking Device(s)
◦ Routers
◦ Switches
◦ Hubs

Software
 Protocols
◦ Communication rules that all entity must agree on
Open Systems
Interconnection Reference
Model OSI RM
OSI Reference Model
 OSI: Open Systems Interconnect
 OSI/RM was defined by ISO in 1983
International Organization for Standardization

 OSI Three practical functions


o Give developers universal conceptsso they can develop protocols
o Explain the framework used to connect heterogeneous systems (Client/server can communicate even if
they have different OS)
o Describes the process of packet creation

The OSI reference model breaks this approach into layers.


Benefits of using a layered model
• easier to troubleshooting
• It allows multiple vendor development through standardization of
network components.
• It allows various types of network hardware and software to
communicate.
• Changes in one layer do not affect other layers because of layer
separation.
• Layers interact with each other.
OSI (7-Seven Layers)
 Application
 Presentation
 Session
 Transport
 Network
 Data Link
 Physical
Application Layer
 Interface to end users
 File transfer
 Network management
 Email
 Many other services
 Protocols
◦ HTTP (Hyper Text Transfer Protocol)
◦ FTP (File transfer Protocol)
◦ SMTP (Simple Mail transfer Protocol)
◦ POP3 (Post office transfers Protocol)
◦ Telnet/SSH (secure Shell)
Presentation Layer
 Finding common presentation
between source and Destination
 Provide transformation of data to
support standardized application
interface
 Coding or Translation of data (ex:
EBCDIC to ASCII).
Session Layer
 Establishes, manages and terminates
sessions (connections) between
cooperating applications
 Synchronization (add checkpoints into
a stream of data).
Controls the sessions between the
local and remote applications
Transport Layer

 Organize data into Segments


 Provide reliable transport between
end systems (source and destination
hosts)
 End-to-end error recovery.
 End-to-end flow control.
Network Layer
 Organize data into datagram (packets)
 It is responsible for the Internet
Protocol Addressing (IP) (Addressing)
 It know the best path for the
destination (Routing)
 End-to-end Addressing.
Data link Layer
 Reliable data transfer across a physical
link (Error Control).
 Organize the data into Frames, to be
put on the physical medium.
 Check the Frame For errors.
 Hop to hop addressing.
Physical Layer
 Transmission of unstructured bit
stream over the physical link
 Deals with the mechanical and
electrical specifications of the
interface and transmission media
(cables and connectors)
 Representation of bits.
Data Encapsulation &
Data De-Encapsulation
OSI Exercise
OSI Exercise (Cont.)
Transmission Control
Protocol/Internet Protocol
TCP/IP
TCP/IP
Transmission Control Protocol/Internet Protocol.
TCP/IP is open standard protocol
o Not tied to one vendor
TCP/IP is the internet protocol
Now internet use TCP/IP v4
Next version TCP/IP v6
It is the default protocol for all modern operating systems
◦ Microsoft Operating Systems
◦ UNIX Operating Systems
◦ LINUX Operating Systems
Major Networking Protocols
TCP/IP _ free / standard
IPX/SPX _ by Novel/ not free/not standard
NetBEUI –not routable
Apple Talk
Data Link Control (DLC)
Defines four layers

 Uses different names for Layers 1


through 3.

 Combines Layers 5 through 7 into


single application layer.
Data Encapsulation
Some Protocols in TCP/IP Suite
TCP/IP Protocol Architecture
Network Access Layer
Physical Layer
◦ Transmission medium
◦ Signal rate

Datalink Layer
◦ Logical interface between end system and network
◦ Hop to Hop addressing
◦ Error detection Mechanism
Physical (Mac) Addresses
 Physical Address burned on the card
 Unique address over the world called Mac
address.
 48-bit(6-byte) written as 12 hexadecimal digits;
every byte (2 hexadecimal digits) is separated by a
colon :
Physical addresses can be either
◦ unicast
◦ multicast
◦ broadcast
Communicating Within the LAN
TCP/IP Protocol Architecture
Internet Layer (IP Layer)
 Packet in the IP layer is called Datagram
Datagram consist of TWO parts
o Header
o Data

 Routing of data
 Logical addressing IPV4 , IPV6
Internet Protocol (IP V4)
 Uniquely identify each device on an IP
network layer.
 Some times we called it the logical
address
 Every host (computer, networking
device, peripheral) must have a unique
addressat the same network
 The IP address 32 bitdivided into 4
octets each octet 8 bit
IP ADDRESS Classes
How to assign IP address to device

 Manually
 Automatic
 APIPA
DHCP Server
 usedto assign dynamically the IP
Configuration including (Host IP,
Subnet mask, Default Gateway, DNS
server IP and the Lease Time)
Dora(discover –offer-request-
acknowledgment)
APIPA
 If no DHCP server is available the APIPA is used
 Auto configuration IP address
 used to let LAN users talk to Each other if the DHCP fails
 Can not be Routed
 Rang : 169.254.X.X
RESERVED ADDRESS
 Network address:
◦ reserved
◦ can not be assigned to any device
◦ used for routing by the router
◦ Class A:10.0.0.0
◦ Class B: 172.16.0.0
◦ Class C:192. 168.1.0
Broadcast Address
◦ Used by a router to send a message to every
host in the internal (LAN)
◦ Used to let the host search for Network
Resources Example: DHCP
 Loop back Address
◦ address: It is used just for testing.
◦ TCP/IP Protocol Suit 127.0.0.1 example test
NIC
ARP(ADDRESS RESOLUTION PROTOCOL) OPERATION
TCP/IP Protocol Architecture
Transport Layer.
TCP Characteristics
 Transmission Control Protocol

 Transport layer protocol


 Use port numbers
 Reliable (Acknowledgement of receipt)
 Connection oriented(synchronization)
 Full duplex
 Error control(Error checking(checksum)
 Flow control
 Data-recovery features
 Sequencing of data packets
ESTABLISHING A CONNECTION
THREE-WAY HANDSHAKE
Flow Control
TCP Acknowledgment
UDP Characteristics
User Datagram Protocol / Transport layer protocol
Process to process communication
Use port numbers
Connectionless(no notification)
Unreliable
Perform very limited error checking
Very simple using a minimum of overhead
Provides best-effort delivery
 The data may be dropped due to:
 Routing Error,
 Duplicate data due to redundancy
 Data loss in its way due to TTL.

•Has no data-recovery features


TCP (Reliable) vs. UDP (Best-Effort
Comparison)
Mapping Layer 4 to Applications
Port Numbers
 Well Known ports
Range from 0 to 1,023 are assigned and controlled by ICANN
 Registered ports
Range from 1,024 to 49,151 not assigned or controlled by ICANN but can be registered at ICANN
to avoid duplication
 Dynamic ports
Range from 49,152 to 65,535 are neither controlled nor registered
Socket Address
TCP/IP Protocol Architecture
Application Layer

Communication between processes or


applications
Internet Services (Client/Web Server)
 The World Wide Web: HTTP
 Naming Service: DNS
 File Transfer: FTP
 Telnet Service
 Electronic Mail service: IMAP, POP3, SMTP
HTTP Protocol
 Hyper Text Transfer Protocol
 Supports the delivery of web
pages to the client
DNS
URL
o URL is Universal Resource Locator
o Protocol : HTTP or FTP
DNS
o Domain Name Servers
o Application specified in the TCP/IP suite
o A way to translate human-readable
names into IP addresses
How DNS works?
 At the beginning they use Hosts file
 It maps the IP addresses to host names
 It is found at
“C:\Windows\System32\drivers\etc”
 Then they make DNS Server to centralize
the Domain Name Servers.
 Servers are used to convert the
addresses we see and read into IP
addresses and vice-versa.
DNS Query
FTP File Transfer Protocol
FTP Client
Browser as a FTP client
◦ Use Internet Browser as FTP client.

Using MS Windows built-in FTP client


Third party programs “cute FTP”
Mail Server and Clients
Mail Clients
Web based
◦ Hotmail
◦ gmail

Non web based


◦ Outlook express
◦ Microsoft Outlook
Mail Protocols
 SMTP
◦ It is the common language used by the majority of Mail Servers to send messages back and forth to
other Mail Servers or Email Clients

 POP3 “Post Office Protocol version 3”


◦ In order to collect email messages from the Mail Server, the Email Client contacts the Mail Server.
◦ Download messages on the hard disk
◦ You can work Offline
◦ Keep the user’s quota on the server

•IMAP4 “Internet Message Access Protocol version 4”


◦ Retrieve only message header
Telnet
Telnet is a user command and an underlying
TCP/IP protocol for accessing remote
computers.
Through Telnet, an administrator can access
someone else's computer remotely

Telnet client
◦ Built in MS-Windows Telnet client
◦ Third party programs
Network Hardware
DEVICES & MEDIUM
Computers / Peripherals
Any device that can connect to network with NIC
Ex: Computer
◦ Mobile
◦ Laptop-
◦ Printers-
◦ Cameras
◦ smart TV
◦ -…..etc
NIC (Network Interface Card)
 Called network interface controller, network adapter
or LAN adapter.
 Operate at the physical layer of OSI/RM
 hardware component without a computer cannot be
connected over a network cable (interface between the
PC and the network )
 Resides in the motherboard of the PC
o Internal NIC (plugs into the motherboard directly )
o External NIC)Wireless and USB based )
 Have A physical Address burned on the card called
Mac.
Network Transmission Media
 To transmit data, a medium must exist
 The medium can be in the form of cables
or wireless medium
 Most common used media for data
networks
oWired Media
oWireless media
Network Transmission Media
 Cable Media
◦ Twisted Pair Cables
◦ UTP
◦ STP
◦ Coaxial Cables
◦ Fiber Optic Cables

Wireless Media
◦ WIFI
◦ Infra red
◦ Microwave
◦ Bluetooth
Most widely used (Ethernet networks)
Two basic types
◦ STP
◦ Shielded twisted pair
◦ Protected
◦ Hard to install
◦ UTP
◦ Unshielded twisted pair
◦ Most common
◦ Easy to install
◦ Less expensive
◦ Effected By electromagnetic interference

Use RJ-45 connectors


Crimper tool attach the twisted pair cable to RJ-45
UTP Categories
Coaxial Cable
High capacity cable
Used for video transfer
Has two types
oThick coaxial cable (Thicknet)
o ½ inch diameter
oThin coaxial cable (Thinnet)
o ¼ inch diameter

Use BNC connector


Fiberoptic
 Fiber optic cabling is composted of the
following components:
 The core that carries the signals. It is made
of plastic or glass
 The cladding maintains the signal in the
center of the core as the cable bends.
 The sheathing protects the cladding and the
core
FiberOptic Types
FiberOptic advantages
Advantages
◦ Faster than twisted pair and coaxial
◦ Send data as light pulses over glass medium
◦ Free of electromagnetic interference
◦ Highly resistance to Eavesdropping
◦ Support extremely high data transfer rate
◦ Allow grater cable distances without repeater
Disadvantages
◦ Expensive
◦ Hard to install
Thanks
[email protected]

You might also like