0% found this document useful (0 votes)
9 views72 pages

Chapter One

The document discusses the evolution and significance of networks in modern communication, highlighting how the Internet has transformed social, commercial, and personal interactions. It outlines the various types of networks, their components, and the impact of networking technologies on daily life, including education, communication, and work. Additionally, it addresses future trends in networking, such as cloud computing and the importance of security and quality of service.

Uploaded by

nahoma010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views72 pages

Chapter One

The document discusses the evolution and significance of networks in modern communication, highlighting how the Internet has transformed social, commercial, and personal interactions. It outlines the various types of networks, their components, and the impact of networking technologies on daily life, including education, communication, and work. Additionally, it addresses future trends in networking, such as cloud computing and the importance of security and quality of service.

Uploaded by

nahoma010
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Chapter 1:

Introduction
to Networks

Page 1
• We now stand at a critical turning point in the use
of technology to extend and empower our ability
to communicate.
• The globalization of the Internet has succeeded
faster than anyone could have imagined

Introduction • The manner in which social, commercial, political


and personal interactions occur is rapidly
changing to keep up with the evolution of this
global network.

Page 2
• In the next stage of our development, innovators will use
the Internet as a starting point for their efforts - creating
new products and services specifically designed to take
advantage of the network capabilities.
Introduction • Communication is almost as important to us as our reliance
on air, water, food, and shelter.
cont… • The creation and interconnection of robust data networks
has had a profound effect on communication, and has
become the new platform on which modern
communications occur.

Page 3
• Imagine a world without the Internet. No more Google,
YouTube, instant messaging, Facebook, Wikipedia, online
gaming, Netflix, iTunes, and easy access to current
Introduction •
information.
No more price comparison websites, avoiding lines by
cont… shopping online, or quickly looking up phone numbers and
map directions to various locations at the click of a finger.
• How different would our lives be without all of this? That
was the world we lived in just 15 to 20 years ago

Page 4
Introduction • But over the years, data networks have slowly
expanded and been repurposed to improve the
cont… quality of life for people everywhere.

Page 5
"Fixed" Computing Mobility/BYOD Internet of Things Internet of
(You go to the (The device goes (Age of Devices) Everything
device) with you) (People, Process,
Data, Things)

50B things
Doubles every (?)
years

10B

Networks
Doubled every 1.4
years

in Our Past
200M
Doubled every 13
years

and Daily
Lives
1995 2000 2011 2020 *

Page 6
Introduction cont…

They are helping to create a


Advancements in networking world in which national borders,
technologies are perhaps the geographic distances, and
most significant change agents physical limitations become less
in the world today. relevant, and present ever-
diminishing obstacles.

Page 7
Networking impacts in our daily lives

• Networks Support the Way We Learn


• Networks Support the Way We
Communicate
• Networks Support the Way We Work
• Networks Support the Way We Play

Page 8
Networks
Support the
Way We • Support the creation of virtual classrooms
Learn •

Provide on-demand video
Enable collaborative learning spaces
• Enable mobile learning

Page 9
Networks
Support the • Instant Messaging (IM) / Texting
Way We • Social Media
Communicate • Collaboration Tools
• Weblogs (blogs)
• Peer-to-Peer (P2P) File Sharing …

Page 10
Clients and Servers

Email Server
Web Server
File Server
File Access Client
Browser Client

File Server

Web Browser
Email Client

Email Client
Web Browser
Web Server
File Access Client

Web Browser
Email Client Email Server
File Access Client

Page 11
I have a printer to I have files to
share. share.

Providing Print Sharing File Sharing

Resources The advantages of peer-to-peer networking:

in a » Easy to set up
» Less complexity

Network
’ Lower cost since network devices and dedicated servers may not be required
’ Can be used for simple tasks such as transferring files and sharing printers

Peer-to-
The disadvantages of peer-to-peer networking:
• No centralized administration
» Not as secure

Peer » Not scalable


• All devices may act as both clients and servers which can slow their performance

Page 12
Devices Devices

Devices

Devices

Internetwork

LAN LAN

There are three categories of network components:


• Devices
• Media
• Services

LANs, WANs, and Internets


Page 13
Components of a Network
Some examples of end devices are:

Computers (work stations, laptops, file servers, web servers)

Network printers

End VoIP phones

Devices TelePresence endpoint

Security cameras

Mobile handheld devices (such as smartphones, tablets, PDAs, and


wireless debit / credit card readers and barcode scanners)

Page 14
Examples of
intermediary
network Network Access
devices are:
Devices (switches, and
wireless access points)

Network Internetworking
Infrastructure Devices (routers)
Devices

Security Devices
(firewalls)

Page 15
Copper

Network Fiber Optic

Media

Wireless

Page 16
The distance the media can
successfully carry a signal

The environment in which the


media is to be installed.
The criteria for
choosing network
media are:
The amount of data and the
speed at which it must be
transmitted.
The cost of the media and
installation.

Page 17
Desktop Computer Laptop Printer
End Devices

IP Phone Wireless Tablet TelePresence Endpoint

Network Intermediary
Wireless Router LAN Switch Router

Representations Devices

Multilayer Switch Firewall Appliance

(XXXXXXXXWOOCXXXXXXX) Wireless Media

Network Media
LAN Media

WAN Media

Page 18
Components of a Network
Topology Diagrams

Physical Topology Logical Topology

Mail Server 192.168.2.1


Web Server 192.168.2.2
Ethernet Switch File Server 192.168.2.3
Internet
192.168.2.4
192.168.2.5
192.168.2.6 192.168.1.1
Admin Office Department 192.168.1.2
Server 192.168.1.3
192.168.1.4
Router Admin Group 192.168.1.5
Ethernet 192.168.1.6 192.168.1.7
192.168.2.0
Classroom Hub Classroom 1 192.168.1.8
Mail Server Printer 192.168.1.9
Switch
Web Server
Classroom 2
File Server
Classroom 3
Classroom Hub
Classroom 3
Classroom 2
Internet

Classroom 1

Page 19
Topology

Mesh Star Bus Ring

• Arrangement of nodes in a network


• How devices are laid out physically

Physical Topology
Page 20
1-
20
Networks
Mesh Topology
• Dedicated point-to-point
link to every other nodes
• A mesh network with n
nodes has n(n-1)/2 links. A
Station

node has n-1 I/O ports


(links) Station Station

• Advantages: No traffic
problems, robust, security,
easy fault identification &
Station Station
isolation
• Disadvantages: Difficult
installation/reconfiguration,
space, cost
Page 21
1-21
Networks
Star Topology
• Dedicated point-to-point link only to a central controller, called
a hub
• Hub acts as an exchange: No direct traffic between devices
• Advantages: Less expensive, robust
• Disadvantages: dependency of the whole on one single point, the
hub
Hub

Station Station Station Station

Page 22
1-22
Networks
Bus Topology
• One long cable that links all nodes
• tap, drop line, cable end
• limit on the # of devices, distance between nodes
• Advantages: Easy installation, cheap
• Disadvantages: Difficult reconfiguration, no fault isolation, a
fault or break in the bus stops all transmission

Station Station Station

Drop line Drop line Drop line


Cable end Cable end
Tap Tap Tap

Page 23
1-23
Networks
Ring Topology
• Dedicated point-to-point link only with the two nodes on each
sides
• One direction, repeater
• Advantages: Easy reconfiguration, fault isolation
• Disadvantage: Unidirectional traffic, a break in the ring cab disable
the entire network

Station Station

Repeater Repeater
Repeater Repeater Station
Station
Repeater Repeater

Station Station
Page 24
1-24
Networks
Hybrid Topology
• Example: Main star topology with each branch
connecting several stations in a bus topology
• To share the advantages from various topologies

Page 25
1-25
The two most common types of network
infrastructures are:
• Local Area Network (LAN)
• Wide Area Network (WAN).
Types of Other types of networks include:
• Metropolitan Area Network (MAN)
Networks • Wireless LAN (WLAN)
• Storage Area Network (SAN)

Page 26
Local Area Networks (LAN)

A network serving a home, building or campus is considered a Local Area Network (LAN).

Page 27
Wide Area
Networks (WAN)

LANs separated by geographic distance are connected by a network


known as a Wide Area Network (WAN).

LAN LAN
WAN

Page 28
LANs, WANs, and Internets
The Internet

LANs and WANs may be connected into internetworks.

Internet

Page 29
The Internet
Intranet and Extranet

The Internet
The World

Extranet
Suppliers, Customers, Collaborators

Intranet
Company Only

Page 30
Connecting
to the
Internet Connection Options

Connecting DSL

Remote Home User Cable

Users to the
Internet Internet Service
Provider

Dial-Up
Small Office Telephone

Page 31
Connecting to the Internet
Connecting Businesses to the Internet

Connection Options

Dedicated Leased
Lines

Internet

Internet Service
Provider

Page 32
Converged Networks
The Converging Network

Multiple Networks

I
Rule
Agreement
Standard

Devices

Rule
Agreement
Standard
Medium
Devices

Rule
Agreement
Standard
Devices

Multiple services are running on multiple networks.

Page 33
Converged Networks
Planning for the Future

Intelligent Networks Are Bringing the World Together

Intelligent networks Video conferencing around


allow handheld devices the globe is in the palm of
to receive news and your hand.
emails, and to send
text.

The Human Network is everywhere

Online gaming connects


thousands of people
Phones connect seamlessly.
globally to share voice,
text, and images.

Page 34
As networks evolve, we are discovering that there are
four basic characteristics that the underlying
architectures need to address in order to meet user
expectations:
Fault Tolerance

Reliable
Network Scalability

Supporting
Network Quality of Service (QoS)
Architecture
Security

Page 35
Examples of priority decisions for an
organization might include:

Time-sensitive communication - increase


priority for services like telephony or video
Reliable distribution.
Non time-sensitive communication - decrease
Network priority for web page retrieval or email.
Providing
High importance to organization - increase
(QoS) priority for production control or business
transaction data.
Undesirable communication - decrease
priority or block unwanted activity, like peer-
to-peer file sharing or live entertainment

Page 36
Reliable Network
Providing Network Security

Criminal
Cheat
Identity Thief

Competitor

learn

live

Fraudster

The communication and information that we would like to be private is protected from those
who would make unauthorized use of it.

Page 37
Some of the top trends include:
Network
Trends Bring Your Own Device (BYOD)
New Online collaboration
trends
Video

Cloud computing

Page 38
Network Trends

Bring Your Own Device (BYOD)

1
u

Page 39
Collaboration

*
IP Communication Mobile Applications

Online
Collaboration
Telepresence Messaging

Online Conferencing

Page 40
People are becoming more connected...
World Population
Internet Users 2.08 billion worldwide
Internet users

Network Trends Internet users

Video
Communication
Internet video accounts Internet video will
2006 2012 for 40% of all consumer become 62% of all
2001 Internet traffic. consumer Internet traffic.

...and video is becoming the


preferred channel of
communication... 2012 2016

Page 41
Cloud
Computing
There are four primary types
of clouds:
• Public clouds
• Private clouds
• Custom clouds
• Hybrid clouds

Page 42
A data center is a facility used to
house computer systems and
associated components including:
• Redundant data communications
connections
Data • High-speed virtual servers (sometimes
referred to as server farms or server
Centers clusters)
• Redundant storage systems (typically uses
SAN technology)
• Redundant or backup power supplies
• Environmental controls (e.g., air
conditioning, fire suppression)
• Security devices

Page 43
Human Communication

Message Signal Signal Message

Message Transmitter Transmission Receiver Message


Source Medium Destination

What rules
Communication?

Page 44
Establishing the Rules

An identified sender and receiver

Agreed upon method of communicating (face-


to-face, telephone, letter, photograph)
Establishing
the Rules Common language and grammar

Speed and timing of delivery

Confirmation or acknowledgement
requirements

Page 45
Message Signal Signal Message

Message Encoder Transmitter Transmission Receiver Decoder Message


Source Medium Destination
"The Channel"

Message
Encoding

Page 46
Message Formatting
and Encapsulation
Example: Personal letter contains the Sender

following elements:
4085 SE Pine Street
Ocala, Florida 34471

• An identifier of the recipient


• A salutation or greeting Recipient
1400 Main Street
• The message content Canton, Ohio 44203

• A closing phrase
• An identifier of the sender

Page 47
The size restrictions of frames require the source
host to break a long message into individual pieces
that meet both the minimum and maximum size
requirements.

This is known as segmenting.

Message Each segment is encapsulated in a separate frame


Size with the address information, and is sent over the
network.

At the receiving host, the messages are de-


encapsulated and put back together to be processed
and interpreted.

Page 48
Access Method

Message Flow Control


Timing
Response Timeout

Page 49
The Rules

Message Delivery Options

J
i

Source

Source

Unicast Multicast Broadcast Unicast Multicast Broadcast

Page 50
How the message is formatted or
structured

The process by which networking


devices share information about
pathways with other networks
Network
How and when error and system
messages are passed between devices Protocols

The setup and termination of data


transfer sessions

Page 51
Application Protocol – Hypertext
Transfer Protocol (HTTP)

Transport Protocol – Transmission


Control Protocol (TCP)
Interaction
of Internet Protocol – Internet
Protocol (IP)
Protocols
Network Access Protocols – Data
Link & Physical layers

Page 52
TCP/IP ISO AppleTalk Novell Netware

7 HTTP ACSE
DNS ROSE
6 AFP NDS
DHCP TRSE
FTP SESE
5

Protocol TCP TP0TP1TP2 ATPAEP


SPX

Suites
4 UDP TP3TP4 NBPRTMP

Protocol 3
IPV4 IPV6
ICMPV4
CONP/CMNS
CLNP/CLNS
AFP IPX

Suites and
ICMPV6

Industry 2

Standards
Ethernet PPP Frame Relay ATM WLAN
1

Page 53
Protocol Suites

TCP/IP Protocol Suite and


Communication
Name Host Email File Web
System Config Transfer

DNS BOOTP SMTP FTP HTTP


Application Layer
DHCP POP TFTP

IMAP

Transport Layer UDP TCP

IP s u p p o r t Routing Protocols
Internet Layer
ICMP RIP OS PF EIGRP BGP

Network Access Layer PPP Ethernet Interface D r i v e r s

Page 54
Network Protocols and Standards

Standards Organizations

<IEEE
I E

SundiHta

MANUFACTURERS 8 SUPPLIERS
OF GLOBAL NETWORKS

ICANN
The Internet Corpcrdtian for Assq"ed Names and Numbers

I n t e r n e t A s s i g n e d N u m b e r s Authority

Page 55
The Internet Society (ISOC)

The Internet Architecture


Board (IAB)
Standards
Organizations The Internet Engineering Task
Open Force (IETF)
Standards Institute of Electrical and
Electronics Engineers (IEEE)
The International Organization
for Standards (ISO)
Page 56
Standards Organizations

ISOC, IAB, and IETF


Internet Society (ISOC)

Internet Architecture
Board (IAB)

Internet Engineering Task Force (IETF) Internet Research Task Force (IRTF)

Internet Engineering Internet Research


Steering Group (IESG) Steering Group (IRSG)

i _______ 1
Working Working Working Research Research Research
Group #1 Group #2 Group #3 Group #1 Group #2 Group #3

■ ■ • ■ ■ •

Page 57
• 38 societies
• 130 journals
• 1,300 conferences each
year
Standards • 1,300 standards and
Organizations projects
IEEE
• 400,000 members
• 160 countries
• IEEE 802.3
• IEEE 802.11
Page 58
OSI Model
data unit layers

data application
Network Process to Application
k ________________ ____________>

Host Layers
Reference data presentation
Data Representation & Encryption

Models
i j

data session
The OSI
Intertiost Communication
k _______________ ______________>

transport
segments
Reference
End-to-End Connections
and Reliability ,

network
Model

Media Layers
packets Path Determination &
Logical Addressing (IP)

frames data link


Physical Addressing (MAC & LLC)

physical
bits Media, Signal
and Binary Transmission j
k J

Page 59
Reference Models
The TCP/IP Reference Model

Network Access Layer

Page 60
OSI Model TCP/IP Model

7. Application

6. Presentation Application

Reference 5. Session

Models L.
4. Transport Transport

Comparing 3. Network Internet

the OSI
2. Data Link
Network Access

and TCP/IP
1. Physical

Models

Page 61
Data • Segmenting message benefits
– Different conversations can be
Encapsulation interleaved
Communicating – Increased reliability of network
the Messages communications
• Segmenting message disadvantage
– Increased level of complexity

Page 62
Data Encapsulation

• Data Passing

Encapsulation • Segment Data


Email Data

Data Data
Data
down the
stack.

Protocol Data
Segment
Transport


Data

Packet
header

Network Transport
Data Packet
header header

Units (PDUs) • Frame Frame


header
Network
header
Transport
header
Data
Frame
header
:
rame (medium dependent)

• Bits
1100010101000101100101001010101001 Bits

Page 63
Protocol Encapsulation Terms

Ethernet IP TCP Data

User Data

Data TCP Segment

IP Packet

Encapsulation Ethernet Frame

Encapsulation Web
server
| Data Web
Client

Page 64
Protocol Encapsulation Terms

Ethernet IP TCP Data

User Data

Data TCP Segment

IP Packet

Encapsulation Ethernet Frame

De- Web
Server
Web
Client

encapsulation
—I oi oi trn 0101001o i m o i i 01010010

Page 65
Moving Data in the Network
Accessing Local Resources

r -

Physical | □ata Link I Network | Transport Upper Layers


1, -1

T T T
Timing and Destination and Destination and Destination and Encoded Application Data
Synchronization Source Physical Source Logical Source Process
Bits Addresses Network Addresses Number (ports}

Page 66
Network Address
• Source IP address
Network • Destination IP address
Addresses
& Data Link
addresses
Data Link Address
• Source data link
address
• Destination data link
address
Page 67
Accessing Local Resources

Communicating with Device / Same


Network
Data Link Network Layer
Ethernet Frame Header IP Packet Header

Destination Source Source Destination


Data
CC-CC-CC-CC- AA-AA-AA-AA- Network Host Network Host
CC-CC AA-AA 192.168.1. 110 192.168.1. 9

PC1
192.168.1.110
AA-AA-AA-AA-AA-AA

FTP Server
Page 68
192.168.1.9
CC-CC-CC-CC-CC-CC
Accessing Local Resources

MAC and IP Addresses

R1
192.168.1.1
11-11-11-11-11-11
ARP
Request
PC1 S1 R1
192.168.1.110
AA-AA-AA-AA-AA-AA

PC2
192.168.1.111
BB-BB-BB-BB-BB-BB

FTP Server
192.168.1.9
CC-CC-CC-CC-CC-CC

Page 69
Default Gateway

PC 1 R2
R1 172.16.1.99
192.168.1.110 192.168.1.1
AA-AA-AA-AA-AA-AA 22-22-22-22-22-22
11-11-11-11-11-11

Web Server
172.16.1.99
AB-CD-EF-12-34-56

PC 2 FTP Server
192.168.1.111 192.168.1.9
BB-BB-BB-BB-BB-BB CC-CC-CC-CC-CC-CC

Page 70
Data Link Network Layer
|— Ethernet Frame Header IP Packet Header

Destination Source Source Destination


Data
11-11-11-11- AA-AA-AA-AA- Network Device Network Device
11-11 AA-AA 192.168.1. 110 172.16.1. 99

Communicating PC1 R1 R2 Web Server

Device / Remote 192.168.1.110


AA-AA-AA-AA-AA-AA
192.168.1.1
11-11-11-11-11-11
172.16.1.99
22-22-22-22-22-22
172.16.1.99
AB-CD-EF-12-34-56

Network

Page 71
Accessing Remote Resources
Using Wireshark to View Network
Traffic

Destination Protocol
.000000 192.168. ARP f o r 1 9 2 . 1 6 8 .
.299139 192.168. 192.168. NBNS Name NBSTAT *<00><00>
.299214 192.168. .168. ICMP
.025659 192.168. IGMP Members hi p
.044366 192.168. .168 DNS standard query _ldap.
.048652 192.168.
.050784 192.168. .168. DNS 86 s t a n d a r d q u e r y . ww004
.055053 192.168. .168. 37 H T T P / 1 . 1 200 OF
.082038 192.168. .168. NBNS NB10061D<00>
.111945 192.168. .168. DNS standard L p r o x y c o n f . w004 .
.226156 192.168. .168. [SYN] Seq=
.227282 192.168. .168. [SYN, ACK]

w i r e (4 96 (496
. 1 6 8 . 0 . 2 (0 : 5d : 20 : cd : 02) , Dst : Net gear
c: 1 9 2 . 1 6 8 . (192.168.0.2), Dst: 192.168. (192.168.
o r t : n c u - 2 ( 3 1 9 6 ) , Dst P o r t : P (80), S
(3196)
ttp (80)

sequence number)
Header T
: 0x02 (SYN)
wi ndow : 64240
0000
0010
0020
0030

Packets: 120 Displayed:

Page 72

You might also like