0% found this document useful (0 votes)
12 views11 pages

ECDCOM30 Reviewer

This document provides an introduction to computer networking, covering definitions, types of networks, communication protocols, and network topologies. It explains various networking concepts such as LAN, WAN, and the OSI model, along with hardware components like switches, routers, and firewalls. Additionally, it discusses the importance of networking for efficient communication and data sharing.

Uploaded by

migueltan248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views11 pages

ECDCOM30 Reviewer

This document provides an introduction to computer networking, covering definitions, types of networks, communication protocols, and network topologies. It explains various networking concepts such as LAN, WAN, and the OSI model, along with hardware components like switches, routers, and firewalls. Additionally, it discusses the importance of networking for efficient communication and data sharing.

Uploaded by

migueltan248
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

LESSON 1: NETWORK o All devices are directly connected via

cables and/or short-range wireless


What is Network?
technology
- A network is nothing more than “two o Doesn’t require a leased
connected computers sharing resources with telecommunications line from an
one another.” Internet Service Provider (ISP)
- It is composed of two main aspects: - Example
o Physical Connection o Home Network
▪ Wires, cables, wireless media o Small Business or Office Network
o Logical Connection
Campus Area Network (CAN)
▪ Data transporting across the
physical media - A computer network of multiple
interconnected LANs in a limited geographical
Some Basic Networking Rules
area, such as a corporate business park,
- The computers in a network must use the government agency, or university campus.
same procedures for sending and receiving - Typically owned or used by a single entity.
data. We call these communication protocols.
Metropolitan Area Network (MAN)
- Data must be delivered uncorrupted. If it is
corrupted, it’s useless (No exceptions) - A computer network that interconnects users
- Computers in a network must be capable of with computer resources in a city
determining the origin and destination of a - Larger than a campus area network, but
piece of information. (i.e., its IP and Mac smaller than a wide area network
Address)
Wireless Local Area Network (WLAN)
Types of Computer Networks (by Size)
- A LAN that’s dependent on wireless
- Personal Area Network (PAN) connectivity or one that extends a traditional
- Local Area Network (LAN) wired LAN to a wireless LAN.
- Wireless Local Area Network (WLAN) - Most home networks are WLANs.
- Campus Area Network (CAN)
Wide Area Network (WAN)
- Metropolitan Area Network (MAN)
- Wide Area Network (WAN) - A computer network that extends over a large
geographical distance, typically multiple cities
Personal Area Network (PAN)
and countries
- Ultra small networks used for personal use to - WANs connect geographically distant LANs
share data from one device to another - Typically use leased telecommunications lines
- Can be wired (PAN) or wireless (WPAN) from ISPs
o USB - Example
o Bluetooth o The Internet Corporate Offices in
o NFC ANT+ different states
- Example
Network Architecture (Peer-to-Peer vs. Client-Server)
o Smartphone to Laptop
o Smartwatch to Smartphone Peer-to-Peer
o Smartphone Hands-Free Car Calling
o Heart Rate Monitor to Smartphone - All computers on the network are peers
o No dedicated servers
Local Area Network (LAN) o There’s no centralized control over
shared resources
- A computer network within a small
- Any device can share its resources as it
geographical area such as, a single room,
pleases
building or group of buildings
- All computers can act as either a client or a
- Considered to be self-contained:
server
- Easy to setup, and common in homes and
small businesses
Client-Server The OSI Model

- The network is composed of client and servers - The Open Systems Interconnection (OSI)
o Servers provide resources o A conceptual framework showing us
o Client receives resources how data moves throughout a
- Servers provide centralized control over network. Developed by the
network resources (files, printers, etc.) International Organization for
- Centralizes user accounts, security, and access Standardization (ISO) in 1977.
controls to simplify network administration - Its purpose is to give us a guide to
- More difficult to setup and requires an IT understanding how networks operate.
administrator - It’s only a reference model, so don’t get
wrapped up in the details.
Why Build a Computer Network?
o Wasn’t implemented in the real
- Before computer networks, people sent and world, TCP/IP is.
received information by hand, using the postal
The OSI Model Stack
service. This is slow and can be unreliable.
- Computer networks enable faster, more - The OSI Model breaks down the complex task
efficient modes of communication. (i.e., email, of computer-to-computer network
video conferencing, etc.) communications into seven layers.
- Computer networks and the sharing of - Upper Layers (Host Layers)
electronic data encourage the use of standard o Handled by the host computer and
policies and procedures. performs application-specific
- Computer networks provide backup and functions, such as data formatting,
recovery support for our data. (i.e., encryption, and connection
redundancy) management.
- Computer networks lead to cost savings - Lower Layers (Media Layers)
o Provide network-specific functions,
Introduction to Computer Networking Protocols
such as routing, addressing, and flow
- Computers communicate with each other control.
with network protocols.
The OSI Model Visualized
- Protocols are rules governing how machines
exchange data and enable effective
communication.
- Some Everyday Examples
o When you call somebody, you pick up
the phone, ensure there is a dial tone,
and if there is, you dial the number.
o When you drive your car, you obey
the rules of the road.

Protocols Continued

- Physical Protocols describe the medium


(wiring), the connections (RJ-45 port), and the
signal (voltage level on a wire).
- Logical Protocols software controlling how
and when data is sent and received to
computers, supporting physical protocols.
- Computer networks depend on many different
types of protocols in order to work properly.
- Example of Common TCP/IP Suite of Protocols
o Web Communication: HTTP
o E-mail: POP3, SMTP, IMAP
o File Transfers: FTP
OSI Communication TCP/IP & OSI Models Side-by-Side

The TCP/IP Model Mac Addresses


- The TCP/IP suite is the most commonly used - Media Access Control (MAC)
protocol suite in the networking world. o Physical address of the network
- It’s essentially the protocol suite in which the adapter card
Internet was built. o OSI Layer 2 (Data Link) Layer Address
- It’s the standard for computer networking. o TCP/IP Layer 1 (Network Interface)
- It is based on a 4-layer model that is similar to Layer Address
the OSI model. - Six bytes (48 bits), usually represented
- History of TCP/IP hexadecimal
o Developed by the United States, o First three bytes (24 bits) are assigned
Department of Defense (DoD) in the by the IEEE to the manufacturer
early 1970s. ▪ Organizationally Unique
o In 1982, the DoD declared TCP/IP as Identifier (OUI) assigned by
the standard for all military computer IEEE (ex: Dell or HP)
networking o Last three bytes (24 bits) are usually
o In 1984, broad adoption of TCP/IP assigned sequentially
began. (IBM, AT&T, etc.). ▪ Unique Numbers
▪ 00:21:70:6F:06: F2
▪ 00-21-70-6F-06-F2
▪ 224 = ~16.7 million Unique
Addresses

IP Addresses

- It is a logical address used in order to


uniquely identify a device on an IP network.
o It’s a Network Layer address
associated with routing.
▪ OSI Layer 3: Network Layer
▪ TCP/IP Layer 2: Internet Layer
o There are two versions:
▪ IP version 4 (IPv4)
• 192.168.0.1
▪ IP version 6 (IPv6)
• 2001:DB8:85A3:0:0:8
A2E:370:7334
Comparing IP and MAC Addresses Broadcast (One-to-All)

IP Addresses MAC Addresses


Network (OSI Layer 3) Data Link (OSI Layer 2)
Addresses Addresses
Logical Addresses Physical Addresses
Assigned in Operating Physically burned on NIC
System
Allows network-to- Allows internet work
network communication communication via
via routers hubs, switches, and
routers

WAN communication Local LAN Introduction to Ethernet


communication
- The most popular networking technology in
the world.
Half vs. Full Duplex Communication
- Refers to a family of standards that define the
- Network communication will occur in either physical and logical aspects of the world’s
full or half duplex mode: most popular type of LAN.
o Half Duplex: Can send and receive - The standard communications protocol for
data, but not at the same time. building a local area network (LAN).
o Full Duplex: Can send and receive o Physical
data simultaneously. ▪ Cabling, Connectors,
Equipment, etc.
Network Transmission Types
o Logical
- Unicast ▪ Networking Access Method.
- Multicast (i.e., Carrier Sense Multiple
- Broadcast Access [CSMA])

Unicast (One-to-One)

Multicast (One-to-Many)
LESSON 2: ETHERNET

Physical vs. Logical Topologies

- Physical topologies describe the placement of


network devices and how they are physically
connected.
- Logical topologies describe how data flows Star Topology
throughout a network.
- All devices are connected to a central
Wired Network Topologies connecting device, which is usually a switch.
- Devices send data to the switch which
- Four Specific Topologies:
forwards it to the appropriate destination
o Bus
device.
o Ring
- Popular topology in today’s networks.
o Star
- Used in most large and small networks.
o Mesh
- Central device is a single point of failure.
Bus Topology

- All devices are connected to a single coaxial


network cable.
- Devices are connected via a vampire tap or T-
connector.
- Terminators are required at both ends of the
cable to prevent signal bounce. Mesh Topology
- Antiquated technology - Each device is connected to every other
- Only one end device can be active on the device by separate cabling.
network at a time. - Highly redundant and fault-tolerance.
- Data signals travel in both directions and are - Expensive to install.
received by all devices on the network. - Commonly used in Enterprise Networks &
- A single break in the cable can take down the WANs.
entire network. - Two Types:
o Partial Mesh
o Full Mesh

Ring Topology

- All devices are connected in a circular fashion.


- Each computer is connected to two other Wireless Network Topologies
computers.
- Wireless networks utilize radio frequencies
- Data travels from node-to-node with each
(RF) to communicate.
computer handling data, either unidirectional
- Three Specific Topologies:
or bidirectional.
o Ad hoc
- Each device (node) in the ring regenerates the
o Infrastructure
signal, acting as a repeater.
o Mesh
- Failure of a single node can take down the
entire network.
- Fiber Distributed Data Interface (FDDI) uses
two counter-rotating ring topologies for
redundancy.
Ad hoc Hubs

- Peer-to-peer (P2P) wireless network where no - Used to connect devices together within a
wireless access point (WAP) infrastructure network.
exits. - Used in early networks; replaced by Switches
- The devices communicate directly with one - “Multi-Port Repeater”
another. o Traffic goes in one port and is
- Personal area networks (PANs) are a common repeated (broadcasted) out every
- Example of Ad hoc other port
o Wireless networks o OSI Layer 1 Device
o Dumb Network Device
Infrastructure
o Causes increased network collision
- Wireless network that uses a wireless access errors
point (WAP) as its central connecting device. - Much less efficient than a Switch.
- Infrastructure wireless networks (WLANs) are - Legacy Equipment no longer used.
commonly used in homes and small offices.

Switches
Mesh
- Connects devices together just like a Hub
- Just like a wired mesh design, wireless mesh - Intelligent Network Device (OSI Layer 2)
networks utilize several wireless access points memorizes the MAC Address of each device
(nodes) to create a robust wireless network connected to it via a MAC Address Table,
that is: sometimes called a Content Addressable
o Scalable Self – Healing Memory (CAM) Table.
o Reliable (Redundancy) - Pays attention to Source and Destination MAC
- Common in larger homes and businesses Addresses during communication process.
- Use Application-Specific Integrated Circuitry
(ASIC), which makes them extremely fast.
- Breaks up collision domains.
- Traffic goes in one port and is repeated out to
only destination port.
- Designed for high bandwidth.
- Standard in today’s Network Infrastructure.

Network Interface Card (NIC)

- The network adapter installed on your


network device.
- Provides the physical and electrical, light or
radio frequency connections to the network
media.
- It can either be an expansion card, USB
devices or built directly into the motherboard.
Wireless Access Point (WAP)

- It is a bridge that extends the wired network


to the wireless network
- Just like a switch, it’s a Data Link Layer 2
Small Office Home Office (SOHO) Device
device.
- Note: A WAP is not a router - All-in-One Wireless Router with Expanded
Capabilities:
o Router, Wireless Access Point,
Firewall, Switch, DHCP Server, NAT
Device, File Server, etc.

Wireless Range Extender


Media Converters
- Extends the range of a wireless network by
acting as a wireless repeater. - Like its name implies, it converts one media
- Rebroadcasts radio frequencies from the type to another
wireless network it is associated with. - Layer 1 Device: Performs physical layer signal
conversion.
- Ethernet to fiber optic media converters are
commonly used.

Routers

- Used to connect different networks together Firewalls


- Routes traffic between networks using IP - Firewalls are the foundation of a defense-in-
Addresses depth network security strategy.
- Uses Intelligent Decisions (Routing Protocols) - They protect your network from malicious
to find the best way to get a packet of activity on the internet.
information from one network to another. - Prevent unwanted network traffic on different
- Break up broadcast domains networks from accessing your network.
- OSI Layer 3 Devices - Firewalls do this by filtering data packets that
o Layer 3 = Router go through them. They can be standalone
o Layer 2 = Switch network device or software on a computer
o Layer 1 = Hub system, meaning network-based (hardware)
or host-based (software).

Modems (Modulator/Demodulators)

- Modems modulate one signal to another, such


as analog to digital.
- For example, modulating a telephone analog
signal into a digital signal that a router can
understand.
Types of Firewalls

- Packet Filtering Firewalls


o 1st Generation & Most Basic
o Basic Filtering Rules
- Circuit-Level Firewalls
o 2nd Generation
o Monitors Valid/Invalid TCP sessions
- Application Layer 7 (NGFW) Firewalls
- 3rd Generation
- Much more advanced.

DHCP Server

- Dynamic Host Configuration Protocol (DHCP)


Server.
- Automatically assigns IP Addresses to hosts.
- Makes administering a network much easier.
- An alternative is Static IP addressing

Voice over IP (VoIP) Endpoints

- Most phone systems run over IP networks via


dedicated protocols, such as the Session
Initiation Protocol (SIP), both in-home and
office environments.
- VoIP endpoint devices are hardware devices
(phones) or software, such as Cisco Jabber,
that allows you to make phone calls.
LESSON 3: NETWORK CABLING o RG-8: Used in early 10Base5 “Thick-
net” Ethernet networks.
Types of Network Cabling
o RG-58: Used in early 10Base2 “Thin-
- Coaxial net” Ethernet networks.
- Twisted Pair o RG-59: Used for closed-circuit TV
- Fiber Optic (CCTV) networks.
- Metallic shield helps protect against
Ethernet Standards electromagnetic interference (EMI).
- Ethernet is a network protocol that controls
how data is transmitted over a LAN.
- It’s referred to as the Institute of Electrical and
Electronics Engineers (IEEE) 802.3 Standard.
- It supports networks built with coaxial,
Coaxial Cable Connectors
twisted-pair, and fiber-optic cabling.
- The original Ethernet standard supported - F-Connector
10mbps speeds, but the latest supports much o Screw-on connection
faster gigabit speeds. o RG-6 Cable TV and Broadband Cable
- Ethernet uses CSMA/CD & CSMA/CA access Applications
methodology. - BNC Connector
o Tension spring twist-on connection
Ethernet N < Signaling > -X Naming
RG-8 “Thick-net” and RG-58 “Thin-
- Ethernet uses an “xx Base T” naming net” network applications.
convention: 10Base-T
Twisted Pair Copper Network Cabling
o N: Signaling Rate, i.e., Speed of the
cable. - 4 twisted pairs of wires with RJ-45 Connector
o <Signaling>: Signaling Type: Baseband - Balanced pair operation
(Base) communication. o +& -Signal Equal &
o X: Type of cable (twisted pair of fiber). o Opposite Signal
- Why are they twisted?
Twisted Pair Standards
o To help reduced interference
Cat Network Ethernet Speed Max. ▪ Crosstalk
Type Standard Distance ▪ Noise (Electromagnetic
Cat 3 Ethernet 10Base-T 10Mbps 100 Interference)
Fast meters
o Security concerns
Cat 5 Ethernet 100Base-TX 100Mbps 100
Gigabit meters ▪ Signal Emanations
Cat 5e Ethernet 1000Base-T 1Gbps 100 o 100 meters maximum distance
Gigabit meters ▪ Signal Attenuation
Cat 6 10 Gigabit 1000Base-T / 10Gbps 100
Ethernet 10GBase-T meters / Shielded vs. Unshielded & EMI
50 meters
Cat 6a 10 Gigabit 10GBase-T 10Gbps 100 - Unshielded Twisted Pair (UTP)
Ethernet meters
Cat 7 10 Gigabit 10GBase-T 10Gbps 100 o More susceptible to electromagnetic
Ethernet meters interference (EMI).
Cat: Copper Cabling Standard - Shielded Twisted Pair (STP)
o Less susceptible to EMI & Crosstalk (if
Coaxial Cable
each pair shielded).
- Antiquated technology used in the 1980s. - Electromagnetic Interference
Coaxial cables are rarely used today, except o The disruption of an electronic
for cable modem connections. device’s operation when it’s in the
- Categorized as Radio Grade (RG) vicinity of an electromagnetic field
o RG-6: Used for modern cable TV and caused by another electronic device
broadband cable modems. (manufacturing equipment,
microwave ovens, etc.).
Roles of Twists (Cat 6 vs. Cat 5e) Straight-Through & Crossover Cables

- Increased twist per inch: - Straight-Through Cable


o Reduces crosstalk o Connecting “Unlike” Devices
o Increases signals ▪ Computer to Switch
o Supports faster speeds ▪ Switch to Router

Other Copper Cable Connectors

RJ-11

- 4 – pin connection used for telephone


connections.

DB-9

- 9 – pin connection used for serial connections - Crossover Cable


on networking devices. o Connecting “Like” Devices
▪ Router to Router
DB-25
▪ Computer to Computer
- 25 – pin connection previously commonly
used for serial printer connections.

TIA/EIA 568A & 568B Wiring Standards

- Industry-standard that specifies the pin


arrangement for RJ-45 connectors.
- Two standards:
o 568A
Which Twisted Pairs Are Used?
o 568B
- 568B is newer and the recommended - Ethernet & Fast Ethernet
standard. o Cat 3 and Cat 5
- Either can be used o Only green and orange pairs used
- Why are standards important? o Pins 1, 2, 3, and 6
o Lower cost increase ▪ One Pair to Transmit Data (TX)
o Interoperability ▪ One Pair to Receive Data (RX)
o Easier maintenance - Gigabit & 10 Gigabit Ethernet
o Cat 5e & Faster All Four Pairs Used:
▪ Supports bi-directional data
transmission on each pair or
wires.
- Straight Tip (ST)
Fiber Optic Cabling o BNC style connector with a half-twist
bayonet locking mechanism.
- Glass or plastic fiber that carries light
o Was used in MMF networks but not
(photons)
commonly used anymore.
o High Bandwidth: Photons travel faster
- Subsccriber Connector (SC)
than electrons
o Square connector that uses a push-
o Long Distances: Less attenuation.
pull connector similar to A/V
Immune to Electromagnetic
equipment.
Interference (EMI)
o Commonly used in MMF & SNF
o Doesn’t emanate signals
- Mech. Transfer Register Jack (MTRJ)
- Two types
o Similar to the RJ-45 connector, and
o Multi-mode Fiber (MMF)
houses two fiber optics cables.
▪ Shorter distances (LAN /
o Designed for MMF networks.
Building-to-Building)
▪ Up to 2 Kilometers Why use Fiber?
o Single-mode Fiber (SMF)
- Fiber cable is more expensive than twisted
▪ More expensive than multi-
pair, as is the equipment but you can perform
mode
much longer network cable runs with fiber.
▪ Longer distances (WAN /
o 100m versus up to 200 Kilometers
Across Town)
- So you have decreased network equipment
▪ Up to 200 Kilometers
costs
- Information Note: 9-micron Single-Mode
o Switches, routers, etc.
Fiber can travel 75 miles at 400 Gbps
- Plus fiber is:
MMF vs SMF o Immune to EMI and signal emanations
o Has lower signal attenuation
- Multi-mode Fiber (MMF)
o Making it more reliable and secure
o Many photons of light travel through
- Costs are steadily decreasing as more people
the cable at once, and bounce off the
adopt fiber.
walls, which reduces the distance and
speed. Networking Cable Selection Criteria
o Larger Core: 50 to 62.5 microns
- Cost Constrains
o What is your budget?
- Transmission Speed Requirements
o How fast does your network need to
- Single-Mode Fiber (SMF) be?
o A single direct photon of light travels o 10Mbps, 100Mbps, 1Gbps, 10Gbps?
through the cable, which allows - Distance Requirements
greater distances and speed. o Electrical signals degrade relatively
o Smaller Core: 8 to 10 microns quickly (100 meters)
o Fiber can transmit over long distances
- Noise & Interference Immunity (Crosstalk,
EMI, Security)
o Interference is all around us:
Fiber Optic Cable Connectors ▪ Power cables, microwaves,
- Lucent Connector (LC) mobile phones, motors, etc.
o Small form-factor design that has a
flange on the top, similar to an RJ-45
connector.
o Commonly used in MMF & SMF
gigabit and 10-gigabit ethernet
networks.

You might also like