0% found this document useful (0 votes)
48 views164 pages

Presentation 22

The document discusses CompTIA Network+ certification which is sponsored by leading IT companies. It defines what a network is and describes different types of networks based on media, location, topology, technology, protocols, and more. It also defines key network components like clients, servers, workstations and describes common server types.

Uploaded by

shiraju649
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views164 pages

Presentation 22

The document discusses CompTIA Network+ certification which is sponsored by leading IT companies. It defines what a network is and describes different types of networks based on media, location, topology, technology, protocols, and more. It also defines key network components like clients, servers, workstations and describes common server types.

Uploaded by

shiraju649
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 164

IT Education & Placements

CompTIA Network+
Computing Technology Industry Association
Network+
It was sponsored by IT Industry Leaders

Compaq

Novell IBM

Network+

Microsoft Lotus
What is Network?

Two or more connected Network Devices (Computers, Printers etc)


that can share resources.

Resources

Data
Printer
Internet
Applications
Network Connectivity Components

• NIC (Network Interface Card)

• Cable (Coax, TP, Fiber)

• Connector (BNC, RJ45, SC/ST)

• Network Devices (HUB, Switch, Bridge, Router)

• Network Operating System (XP, 2003, Linux)


Type of Network on the base of Media

Wired Wireless
Media Media
Cable Air
Type of Network on the base of Location

LAN CAN MAN WAN

Local Area Campus Area Metropolitan Wide Area

Network Network Area Network Network


LAN / WAN

LAN WAN

• Limited Area • Network of Network (Internet)


• 1st LAN was limited max • Slow speed
distance 185 meters and max 30 • Connection on demand or
Computers permanently
• Connection permanent between • Public or Private network
two stations Transport
• Primary use for private • Full Duplex or Half Duplex
network Transport Communication
• Typically used for Half Duplex
Full Duplex / Half Duplex Communication

Half Duplex Full Duplex

• Communication possible in both • Communication possible in both


directions (Send / Receive), but directions simultaneously.
only one direction at a time. • Example: Telephone
• Example: walkie-talkie
Type of Network on the base of Topology

Mode of connection with each other

(Physical Connection / Layout of Cables)

BUS STAR RING MESH Hybrid


BUS Topology

1. One shout, every body can listen.


2. Only one will respond.

+ -
• Simple to Install • Difficult to move or change
• Inexpensive • Single fault can bring down the entire network
• Less Cable then others • Difficult to troubleshoot
STAR / HUB Topology

+ -
• To add a new PC, its very easy • Installation cost is higher then
• A single cable failure won’t then BUS Topology
bring down the entire network • If Centralize network device fails,
• Easy to troubleshoot entire network fails
RING Topology

• Each PC connected with two other


PCs
• Data moves down a one-way path
from one PC to another.

+ -
• Easy to trouble shoot, • Expensive, because multiple cables
because PC will stop needed for each PC
receiving data from its • Difficult to reconfigure
upstream neighbor • A Single cable fault can bring down the
entire network
MESH Topology

• Path exist from each PC to every


other PCs in the network.
• n(n-1)/2, where n = number of
PCs.
4(4-1)/2 = 6 connections

-
+
• Expensive, because multiple cables
• Fault tolerant, if one
needed for each PCs
connection fails other
• Too Complex
path is ready to move
• Administrative overhead, i.e. if you
the data
want to add 6 more PCs in above
network then, how many connections
you need…???
Hybrid – Star Ring Topology
Backbone and Segments

Backbone

Segments
Backbone

• Backbone is the part of the network to which all segments


and server connect.
• Main part of any network
• It usually uses a high-speed communication, such as Fiber
Distributed Data Interface (FDDI)
• All servers and all network segments typically connect
directly to the backbone so that an segment is only one
segment away from any server on that backbone.
• because all segments are close to the servers, the network
is more efficient.
Segments

• Segment is a general term for any short section of the


network that is not part of the backbone.
• Just as servers connect to the backbone, workstations
connect to segments.
• Segments are connected to the backbone to allow the
workstations on them access to the rest of the network.
Selecting the right Topology

• Each Topology has its advantages and drawbacks.


• The process of selecting a topology can be much like
buying a pair of shoes.
• You should balance the following considerations when
choosing a physical topology for your network.
• Cost
• Ease of Installation
• Ease of maintenance
• Cable / other fault tolerance
• Hybrid Topology can able to give solution.
Type of Network on the base of Technology

Ethernet Token Ring


(IEEE Standard) (IBM Standard)
Institute of Token will pass the
Electronics & data to the
Electrical Engineers destination

• Both the types of LAN Cards are available in the market


• We are using Ethernet Technology
Type of Network on the base of Protocol

NetBEUI IPX/SPX TCP/IP


(NetBIOS Extended (Internetwork (Transmission
User Interface) Packet Exchange / Control Protocol /
Sequence Packet Internet Protocol)
• Developed by IBM and Exchange)
later enhanced by • U.S. Department of
Microsoft and Novell Defense began to define
• Introduced and
• NetBIOS (Network the TCP/IP
developed by Novell
Basic Input / Output • Much of the original
System) work on TCP/IP was
done at the University
of California

• TCP/IP is the only protocol suite in use on the internet


• TCP/IP is the protocol suite of choice today
What is workstation?

• The term workstation is, any computer that is connected to the


network and used by an individual to do work.
What is Client?

• A client is any network entity that can request resources from

the network; a workstation is a computer that can request

resources.

• Workstation can be clients, but not all clients are workstations.

For example, a printer can request resources from the network,

but it is a client, not a workstation.


What is Server?

• It provides resources to the clients on the network.


• Servers are typically powerful computers that run the software
that controls and maintains the network. This software is
known as the network operating system.
• Servers are often specialized for a single purpose. This is not to
say that a single server can’t do many jobs, but to get better
performance you dedicate a server to a single task.

• File server • Mail Server


• Print server • Fax Server
• Proxy server • Remote Access Server
• Application Server • Telephony server
• Web server
Understanding different Servers?

File Server: Holds and distributes files.


Print Server: Controls and manages one or more printers.
Proxy Server: Performs a functions on behalf of other
computers.
Application Server: Hosts a network application.
Web Server: Holds and delivers web pages and other web
content using the hypertext transfer protocol
(HTTP).
Mail Server: Hosts and delivers e-mails. It’s electronic
post office.
Fax Server: Sends and receives faxes (via a special fax
board) for the entire network without the
need for paper.
Understanding different Servers?

Remote Access Server: Listens for inbound requests to connect


to the network from the outside.
Remote access servers provide remote
users (working at home or on the road)
with a connection to the network,
either via modems or an IP connection.
Telephony Server: Functions as a “smart”
answering machine for the network.
It can also perform call centre and call-
routing functions.
What is Dumb Terminal?

• The terminals are simply communications devices; they accept


input from users through a keyboard and send it to the
computer. When the computer returns a result, the terminal
displays it on a screen or prints it out on paper. This type of
terminal is sometimes called a dumb terminal, because it
doesn’t perform any calculations of its own.
• Each terminal can only communicate with one device, the
computer. Terminals never communicate with each other.
• Single large computer connected to a series of terminals, each
of which would service a different user. This is called time-
sharing, because the computer divides its processor clock
cycles among the terminals.
• The terminals are simply communications devices.
Physical Media (Cable)

Coaxial Twisted Pair Fiber Optic


Thin Ethernet / Thinnet / 10Base2 / Thin Coaxial Cable

• Coax contains a center conductor, made of copper, surrounded


by a plastic jacket.
• With Thinnet cable, you use BNC connectors to attach stations
to the network.
• BNC means BayoNet Connector or Bayonet Nut Connector or
British Navel Connector or Bayonet Neill-Concelman connector.
• Male / Female BNC Connector.
Graphics - Coaxial
Graphics – Coaxial
Graphics – Coaxial
Graphics – Coaxial
Graphics – BNC Connector
Graphics – BNC Connectors
Graphics – BNC Connectors
Graphics – BNC Connectors
Graphics – BNC Connectors
Graphics – BNC & T-Type Connectors
Graphics – BNC Connectors
Graphics – F-Type Connectors
Twisted Pair Cable

• Twisted pair cable consists of multiple, individually


insulated wires that are twisted together in pairs.
• Some times a metallic shield is placed around the twisted
pairs, hence the name shielded twisted pair (STP).
• Cable without outer shielding, it’s called unshielded twisted
pair (UTP).
• UTP is commonly used in twisted pair Ethernet (10BaseT,
100BaseT etc.)
• UTP is popular for several reasons:
• Cheaper then other types of cabling
• Easy to work with
• It permits transmission rates considered impossible 10
years ago.
Twisted Pair Cable
UTP Cable Categories:

Category 1:

• Two twisted wire pairs (Four Wires)


• Voice Grade (Not rated for data communications)
• Still exists in parts of the Public Switched Telephone
Network (PSTN)
• Supports signals limited to a frequency of 1 MHz.
UTP Cable Categories:

Category 2:

• Four twisted wire pairs (Eight Wires)


• Suitable for up to 4 Mbps, with a frequency of 10 MHz
UTP Cable Categories:

Category 3:

• Four twisted wire pairs (Eight Wires) with three twists


per foot
• Acceptable for transmissions up to 16 MHz
• Popular cable choice singe the mid 0 1980s, but now
limited mainly to telecommunication equipment
UTP Cable Categories:

Category 4:

• Four twisted wire pairs (Eight Wires)


• Frequency of 20 MHz
UTP Cable Categories:

Category 5:

• Four twisted wire pairs (Eight Wires)


• Frequency of 100 MHz
UTP Cable Categories:

Category 5e:

• Four twisted wire pairs (Eight Wires)


• Frequency of 100 MHz, but capable of handling the
disturbance on each pair caused by transmitting on all
four pairs at the same time, which is needed for
Gigabit Ethernet.
UTP Cable Categories:

Category 6:

• Four twisted wire pairs (Eight Wires)


• Frequency of 250 MHz
• Became a standard in June 2002.
Graphics – CAT 5 Cable
Graphics – CAT 5 Cable
Graphics – CAT 5 Cable
RJ 45 (Registered Jack) Connectors

• The connector used with UTP cable is called RJ-45.


Graphics – RJ 45 Connector on LAN Card
Graphics – RJ 45 Connector on Switch
Graphics – RJ 45 Connector on Router
Graphics – RJ 45 Connector on HUB
Graphics – RJ 45 Connector
Graphics – RJ 45 Connector

Data Set
Ready

1. RI - Ringing Indicator 5. RD - Receive Data


2. CD - Carrier Detect 6. TD - Transmit Data
3. DTR - Data Terminal Ready 7. CTS - Clear to send
4. SG - Set Ground 8. RTS - Request to send
Graphics – RJ 45 Connector (Modem / Fax)
Graphics – RJ 45 Connector & BNC / T- Connector
Graphics – RJ 45 Connector Tools
Graphics – RJ 45 Connector (Tester)
Fiber-Optic Connectors

• Fiber-optic cable can use a myriad different connectors, but


the two most popular and recognizable.

• ST (straight tip)
• SC (subscriber connector)
ST ( straight tip )

• The ST fiber-optic connector, developed by AT&T lab.


• It uses a BNC attachment mechanism.
SC ( subscriber connector )

• SC connectors work with either single-mode or multimode


optical fibers.
• Not popular as ST connectors for LAN connections.
Small From Factor Fiber-Optic Connectors

• One of the most popular of fiber-optic connectors is the


SMALL FOME FACTOR (SFF) style of connector.
• The same amount of space over their standard-sized
counterparts.
• The two most popular are the MT-RJ and LC.

• MT-RJ (mechanical transfer registered jack)


• LC (local connector)
MT-RJ (Mechanical Transfer Registered Jack)

• The MT-RJ fiber-optic connector was the small from factor


fiber-optic connector to see widespread use.
• It is one-third the size of the SC and ST.
• Designed by AMP and the local connector designed by
Lucent.

+
• Small size.
• Keyed for single polarity (TX & RX
strands in one connector).
• Easy to use.
LC ( Local Connector)

• LC is a newer style of SFF fiber-optic connector.


• LC connector developed the Lucent Technologies.

+
• Small size.
• Easier to terminate.
Common Network Connectivity Devices

NIC HUB Switch

Bridge Router Gateway


Network Interface Card Adapter (NIC Adapter)

• Every Computer that participates on a network must have an


interface to that network, using either a cable or some form
of wireless signal.
• The NIC is usually a separate product that you can insert and
remove from the computer.
• Systems today, integrate the network adapter into the
motherboard design.
• The NIC of one computer being connected by cable to
another NIC or network device.
• The NIC adapter, in combination with the network adapter
driver, implements the data link layer protocol used on the
computer, such as Ethernet or Token Ring, as well as part of
the physical layer.
Network Interface Card Adapter (NIC Adapter)
Hub
• The device that connects all the segment of the network together.
• Every device in the network connects directly to the hub through a
single cable.
• Hub is the working on Physical Layer of the OSI model.
• Broadcast the data.
• Hub is use for a network that uses the STAR Topology.
• The HUB itself is a box, either freestanding or rack-mounted.
• The ports can be the standard RJ-45 connectors used by twisted-
pair networks.
• Fiber Optic hub is also available which normally uses ST connectors
for fiber optic cable.
• HUBs also have LEDs for each port that light up to indicate when…
1. A device is connected to it.
2. Traffic is passing through the port
3. A collision occurs
Hub
• The term hub or concentrator is used primarily in reference to
Ethernet network.
• Equivalent device on a Token Ring network is called a multistation
access unit (MAU).
• Internal functions of hub and MAU are very different but they serve
the same basic purpose: to connect a collection of computers and
other devices into a single collision domain.
• The range of hub designs fall into three categories:
1. Standalone Hub
2. Stackable Hub
3. Modular Hub
Hub

Stand Alone Hub

Fiber Optic Hub


Hub

Modular Hub
Stackable Hub
Working the Hub
Switch

• Switch repeats incoming traffic, but only to the specific port


for which it is intended (intelligent device).
• Switch operate at Data Link Layer of the OSI reference
model.
• Switches are smart Hubs.
• The benefit of a switch over a hub is that the switch
increases performance because it is able to support full wire
speed on each.
Working the Switch
Bridge

• Bridge are data communication device.


• The bridge works at the Data Link Layer.
• Increase the number of attached workstations and
network segments.
• Can reduce traffic on other segments.
• Bridge connects two similar network segments
together.
• Work with same protocol.
Bridge
Router

• Router is a network device that connects multiple, often


dissimilar, network segments into an internetwork.
• Router do not forward broadcast messages.
• Router are more selective then bridges in the traffic they
pass between the networks, and they are capable of
intelligently selecting the most efficient path to a specific
destination.
• Router are very complex devices. Often , router are
computer upto themselves with their own complex
operating systems to manage the routing functions and
CPUs dedicated to the functions of routing packets.
• Router works at Network Layer.
Router
Gateway

• A Gateway is a network point that acts as an entrance to


another network.
• A gateway is any hardware combination that connects
dissimilar network environments.
• Gateway are the most complex of network device because
they perform translations at multiple of the OSI model.
• The popular example is the e-mail gateway. Most LAN-base
e-mail software, such as Microsoft’s Exchange, can’t
communicate directly with Internet mail servers without
the use of a gateway. This gateway translates LAN-base
mail message into the SMTP format that Internet mail
uses.
Gateway
Other Devices

• Modem
• Wireless Access Point
• Transceiver
• Firewall
Communication Types

Broadcast Simplex
Unicast Duplex
Multicast

Connection Oriented Baseband


Connection Less Broadband
Broadcast

• To simultaneously send the same message to multiple


recipients.
• Broadcasting sends a message to everyone on the network
whereas multicasting sends a message to a select list of
recipients.
Unicast

• Unicast is communication between a single sender and a


single receiver over a network.
• Communication between a single sender and multiple
receivers.
• Point-to-point communication.
Multicast

• Multicast is communication between a single sender and


multiple receivers on a network.
• Multicast is one of the packet types in the Internet Protocol.
Simplex

• Modem operation in which transmission occurs in one


direction only.
• One-way only communications.
• Transmitting and receiving on the same frequency.

Duplex

• That both ends of the communication can send and receive


signals at the same time.
• An ordinary telephone conversation is a duplex
communication.
Connection Oriented
• One of two techniques used in data communications to
transfer data.

• A Connection-oriented service requires a session connection.

• Any data can be sent with a direct physical connection


between the sessions.

Connection Less

• Network protocols in which a host can send a message


without establishing a connection with the recipient.
• Examples of connectionless protocols include Ethernet, IPX
and UDP.
Baseband

• One in which the cable or other network medium can carry


only a single signal at any one time.

Broadband

• On the other hand, can carry multiple signals


simultaneously, using a discrete part of the cable’s
bandwidth for each signal.
• Cable television service is a Best Example.
Chapter 2

The OSI Model


Introducing the OSI Model

Open Systems Interconnections


Models
Introducing the OSI Model

• OSI reference model is a concept that describe follow data


communication should take place.
• Creating a guideline for network data transmission between
computer and components that have different hardware
vendors, software, operating systems and protocols.
• The OSI reference model was developed in two separate
projects by the ISO in (1984) and CCITT.
• IOS-International Organization for Standardization.
• CCITT-Consultative Committee for International
Telephone and Telegraphy.
The OSI reference Model

The OSI reference model has


seven layers
The OSI reference Model
The OSI reference Model

All

People

Seem

To

Need

Data

Processing

The beginning letter of each word corresponds to a layer.


How to travels through the layers of the OSI model
The 5 Steps of data encapsulation are…

1. The Application, Presentation and Session layers create data


from users input.
2. The Transport layer convert the data to segments.
3. The Network layer converts the segment to packets. (or
datagram )
4. The Data link layer converts the packets of frames.
5. The Physical layer converts the frames to bits.
The OSI model

Describe the OSI model


The OSI Model’s Lower Layers

Physical Layer

Data Link Layer


The Physical Layer

• The lowest layer of the OSI Model.


• The Physical layer receives information from the upper
layers, it translates all the data into signals that can be
transmitted on transmission medium.
• This layer translate the bits of the data into electrical on and
offs.
• This layer specifies the layout of the transmission media.
• The Physical topologies include the following:
Bus, Star, Ring, Mesh.
The Physical Layer Devices

• NIC – Network Interface Card


• Transceivers
• Repeaters
• Hubs
• MAUs – Multistation Access Unit
The Network Interface Card (NIC)

• Probably the most common component on any network is the


NIC.
• A NIC is the component that provides the connection
between a computer’s internal bus and the network media.
The Transceiver

• A transceiver is the part of any network interface that


transmits and receives network signals.
• Some transceivers are designed to allow reception of signals
during transmission periods.
The Repeater

• Repeater are used to extend the maximum length of a


network segment.
• They are often used if a few network devices are located for
from the rest of a network.
Hub

• A hub serves as a central connection point for several


network devices.
• The simplest network involve the connection of two
computer.
• There are many classification of hubs, But two of the most
important are active passive.

Active Passive
Hub Hub
Active Hub

• An Active hub can regenerate or amplify a signal.


• It connects multiple media segment, extends cable length
and there by increases transmission length.

Passive Hub

• A Passive hub connects multiple media segments together it


does not regenerate or amplify a signal.
The Multistation Access Unit (MAU)

• A multistation access unit (MSAU) is a hub or concentrator


that connects a group of computers ("nodes“) to a Token
Ring local area network.
• An advantage of an MSAU is that if one computer fails in the
ring, the MSAU can bypass it and the ring will remain intact.
MAUs in a Token Ring network
The Data Link Layer

• The Data Link layer provides error-free transfer of data


frames from one node to another over the physical layer.
• Sends data frames from the network layer to the physical
layer.
• The data link layer protocol provides packet addressing
services, packages the network layer data for transmission,
access to the network, and checks transmitted packets for
errors.
• Physical address are also know as hardware and burned in
addresses but most commonly as MAC addresses.
• Protocols that operate at the Data Link layer have several
responsibilities, including creating, transmitting and
receiving frames.
The Data Link layer is actually made up of two sublayers

Media Access Control (MAC)

The MAC Sub-layer is responsible for addressing on the Local


Area Network.
The MAC Sub-layer is also responsible for determining when
nodes on a Local Area Network are allowed to transmit.

Logical Link Control (LLC)

The LLC Sub-layer is responsible for synchronizing


frames, error checking, and flow control.
Frames

• At the Data Link layer, data coming from upper-layer


protocols are divided into logical chunks called FRAMES.
• A frame is a unit of data transmission.
• The size and format of this frames depend on the
transmission technology.
The Hardware (MAC) Address

• Every interface that communicates over a LAN segment has a


globally unique address, typically assigned at the factory.
• To call it MAC (Media Access Control) address.
• The hardware address is also called the Ethernet address or
the Physical address.
• The MAC address is a value of 48-bit .
• Commonly represented as a 12-digit HEXADECIMAL number:
07 : 57 : AC : 1F : B2 : 76
• Some manufacturers display it with dashes:
07 - 57 - AC - 1F - B2 - 76
Logical Topology

• The logical topology differs from a physical topology.


• The logical topology dictates the way the information flows
and The physical topology dictates the way the cable are
laid out.
• The Three main classifications of media access methods.

• Contention –The two device transmit at the same time.


• Polling – A central device, called a controller.
• Token Passing - This uses a special data packet called a

token.
Data Link Layer Devices

• The three main devices manipulate data at the Data Link


layer

• Bridges
• Switches
• Wireless Access Points (WAPs)

• They are more complex than their Physical later counterparts


and thus are more expensive and difficult to implement.
Bridge

• A Bridge is a network device, operating at the Data Link


layer, that logical separates a single network into two
segment.
• Bridge can connect dissimilar network types.

Switch

• The Switch is more intelligent than a hub in that it can


actually understand the frames that pass through it.
• A Switch builds a table of the MAC address of all the devices
connected to it.
Wireless Access Points (WAPs)

• The WAP is essentially a wireless bridge.


• It operates by connecting wireless clients together.
• The WAP contains at least one radio antenna that it use to
communicate with its clients via radio frequency (RF)
singles.
Wireless Access Points (WAPs)
The OSI Model’s Middle Layers

Network Layer

Transport Layer
Network Layer

• The Network layer if the OSI model defines protocols that


ensure that the data arrive at the correct destination.
• The two devices are connected on different network layer is
essential for providing sources to destination delivery of
packet.
• The data unit at this layer is known as packet.
• IP is an example of a network layer protocol.
• The Network layer protocol provides packet fragmentation
and error checking.
• Network layer is transmitting data from node to node.
Network Layer Concepts

Logical Network Addressing

Routing
Logical Network Addressing

• The Data Link layer provides physical addressing which is


useful for a local network.
• When the packet is destined for a device outside the
network, we require other addressing schemes to identify
source and destination.
• Network layer adds header to the data that include the
logical address (IP address) of the source and destination.
Routing

• Routing is a process wherein a proper path is defined for the


packets to reach the destination routing can be of two types,
static or dynamic.
• In static routing the route to be followed by a packet is
already set by the network administrator.
• In dynamic routing, The route to be followed by a packet is
decided at the time of transmission of the packet.
• The route can be changed based on the available traffic on
the network.
Packets

• At the Network layer, data coming from upper-layer protocol


are divided into logical chunks called packets.
• A packet is a unit of data transmission.
• The size and format of these packets depend on the Network
layer protocol in use.
Use protocol in OSI layers
The Network Layer Devices

• Router
• Layer 3 Switches
Router

• Router are Network layer devices that multiple networks or


segments to form a larger internetwork.
• They are also the devices that facilitate communication
within this internetwork.
• They make the choices about how best to send packets
within the internetwork so that they arrive at their
destination.
• Router do not propagate broadcasts from one of their ports
to another.
Layer 3 Switches

• A Network layer device that has received much media


attention of late is the Layer 3 Switch.
• A Network device that forwards traffic based on layer 3
information at very high speeds.
The Transport Layer

• The Transport layer is concerned with machine to machine


transfer rather than process to process.
• The Transport layer will split data into smaller packets
dispatch those packets and at the receiver reassemble the
data in the correct sequence.
• This layer has two primary protocols, the Transmission
Control Protocol (TCP)and the User Datagram Protocol
(UDP).
• TCP is connection based protocol that provides error
detection and correction with reliable delivery of data
packets.
• UDP is a connectionless protocol with overhead.
The Connection Type

• There are two types of connection services

• Connection-oriented
• Connectionless
Connection-oriented

• Connection-oriented services use acknowledgments and


responses to establish a virtual circuit between sending and
receiving end devices.

Connection-less

• It send each packets independently using the address


information contained in the packet switching.
• Refers to network protocol in which a host can send a
message without establishing a connection with the
recipient.
Transport Layer Implementations

• Internetwork Packet Exchange (IPX)

• Sequenced Packet Exchange (SPX)


IPX

• A networking protocol used by the Novell NetWare operating


system. Like UDP/IP.
• IPX is a datagram protocol used for connectionless
communication.

SPX

• Used in Novell Netware networks.


• SPX provides connection-oriented services between two
node on the network.
• SPX is used primarily by client/server applications.
The OSI Model’s Upper Layers

Session Layer

Presentation Layer

Application Layer
Session Layer

• The Session layer manages the setting up and taking down


of the association between two communicating points that is
called connection.
• The Session layer provides mechanisms by which the
message dialog between computers is established,
maintained, and terminated.
• The Session layer is responsible for establishing process-to-
process communications between networked hosts.
• Provides error reporting for the Application and Presentation
layer.
• Transmits data.
• Gateways operate at this layer.
Presentation Layer

• It change the look, or presentation of the data from the


lower layers into a format that the upper-layer processes can
work with.
• The Presentation layer deals with encryption, data
compression, and network redirectors.
• The Presentation layer deals with character translation.
• The Presentation layer is responsible for defining the syntex
which two network hosts use to communicate.
• Responsible for protocol conversion, character conversion,
data encryption/decryption, expanding graphics commands,
data compression.
Application Layer

• This layer supports application and end-user processes.


• This layer provides application services for file transfers,
e-mail and network software services.
• Software can be divided into two general classes : System
software and Application software.
• System Software consists of low-level program that interact
with the computer at a very basic level. This includes OS,
Compilers, and utilities for managing computer resources.
• In Contrast, Application software includes DB program, WPs,
and SSs.
• There are many Application protocol and some protocol are
frequently added.
Chapter 3

TCP/IP Fundamentals
Introducing TCP/IP

• Transmission Control protocol/Internet Protocol.


• The suite of communications protocols used to connect host
on the internet
• The TCP/IP uses several protocol, the two min ones being
TCP and IP.
• TCP/IP is built into the UNIX operating system and is used
by the internet.
• TCP/IP is the basic communication language or protocol of
the internet.
TCP/IP and the OSI Model

• Application Layer – The highest layer; define the manner in


which application interact with the network—including
database, e-mail, Simple Mail Transfer Protocol, and Telnet.
• Presentation Layer – Defines the way in which data is
formatted presented, converted, and encoded.
• Session Layer – Coordinates communication and maintains
the session for as long as it is needed—performing security,
logging, and administrative functions.
• Transport Layer – Defines protocols for structuring messages
and supervises the validity of the transmission by
performing error checking.
TCP/IP and the OSI Model

• Network Layer – Defines data-routing protocols to increase


the likelihood that the information arrives at the correct
destination node.
• Data Link Layer – The flow of the data from one node to
another by synchronizing blocks of data and controlling the
flow.
• Physical Layer – Defines the mechanism for communicating
with the transmission medium and the interface hardware.
The Transmission Control Protocol
• TCP is the Transport layer of the protocol and services to
ensure a reliable, verifiable data exchange between hosts on
a network.
• TCP breaks data into pieces, wraps the pieces with the
information needed to identify it as a piece of the original
message, and allows the pieces to be reassembled at the
receiving end of the communication link.
• TCP is a set of rules used along with the Internet Protocol to
send data in the form of message units between computers
over the Internet.
• TCP is known as a connection-oriented protocol, which
means that a connection is established and maintained until
such time as the message or message to be exchanged by
the application program at each and have been exchanged.
The Internet Protocol

• The Internet Protocol is the method or protocol by which


data is sent from one computer it another on the Internet.
• computer on the Internet has at least one IP address that
uniquely identifies it from all other computers on the
Internet.
• IP is a connectionless protocol, which means that there is no
continuing connection between the end points that are
communicating.
• IP by itself is something like the postal system.
The Internet Protocol

• It allows you to address a package and drop it in the system,


but there’s no direct link between you and the recipient.
• TCP/IP, on the other hand, establishes a connection between
two host so that they can send messages back and forth for
a period of time.
• ICMP
• ARP and RARP
ICMP
• Internet Control Message Protocol is supports packets
containing error control and informational messages.
• ICMP works at the Network layer and provides the functions
used for Network layer management and control.
ARP/RARP
• ARP a network layer protocol used to convert an IP address
into a physical address.
• The host on the network that the IP address in the request
then replies with its physical address.
• There is also RARP which can be used by a host to discover
its IP address .the host broadcasts its physical address and a
RARP server replies with the host’s IP address.
• Address Resolution Protocol and Reverse ARP
The Application Protocols

• SNMP • POP3
• FTP • LPD
• TFTP • Telnet
• SFTP • HHTP
• SMTP • NTP
• IMAP • SCP
• NFS • IGMP
• SSH • LDAP
• HTTPS
• NNTP
• LPR
The Application Protocol

• SNMP – Simple Network Management Protocol allows


network administrators to collect information about the
network. It is a communications protocol for collecting
information about devices on the network.
• FTP – File Transfer Protocol provides a mechanism for
single or multiple file transfers between computer systems.
• TFTP – Trivial File Transfer Protocol, a simple form of the
FTP. TFTP uses the UDP and provides no security features.
• SFTP – Secure File Transfer Protocol is used when you
need to transfer files over an encrypted connection.
• SMTP – Simple Mail Transfer Protocol allows for a simple e-
mail service and is responsible for moving messages from
one e-mail to another.
The Application Protocol

• POP – Post Office Protocol provides a storage mechanism


for incoming mail.
• IMAP4 – Internet Message Access Protocol allows users to
download mail selectively, store messages on the e-mail
server in a hierarchical structure.
• NFS – Network File System is originally designed to allow
shared file systems on Unix servers to appear as local file
systems on Unix clients.
• TELNET – Telnet is a terminal emulation protocol that
provides a remote logon to another host over the network.
• SSH – Secure Shell protocol is used to establish a secure
telnet session over a standard TCP/IP connection.
The Application Protocol

• HTTP – Hyper Text Transfer Protocol is the command and


control protocol used to manage communications between a
web browser and a web server.
• NNTP – Network News Transfer Protocol is the TCP/IP
protocol used to access Usenet news servers. Usenet news
server contain thousands of individual message boards
knows as newsgroups.
• UDP – User Datagram Protocol is a transport layer
connectionless protocol that does not provide the reliability
services available with TCP.
Port Numbers For Common Protocol

• SMTP - 25 • POP3 - 110


• FTP - 21 • Telnet - 23
• TFTP - 69 • HTTP - 80
• NTP – 123
• SSH – 22
• DNS – 53
• NNTP - 119
IPv4

• Internet Protocol Version 4 is the fourth iteration of the


Internet Protocol (IP) and it is the first version of the
protocol to be widely deployed. IPv4 is the dominant
network layer protocol on the Internet and apart from IPv6
it is the only protocol used on the Internet.

IPv6
• The main improvement brought by IPv6 is a much larger
address space.
Novell NetWare

• NetWare is a network operating system (NOS) that provides


transparent remote file access and numerous other
distributed network services. Including printer sharing and
support for various application such as electronic mail
transfer and database access.
• NetWare was developed by Novell, Inc., and was introduced
in the early 1980s. It was derived from Xerox Network
System (XNS), which was created by Xerox corporation in
the late 1970s, and is based on client-server architecture.
Clients (some time called workstations) request services,
such as file and printer access, from servers.
File and Print Services

• NetWare is known for its file and print services, that is the
network services that serve out files to client computer and
allow printers to be shared over the network.

Security

• NetWare is the most secure NOS. It uses public key


encryption during the login process.
• You cannot get access to the local files unless you are logged
in with a proper client.
• NetWare is the only NOS that has been certified by the
National Security Agency (NSA). Which means that it is
secure enough for U.S. government use.
Unix /Linux

• If the other network operating systems available , the


various the forms of UNIX are probably the most popular. It
is definitely the oldest of the network operating systems.
• Bell Labs developed UNIX, in part , in 1969.
• The kernel can access hardware and communicate with
various types of user interfaces. The two most popular user
interfaces are the command-line interface and the graphical
interface.
• The UNIX flavor that has been receiving the most attention
lately is LINUX.
• Linux is a fairly easy-to-use. Linux flavor developed by Linus
Torvalds at the University of 1994.
Wireless Networking

• The word wireless is dictionary defined as “having no wires”.


In networking terminology, wireless is the term used to
describe any computer network where there no physical
wired connection between sender and receiver.

Wireless Network Components

• They require fewer component to operate properly. There


are two main device that can be found in a small wireless
network:
• Wireless Access Point
• Wireless NIC
Wireless Access Points (WAPs)

• For a majority of wired networks, there is a central


components, like a hub or switch, that connect the nodes
together and allows them to communicate.
• That device is a known as a Wireless Access Point. It has at
least one antenna and a port to connect the wireless AP to a
wired network.
Wireless NIC

• Every station that wants to connect to a wireless network


will need a Wireless NIC. The wireless NIC will have a redio
antenna.
• Wireless NICs can also differ in which type of connection
they use to connect to the host computer.
Remote Access Connection Methods

• A computer using remote access is not a part of your


network, it will not use local area network (LAN)
technologies to connect to the network.
• The remote computer will instead the other kinds of
connection methods to connect to the LAN.

PSTN – Public Switched Telephone Network

ISDN – Integrated Services Digital Network


PSTN

• Short for Public Switched Telephone Network, which refers


to the international system based on copper wires carrying
analog voice data.
• This is in contrast to newer telephone networks base on
digital technologies.
• POTS refers to the standard telephone service that most
homes use.
• In relation to the internet, the PSTN actually furnishes much
of the internet’s long-distance infrastructure. Because
internet service providers ISPs pay the long-distance
providers for access to their infrastructure and share the
circuits among many users through packet-switching
ISDN

• Short for integrated Services Digital Network, an


International communication standard for sending voice,
video, and data one digital telephone lines or normal
telephone wires.
• ISDN supports data transfer rates of 64Kbps.
Color Coding

You might also like