Networking 1
Networking 1
Networking 1
Networking Basics
Network Components
Network Models
Network Types
LANs, MANs, WANs
Theoretical Network
Network Protocols
Understanding Packets
Network Protocols
IP Addressing
Networking Connections
Network Interface Cards
Common Connector Types
Table of Contents
Network Media
Real-world Networks
Network Topology
NETWORKING
Example of communication
Emile Baudot
Famous Computer Codes in Early 60s
Introduction
CCITT (Consultative Committee on
International Telegraphy and Telephony)
International - A 5-bit code used for telex
transmission
ExtendedBinary-Coded-Decimal Interchange
Code(EBCDIC)- An 8-bit code mainly for mainframe
computers
American Standard Code for Information
Interchange (ASCII)- A 7-bit code for personal and
mobile computers
Extended ASCII- An 8-bit code also used for
personal and mobile computers
Data Communications And Computers Introduction
In the 1950s,
communications between data processing
equipment started to pick up.
mainframe environment.
Time-sharing
Process all by mainframe
Data Communications And Computers Introduction
W/ Fast host processor speed, it would appear to the
terminal that the host is communicating to it
exclusively.
Limitations:
The system is confined to a single area,
usually in just one room in a building.
Mainframes were too large and too
expensive for everyone to own.
Terminals can only access the host
computer to which it is physically connected.
Data was only being processed in batches;
updated information was not readily
available.
Data Communications And Computers Introduction
own.
Sneakernet
which involves storing the files in a floppy disk and physically
moving the floppy disk to the PC where the files are to be
transferred.
This system was good while the files remained small; with
today’s file size and the unreliability of floppy disks, sneakernet
is very inconvenient and impractical.
Mainframe System
Introduction
Mainframe Computer
Mainframe System
Introduction
Dump Terminal
Server
Dump Terminal
Dump Terminal
Dump Terminal
Dump Terminal
Mainframe Environment
Introduction
Marriage of computer science and communication
INFORMATION
Transmitter Receiver
Input Output
Introduction
1. Transmission system utilization
It is the need to efficiently use various transmission
Communications Tasks
2. Interfacing
It refers to the need to convert the input data (digital) into a
suitable form (analog) for transmission; and vice-
versaduring reception.
3. Synchronization
It allows the receiver to determine when a signal begins,
and when it ends, and how long each signal element is.
4.Exchange management
It is the agreement between devices on various conventions,
such as transmission method (simplex, half or full duplex),
data block length, data format, error detection and
correction, and how fast data must be sent.
Introduction
5. Signal Generation
Communications Tasks
7.Recovery
It allows the system to resume an activity previously
interrupted by an unexpected fault in the system.
Introduction
8. Protection
Communications Tasks
9. System management
It is required for configuring and monitoring the system,
allowing it to react rationally to failures and overloads, and
to effectively plan for future expansion.
Chapter 2
NETWORKING BASICS
Networking Basics What is Networking?
Files
Database
1. Improved Productivity
3. Improved Communication
Disadvantages
network.
Router/Switch/Hub
Network Models
1. Centralized Computing
Networking Basics
2. Distributed Computing
3. Collaborative Computing
Network Models
1. Centralized Computing
Networking Basics
Server
Dump Terminal
Dump Terminal
1. Easy back up
Dump Terminal
Dump Terminal
Mainframe
Environment
secured from viruses
3. Lower acquisition cost
Network Models
1. Centralized Computing
Networking Basics
Disadvantages
2.Distributed Computing
Networking Basics
2.Distributed Computing
Advantages
1. Provides faster data access and
processing
2. Doesn’t need powerful servers
3. Users may run different applications
at the same time
4. Client computers can operate in
stand alone manner
Networking Basics Network Models
2. Distributed Computing
Disadvantages
3 . C o l l ab o r a t ive C o m p u t i n g
Networking Basics
2. Server-based Networking
3. Hybrid Networking
Network Types
1 . Pe e r t o Pe e r
Networking Basics
Advantages
1. Easy installation and configuration
2. Inexpensive to purchase and operate
3. Users have full control over their own resources
4. No additional requirements for operating
systems
5. No expensive administrators needed to
run the network
6. Works well for up to 10 computers
Network Types
1.Peer to Peer
Networking Basics
Disadvantages
1. Resources are hard to maintain
2. Weak security; only one password for each
resource
3. Scattered data, each machine must be back up
individually
4. Degradation in the performance of a
machine sharing a resource
5. Requires well-trained users
6. Does not work well with more than 10
computers
Identify the following:
1.It is the combination of techniques, physical
connections, and computer programs used to
Review Questions
2. Server-based
Networking Basics
2. Server-based
Networking Basics
Advantages
Much more secure with user-level security and Access
Control Lists
Centralized user account and security leading to simplified
administration
Eliminates the need for powerful and expensive
client computers
Easy data backup and file
synchronization
Easily scalable beyond 10
computers
Network Types
2. Server-based
Networking Basics
Disadvantages
Powerful servers are expensive
Application Servers
Specialized Servers
TYPES OF SPECIALIZED SERVERS
Networking Basics
Mail Servers
Communication Severs
Domain Controllers
Fax Servers
Web Servers
Networking Basics Network Types
3. Hybrid
File Services
Networking Basics
File Transfer
Print Services
Message Services
Directory Services
Application Services
front-end and back end application
(client-server)
CLIENT/SERVER CONCEPT
Networking Basics
Network Classification according to geographical size.
Networking Basics
LAN
MAN
WAN
Distance
Area
between
Network
computers
10m
100m Local Area
Network
1km
Metropolitan Area
10km Network
100km
Wide Area
Network
1000km
10000km
N ETWORK
THE ROLE OF A REFERENCE MODEL
1. Modularity
2. Connectivity
3. Reliability
4. Ease of implementation
5. Ease of use
6. Ease of modification
RULES THAT GOVERN COMMUNICATIONS
Communication in networks is governed by pre-defined
rules called protocols.
A group of inter-related protocols that are necessary to
perform a communication function is called a protocol suite.
These protocols are implemented in software and hardware
66
that is loaded on each host and network device
Networking protocols suites describe processes such as:
- The format or structure of the message
- The process by which networking devices share
information about pathways with other networks
- How and when error and system messages are passed
between devices
- The setup and termination of data transfer sessions
Individual protocols in a protocol suite may be vendor-
specific and proprietary.
THE INTERACTION OF PROTOCOLS
Will learn
more in
TCP/IP
model
68
Institute of Electrical and Electronics Engineers
(IEEE) or the Internet Engineering Task Force (IETF)
The use of standards in developing and implementing
protocols ensures that products from different
manufacturers can work together for efficient
communications
USING LAYER MODELS
To visualize the interaction between various
protocols, it is common to use a layered model.
Benefits of doing so:
- Assists in protocol design, because protocols that
69
operate at a specific layer have defined
information that they act upon and a defined
interface to the layers above and below.
- Fosters competition because products from
different vendors can work together.
- Prevents technology or capability changes in one
layer from affecting other layers above and below.
- Provides a common language to describe
networking functions and capabilities.
PROTOCOL & REFERENCE MODEL
2 types of networking models
A protocol model provides a model that closely
matches the structure of a particular protocol suite.
The hierarchical set of related protocols in a suite
typically represents all the functionality required to
70
interface the human network with the data network.
Ex: TCP/IP model
A reference model provides a common reference for
maintaining consistency within all types of network
protocols and services. A reference model is not
intended to be an implementation specification or to
provide a sufficient level of detail to define precisely
the services of the network architecture. The primary
purpose of a reference model is to aid in clearer
understanding of the functions and process involved
Ex: OSI model
THE OSI MODEL
Model of Open Systems Interconnection (OSI)
model is the most common network model used in
computer networking.
•Presentation Layer 6
- When data are transmitted between
different types of computer systems,
the presentation layer negotiates and
manages the way data are represented
and encoded.
•Session Layer 5
-Provides coordination of the
communications in an orderly manner.
-It determines one-way or two-way
communications and manages the
dialog between both parties.
OSI MODEL
•Transport Layer 4
This layer is responsible for overall end to
end validity and integrity of the transmission.
•Network Layer 3
The network layer establishes the route
between the sender and receiver across
switching points, which are typically routers.
•Physical Layer 1
The physical layer is responsible for passing
bits onto and receiving them from the
connecting medium.
OSI MODEL
Seventh Layer - APPLICATION LAYER
-The topmost layer, provides a consistent, neutral interface to the network;
-Protocol and services required to transmit files, exchange messages, connect terminals,
and so on are found here;
-Provides a consistent way for an application to access network services that supports
applications directly, such as network file transfer, print services, message handling, and
database queries;
-A message to be sent across the network enters the OSI reference model at this point
and exits the OSI reference model's application layer on the receiving computer;
-Application-specific protocol found in this layer; such as ph following
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Line Print Daemon (LPD)
Simple Mail Transfer Protocol (SMTP)
Telnet
Trivial File Transfer Protocol (TFTP)
Electronic Data Interchange (EDI)
Post Office Protocol version 3 (POP3)
Internet Message Access Protocol (IMAP)
Simple Network Management Protocol (SNMP)
Network News Transport Protocol (NNTP)
Secure Remote Procedure Call (S-RPC)
Secure Electronic Transaction (SET)
OSI MODEL
Sixth Layer-Presentation Layer
-To make sure that data sent by the Application layer and received by the Session layer
is in a standard format;
-Video format, images, sound, e-mail, document, web pages and so on;
-Message headers and control messages are use for error detection, sequencing
and flow control;
-Connection-oriented;
-Routers are among the network device that function in this layer;
-Responsible for formatting the packets from the network layer into the proper format
for transmission;
-Once the frame is formatted, it is send to physical layer for transmission;
-The electrical representation of the data (bit patterns, encoding methods, and tokens)
is known to this layer only;
-Protocols found under at this layer:
Serial Line Internet Protocol (SLIP)
Point-to-Point Protocol (PPP)
Address Resolution Protocol (ARS)
Reverse Address Resolution Protocol (RARP)
-"hardware layer“
-Physical structure of the network, the electrical and physical aspects of that medium
used, and encoding and timing of bit transmission and reception;
-Located in this layer are electrical specification, protocols, and interface standard
such as following:
EIA/TIA-232 and EIA/TIA-449
X.21
High-Speed Serial Interface (HSSI)
Synchronous Optical Network (SONET)
V.24 and V.25
OSI MODEL
Transmission Media
Presentation Presentation
Session Session
Transport Transport
Network Network
Physical
Physical
Transmission Media
A-P-S-T-N-D-P
P-D-N-T-S-P-A
TCP/IP MODEL
89
COMPARISON
--Both have application
layers, though they include
very different services
--Both have comparable
transport and network
90
(Internet) layers
--TCP/IP combines the
presentation and session
layer issues into its
application layer
--TCP/IP combines the OSI
data link and physical
layers into one layer
--TCP/IP appears simpler
because it has fewer layers
DATA ENCAPSULATION
Build the data
Package the data
for end to end
support
(Segments)
The data is put
into a packet or
datagram that
contains a
network header
with source and
destination
logical addresses 91
DATA ENCAPSULATION
Each network
device must put the
packet into a
frame.
The frame must be
converted into a
pattern of 1s and 0s
(bits)
***Data
Segments
Packet Frames
Bits 92
ADDRESSING IN THE NETWORK
There are various types of addresses that must be
included to successfully deliver the data from a
source application running on one host to the
correct destination application running on another
93
GETTING DATA TO THE END DEVICE
The host physical address, is contained in the header of
the Layer 2 PDU, called a frame.
Layer 2 is concerned with the delivery of messages on a
single local network.
The Layer 2 address is unique on the local network and
94
represents the address of the end device on the physical
media.
In a LAN using Ethernet, this address is called the
Media Access Control (MAC) address.
When two end devices communicate on the local
Ethernet network, the frames that are exchanged
between them contain the destination and source
MAC addresses.
Once a frame is successfully received by the destination
host, the Layer 2 address information is removed as the
data is decapsulated and moved up the protocol stack to
Layer 3.
GETTING THE DATA THROUGH THE INTERNETWORK
Layer 3 protocols are primarily designed to move data
from one local network to another local network
within an internetwork.
Layer 3 addresses must include identifiers that
enable intermediary network devices to locate hosts on
different networks
95
At the boundary of each local network, an
intermediary network device, usually a router,
decapsulates the frame to read the destination host
address contained in the header of the packet, the
Layer 3 PDU
Routers use the network identifier portion of this
address to determine which path to use to reach
the destination host.
N ETWORK
Chapter 4
P ROTOCOLS
UNDERSTANDING PACKETS
Payload-data
Footer- trailer-crc
The header section basically includes the source address and destination
address.
The data is the actual information that is being transmitted over the network
from one application to another.
The trailer section contains CRC (cyclic redundancy check) which is a special
algorithm designed to generate a check field used to guard against errors
during transmission.
FUNCTIONS OF PROTOCOLS
2. NetBIOS
3. NetBEUI
1. Apple Talk
3. Ethernet protocol
B e f o r e t wo c o m p u t e r s o n a n e t wo r k c a n
communicate, they need to know how to contact
e a c h o t h e r.
BINARY NOTATION
11000000 10101000 00000010 00000101
DOTTED-DECIMAL NOTATION
192.168.2.5
IP ADDRESSING CLASSES
IP Address consists of 32 Bit=4 bytes long
8 bit= representation of 1 byte
The Class A IP Addresses were designed for large networks, Class B for
medium size networks and Class C for smaller networks
Network ID.
In the above table, you can see the 5 Classes. Our first Class
is A and our last is E. The first 3 classes ( A, B and C) are used to
identify workstations, routers, switches and other devices whereas
the last 2 Classes ( D and E) are reserved for special use.
IP ADDRESSING CLASSES
Class Address Range Supports
192.168.1.8 192.168.1.7
192.168.1.6
192.168.1.4
192.168.1.1
192.168.1.5
192.168.1.2
192.168.1.3
ASSIGNING IP ADDRESSES
IP ADDRESSING CLASSES
VS.
SUBNET MASK
Class Subnet Mask
A 255 . 0 . 0 . 0
B 255 . 255 . 0 . 0
C 255 . 255 . 255 . 0
127 is for loop-back IP address(to test the NIC if properly
install and configuration of your system.
EX. 127.0.0.1 or 127.10.1.254
D-D-N to B-N
1. 111.56.45.78
2. 75.45.34.78
Exercises
B-N to D-D-N
2. 249.155.251.15
D-D-N to B-N
1. 111.56.45.78
2. 75.45.34.78
ANSWER
1. 01101111 00111000 00101101 01001110
2. 01001011 00101101 00100010 01001110
NETWORK
Chapter 5
CONNECTIONS
UNDERSTANDING NETWORK
INTERFACE CARDS (NICS)
TYPES OF LAN CARD
ARRANGE COMPUTER…
TRANSCEIVER TYPE
&
ADAPTER PORTS
T / BNC CONNECTOR
AUI / DIX CONNECTOR
CONNECTION OF THICKNET
USING VAMPIRE TAP
AUI TO RJ-45 CONNECTOR
TYPES OF CABLE
COAX CABLE
STP/UTP
STRAIGHT-THROUGH CABLE
The standard in the picture below is called the T-568B
Pins 4, 5, 7, and 8
are not used.
ROLLED CABLE
What are Rolled Cables?
In the Cisco world, a rolled cable is a cable used to manage a router or switch from the
console port of that device. This cable is usually used when configuring one of these
devices for the first time. A rolled cable connects the PC’s serial port (using a DB9
to RJ45 adaptor) to the router or switch’s console port. A rolled cable looks just like an
Ethernet cable. The funny thing is that a rolled cable isn’t an Ethernet cable at all. In fact,
it is a serial cable. In a rolled cable, Pin 1 connects to Pin 8 on the other side. Here is the
pinout for a rolled cable:
Male Male
RJ-45 RJ-45
1 BLU 8
2 ORN 7
3 BLK 6
4 GRN 5
5 RED 4
6 YEL 3
7 BRN 2
8 GRY 1
You cannot use a rolled cable for an Ethernet cable, nor can you use an Ethernet cable
for a rolled cable. What you can do is take a straight-through Ethernet cable, cut off one
end, flip over the wires, and re-crimp it to make your own rolled cable.
FIBER OPTIC
SELECTING MEDIA
FACTORS TO BE CONSIDERED:
Cable Cost
Cost of Installations
Distance Limitations
Transmission Speed
Interference
Security
DISTANCE LIMITATIONS
Thinnet coax 30
UTP/STP 1024
PROCED TO ACT. OF UTP CABLING
TO BE ANSWER IN THIS ACTIVITY
1.WHAT ARE THE COLOR OF INDIVIDUAL WIRES IN UTP CAT5E CABLE?
2.USES OF STRAIGHT-THROUGH CABLE?
CROSS-OVER CONNENCTION?
REAL-WORLD
Chapter 6
NETWORKS
NETWORK TOPOLOGY
A network topology is the arrangement of computers,
cables, and other components on a network.
terminator trunk
Advantages Disadvantages
Easy to
Limits on cable length and Workstation numbers
implement
Signals travel in one direction on a ring while they are passed from
one computer to the next.
As workstation numbers
Malfunctioning workstations and
increase
cables create problems for the
performance diminishes
entire network
slightly
When a computer or other networking component
transmits a signal to the network, the signal travels to the
hub, which forwards the signal simultaneously to all other
Star Topology
This topology provides the highest fault tolerance that is if a wire, hub,
switch, or other component fails, data can travel along an alternate path.
But this requires a large amount of cable and can quickly become
confusing.
Full mesh topology that provides a direct link between each pair of
nodes on the backbone network ;and
Partial mesh topology that only includes some redundant data paths
to provide some level of fault tolerance.
Mesh Topology
Advantages Disadvantages
Costly to provide
Easy to troubleshoot
redundant links
Chapter 7
•Passive Hub.
Its function is to receive data from one port of the hub
and send it out to other ports.
•Active Hub.
It provides the same functionality of a passive hub
with an additional feature. The signal received from
one port is regenerated (amplified) and retransmitted
to the other ports on the hub.
MODEMS
•Asynchronous modems
Developed especially for use with telephone lines.
Data transmission is not coordinated between the
sending and receiving computers..
•Synchronous modems
It uses careful timing and coordination to send
large blocks of data (frames) made up of multiple
bytes.
ROUTERS
AND
TROUBLESHOOTING
FAULT TOLERANCE: SAFEGUARDING THE
DATA
Forces of nature also pose a threat: fires, floods, and other natural
disasters can cause damage to equipment and loss of data.
DATA BACKUP
There are five types of backup that can be performed on either the server or
workstation:
Incremental backup
Differential backup
Copy backup
Daily backup
Normal backup or Full backup