Chapter One
Chapter One
Introduction
to Networks
Page 1
• We now stand at a critical turning point in the use
of technology to extend and empower our ability
to communicate.
• The globalization of the Internet has succeeded
faster than anyone could have imagined
Page 2
• In the next stage of our development, innovators will use
the Internet as a starting point for their efforts - creating
new products and services specifically designed to take
advantage of the network capabilities.
Introduction • Communication is almost as important to us as our reliance
on air, water, food, and shelter.
cont… • The creation and interconnection of robust data networks
has had a profound effect on communication, and has
become the new platform on which modern
communications occur.
Page 3
• Imagine a world without the Internet. No more Google,
YouTube, instant messaging, Facebook, Wikipedia, online
gaming, Netflix, iTunes, and easy access to current
Introduction •
information.
No more price comparison websites, avoiding lines by
cont… shopping online, or quickly looking up phone numbers and
map directions to various locations at the click of a finger.
• How different would our lives be without all of this? That
was the world we lived in just 15 to 20 years ago
Page 4
Introduction • But over the years, data networks have slowly
expanded and been repurposed to improve the
cont… quality of life for people everywhere.
Page 5
"Fixed" Computing Mobility/BYOD Internet of Things Internet of
(You go to the (The device goes (Age of Devices) Everything
device) with you) (People, Process,
Data, Things)
50B things
Doubles every (?)
years
10B
Networks
Doubled every 1.4
years
in Our Past
200M
Doubled every 13
years
and Daily
Lives
1995 2000 2011 2020 *
Page 6
Introduction cont…
Page 7
Networking impacts in our daily lives
Page 8
Networks
Support the
Way We • Support the creation of virtual classrooms
Learn •
•
Provide on-demand video
Enable collaborative learning spaces
• Enable mobile learning
Page 9
Networks
Support the • Instant Messaging (IM) / Texting
Way We • Social Media
Communicate • Collaboration Tools
• Weblogs (blogs)
• Peer-to-Peer (P2P) File Sharing …
Page 10
Clients and Servers
Email Server
Web Server
File Server
File Access Client
Browser Client
File Server
Web Browser
Email Client
Email Client
Web Browser
Web Server
File Access Client
Web Browser
Email Client Email Server
File Access Client
Page 11
I have a printer to I have files to
share. share.
in a » Easy to set up
» Less complexity
Network
’ Lower cost since network devices and dedicated servers may not be required
’ Can be used for simple tasks such as transferring files and sharing printers
Peer-to-
The disadvantages of peer-to-peer networking:
• No centralized administration
» Not as secure
Page 12
Devices Devices
Devices
Devices
Internetwork
LAN LAN
Network printers
Security cameras
Page 14
Examples of
intermediary
network Network Access
devices are:
Devices (switches, and
wireless access points)
Network Internetworking
Infrastructure Devices (routers)
Devices
Security Devices
(firewalls)
Page 15
Copper
Media
Wireless
Page 16
The distance the media can
successfully carry a signal
Page 17
Desktop Computer Laptop Printer
End Devices
Network Intermediary
Wireless Router LAN Switch Router
Representations Devices
Network Media
LAN Media
WAN Media
Page 18
Components of a Network
Topology Diagrams
Classroom 1
Page 19
Topology
Physical Topology
Page 20
1-
20
Networks
Mesh Topology
• Dedicated point-to-point
link to every other nodes
• A mesh network with n
nodes has n(n-1)/2 links. A
Station
• Advantages: No traffic
problems, robust, security,
easy fault identification &
Station Station
isolation
• Disadvantages: Difficult
installation/reconfiguration,
space, cost
Page 21
1-21
Networks
Star Topology
• Dedicated point-to-point link only to a central controller, called
a hub
• Hub acts as an exchange: No direct traffic between devices
• Advantages: Less expensive, robust
• Disadvantages: dependency of the whole on one single point, the
hub
Hub
Page 22
1-22
Networks
Bus Topology
• One long cable that links all nodes
• tap, drop line, cable end
• limit on the # of devices, distance between nodes
• Advantages: Easy installation, cheap
• Disadvantages: Difficult reconfiguration, no fault isolation, a
fault or break in the bus stops all transmission
Page 23
1-23
Networks
Ring Topology
• Dedicated point-to-point link only with the two nodes on each
sides
• One direction, repeater
• Advantages: Easy reconfiguration, fault isolation
• Disadvantage: Unidirectional traffic, a break in the ring cab disable
the entire network
Station Station
Repeater Repeater
Repeater Repeater Station
Station
Repeater Repeater
Station Station
Page 24
1-24
Networks
Hybrid Topology
• Example: Main star topology with each branch
connecting several stations in a bus topology
• To share the advantages from various topologies
Page 25
1-25
The two most common types of network
infrastructures are:
• Local Area Network (LAN)
• Wide Area Network (WAN).
Types of Other types of networks include:
• Metropolitan Area Network (MAN)
Networks • Wireless LAN (WLAN)
• Storage Area Network (SAN)
Page 26
Local Area Networks (LAN)
A network serving a home, building or campus is considered a Local Area Network (LAN).
Page 27
Wide Area
Networks (WAN)
LAN LAN
WAN
Page 28
LANs, WANs, and Internets
The Internet
Internet
Page 29
The Internet
Intranet and Extranet
The Internet
The World
Extranet
Suppliers, Customers, Collaborators
Intranet
Company Only
Page 30
Connecting
to the
Internet Connection Options
Connecting DSL
Users to the
Internet Internet Service
Provider
Dial-Up
Small Office Telephone
Page 31
Connecting to the Internet
Connecting Businesses to the Internet
Connection Options
Dedicated Leased
Lines
Internet
Internet Service
Provider
Page 32
Converged Networks
The Converging Network
Multiple Networks
I
Rule
Agreement
Standard
Devices
Rule
Agreement
Standard
Medium
Devices
Rule
Agreement
Standard
Devices
Page 33
Converged Networks
Planning for the Future
Page 34
As networks evolve, we are discovering that there are
four basic characteristics that the underlying
architectures need to address in order to meet user
expectations:
Fault Tolerance
Reliable
Network Scalability
Supporting
Network Quality of Service (QoS)
Architecture
Security
Page 35
Examples of priority decisions for an
organization might include:
Page 36
Reliable Network
Providing Network Security
Criminal
Cheat
Identity Thief
Competitor
learn
live
Fraudster
The communication and information that we would like to be private is protected from those
who would make unauthorized use of it.
Page 37
Some of the top trends include:
Network
Trends Bring Your Own Device (BYOD)
New Online collaboration
trends
Video
Cloud computing
Page 38
Network Trends
1
u
Page 39
Collaboration
*
IP Communication Mobile Applications
Online
Collaboration
Telepresence Messaging
Online Conferencing
Page 40
People are becoming more connected...
World Population
Internet Users 2.08 billion worldwide
Internet users
Video
Communication
Internet video accounts Internet video will
2006 2012 for 40% of all consumer become 62% of all
2001 Internet traffic. consumer Internet traffic.
Page 41
Cloud
Computing
There are four primary types
of clouds:
• Public clouds
• Private clouds
• Custom clouds
• Hybrid clouds
Page 42
A data center is a facility used to
house computer systems and
associated components including:
• Redundant data communications
connections
Data • High-speed virtual servers (sometimes
referred to as server farms or server
Centers clusters)
• Redundant storage systems (typically uses
SAN technology)
• Redundant or backup power supplies
• Environmental controls (e.g., air
conditioning, fire suppression)
• Security devices
Page 43
Human Communication
What rules
Communication?
Page 44
Establishing the Rules
Confirmation or acknowledgement
requirements
Page 45
Message Signal Signal Message
Message
Encoding
Page 46
Message Formatting
and Encapsulation
Example: Personal letter contains the Sender
following elements:
4085 SE Pine Street
Ocala, Florida 34471
• A closing phrase
• An identifier of the sender
Page 47
The size restrictions of frames require the source
host to break a long message into individual pieces
that meet both the minimum and maximum size
requirements.
Page 48
Access Method
Page 49
The Rules
J
i
Source
Source
Page 50
How the message is formatted or
structured
Page 51
Application Protocol – Hypertext
Transfer Protocol (HTTP)
Page 52
TCP/IP ISO AppleTalk Novell Netware
7 HTTP ACSE
DNS ROSE
6 AFP NDS
DHCP TRSE
FTP SESE
5
Suites
4 UDP TP3TP4 NBPRTMP
Protocol 3
IPV4 IPV6
ICMPV4
CONP/CMNS
CLNP/CLNS
AFP IPX
Suites and
ICMPV6
Industry 2
Standards
Ethernet PPP Frame Relay ATM WLAN
1
Page 53
Protocol Suites
IMAP
IP s u p p o r t Routing Protocols
Internet Layer
ICMP RIP OS PF EIGRP BGP
Page 54
Network Protocols and Standards
Standards Organizations
<IEEE
I E
SundiHta
MANUFACTURERS 8 SUPPLIERS
OF GLOBAL NETWORKS
ICANN
The Internet Corpcrdtian for Assq"ed Names and Numbers
I n t e r n e t A s s i g n e d N u m b e r s Authority
Page 55
The Internet Society (ISOC)
Internet Architecture
Board (IAB)
Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF)
i _______ 1
Working Working Working Research Research Research
Group #1 Group #2 Group #3 Group #1 Group #2 Group #3
■ ■ • ■ ■ •
Page 57
• 38 societies
• 130 journals
• 1,300 conferences each
year
Standards • 1,300 standards and
Organizations projects
IEEE
• 400,000 members
• 160 countries
• IEEE 802.3
• IEEE 802.11
Page 58
OSI Model
data unit layers
data application
Network Process to Application
k ________________ ____________>
Host Layers
Reference data presentation
Data Representation & Encryption
Models
i j
data session
The OSI
Intertiost Communication
k _______________ ______________>
transport
segments
Reference
End-to-End Connections
and Reliability ,
network
Model
Media Layers
packets Path Determination &
Logical Addressing (IP)
physical
bits Media, Signal
and Binary Transmission j
k J
Page 59
Reference Models
The TCP/IP Reference Model
Page 60
OSI Model TCP/IP Model
7. Application
6. Presentation Application
Reference 5. Session
Models L.
4. Transport Transport
the OSI
2. Data Link
Network Access
and TCP/IP
1. Physical
Models
Page 61
Data • Segmenting message benefits
– Different conversations can be
Encapsulation interleaved
Communicating – Increased reliability of network
the Messages communications
• Segmenting message disadvantage
– Increased level of complexity
Page 62
Data Encapsulation
• Data Passing
Data Data
Data
down the
stack.
Protocol Data
Segment
Transport
•
Data
Packet
header
Network Transport
Data Packet
header header
• Bits
1100010101000101100101001010101001 Bits
Page 63
Protocol Encapsulation Terms
User Data
IP Packet
Encapsulation Web
server
| Data Web
Client
Page 64
Protocol Encapsulation Terms
User Data
IP Packet
De- Web
Server
Web
Client
encapsulation
—I oi oi trn 0101001o i m o i i 01010010
Page 65
Moving Data in the Network
Accessing Local Resources
r -
T T T
Timing and Destination and Destination and Destination and Encoded Application Data
Synchronization Source Physical Source Logical Source Process
Bits Addresses Network Addresses Number (ports}
Page 66
Network Address
• Source IP address
Network • Destination IP address
Addresses
& Data Link
addresses
Data Link Address
• Source data link
address
• Destination data link
address
Page 67
Accessing Local Resources
PC1
192.168.1.110
AA-AA-AA-AA-AA-AA
FTP Server
Page 68
192.168.1.9
CC-CC-CC-CC-CC-CC
Accessing Local Resources
R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
PC1 S1 R1
192.168.1.110
AA-AA-AA-AA-AA-AA
PC2
192.168.1.111
BB-BB-BB-BB-BB-BB
FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC
Page 69
Default Gateway
PC 1 R2
R1 172.16.1.99
192.168.1.110 192.168.1.1
AA-AA-AA-AA-AA-AA 22-22-22-22-22-22
11-11-11-11-11-11
Web Server
172.16.1.99
AB-CD-EF-12-34-56
PC 2 FTP Server
192.168.1.111 192.168.1.9
BB-BB-BB-BB-BB-BB CC-CC-CC-CC-CC-CC
Page 70
Data Link Network Layer
|— Ethernet Frame Header IP Packet Header
Network
Page 71
Accessing Remote Resources
Using Wireshark to View Network
Traffic
Destination Protocol
.000000 192.168. ARP f o r 1 9 2 . 1 6 8 .
.299139 192.168. 192.168. NBNS Name NBSTAT *<00><00>
.299214 192.168. .168. ICMP
.025659 192.168. IGMP Members hi p
.044366 192.168. .168 DNS standard query _ldap.
.048652 192.168.
.050784 192.168. .168. DNS 86 s t a n d a r d q u e r y . ww004
.055053 192.168. .168. 37 H T T P / 1 . 1 200 OF
.082038 192.168. .168. NBNS NB10061D<00>
.111945 192.168. .168. DNS standard L p r o x y c o n f . w004 .
.226156 192.168. .168. [SYN] Seq=
.227282 192.168. .168. [SYN, ACK]
w i r e (4 96 (496
. 1 6 8 . 0 . 2 (0 : 5d : 20 : cd : 02) , Dst : Net gear
c: 1 9 2 . 1 6 8 . (192.168.0.2), Dst: 192.168. (192.168.
o r t : n c u - 2 ( 3 1 9 6 ) , Dst P o r t : P (80), S
(3196)
ttp (80)
sequence number)
Header T
: 0x02 (SYN)
wi ndow : 64240
0000
0010
0020
0030
Page 72