Networking Basics: Designed by Mufix Download Link at E-Mail
Networking Basics: Designed by Mufix Download Link at E-Mail
Designed by Mufix
Download link @ www.Mufix.org
E-mail
[email protected]
Agenda
Overview
What is a Network?
OSI Model
Physical Components
DataLink Protocols
Network Protocols
• Or this?
- Unshielded twisted pair (UTP) is more common and less expensive than
STP
Designed by Mufix Organizer
[email protected]
Unshielded Twisted-Pair (UTP)
Typically wrapped inside a plastic cover (for
mechanical protection)
A sample UTP cable with 5 unshielded twisted pairs
of wires
Insulator Metal
Designed by Mufix Organizer
[email protected]
Shielded Twisted-Pair (STP)
STP cables are similar to UTP cables, except there is
a metal foil or braided-metal-mesh cover that
encases each pair of insulated wires
• The cladding reflects the light back into the tube allowing the signal
to travel for very long distances
Multi-mode
Fiber-o
p tic cabl
e
Peer-to-Peer Model
• Each computer can share resources and get resources from
another computer in the network
• Access is determined by user’s security permissions on each
machine
Client
Client
Client
• A network interface card (NIC), for example, only works at the Physical and
Data Link Layers
Application Application
End Presentation Presentation
to Session Session
end
Transport Transport
Network Network Network Network
Hop
by Link Link Link Link Link Link
hop Physical Physical Physical
bits
bits
- HTTP – Hyper Text Transfer Protocol (www) is the protocol used on the world
wide web and determines what types of information can be transferred.
- FTP – File Transfer Protocol is the protocol used to transfer files between
computers
- SMTP – Simple Mail Transfer Protocol is used to send email.
- POP3 – Post Office Protocol 3 is used to receive mail.
- NNTP – Network News Transfer Protocol provides distribution, inquiry, retrieval
and posting of news articles, bulleting boards and chats.
- Gopher – Gopher is a search engine (distributing documents over networks )
- Telnet – Telnet allows a user to logon and control a remote computer.
• These are virtual ports used to keep network applications separated in the
operating system
• The packet from the network layer is modified to include the frame
source and destination address
• This address is the media access control (MAC) address on the NIC
LAN
• Based on the ring physical topology and puts a token message on the
ring
• The computer that wants to send a message must first control the token
• The computer listens for traffic on the radio waves, if there is none
the package is transmitted
Bus Topology
Coaxial
cable
Star Topology
BNC T-Connector
Designed by Mufix Organizer
Network Card [email protected]
Physical Components (Layer 1)
4- Mesh
• Commonly used in
WAN configurations
• Routers are
connected to multiple
links for redundancy
IPX/SPX
Switch A device that receives packets from its input link, and then
sorts them and transmits them over the proper link that connects to the node
addressed.
Gateway A link between two different networks that have different rules
of communication.
[email protected]
CCNA Certified
Thank You.