0% found this document useful (0 votes)
22 views26 pages

Introduction To Networking

Uploaded by

Jasim isam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views26 pages

Introduction To Networking

Uploaded by

Jasim isam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

Introduction to Networking

- What is Networking?
• The practice of connecting computers and other devices to share
resources and communicate
- Components and Types of Networks

• Devices :
- routers and switches…
• Types:
- LAN, WAN, MAN, PAN
• Media:
- Wired {Copper, Fiber Optic}
- Wireless {Satellite Communication, Wifi Mobile communication …}
- Networking Topologies and
Infrastructure
• The physical and logical layout of a network, including:
- bus, star, ring, mesh, and hybrid topologies
- OSI model
• is a conceptual framework that divides network communications
functions into seven layers. It defines how data is being sent over
network
- Physical Layer (Layer 1)
• The lowest layer of the OSI model.
• - Responsible for the *physical connection* between devices.
• - Key functions:
• - *Bit synchronization*: Provides clock synchronization for bits.
• - *Bit rate control*: Defines the transmission rate (bits per second).
• - *Physical topologies*: Specifies network arrangement (e.g., bus, star,
mesh).
• - *Transmission mode*: Determines data flow (simplex, half-duplex, full-
duplex).
• - Devices: Hub, Repeater, Modem, and Cables.
- Data Link Layer (Layer 2)
• Manages data frames between devices on the same network
segment.
• - Functions:
• - *Framing*: Divides data into frames.
• - *MAC addressing*: Assigns unique addresses to devices.
• - *Error detection and correction*: Ensures reliable data
transmission.
• - Devices: Switches, Bridges, NICs (Network Interface Cards).
- Network Layer (Layer 3)
• Handles routing and forwarding of data between different networks.
• - Key tasks:
• - *Logical addressing*: Assigns IP addresses.
• - *Routing*: Determines the best path for data.
• - *Packet forwarding*: Moves packets across networks.
• - Devices: Routers, Layer 3 switches.
- Transport Layer (Layer 4)
• - Ensures reliable end-to-end communication.
• - Functions:
• - *Segmentation and reassembly*: Breaks data into segments.
• - *Flow control*: Manages data flow.
• - *Error recovery*: Detects and retransmits lost data.
• - Protocols: TCP (Transmission Control Protocol), UDP (User Datagram
Protocol).
- Session Layer (Layer 5)
• - Establishes, maintains, and terminates communication sessions.
• - Responsibilities:
• - *Session establishment*: Authentication and negotiation.
• - *Data synchronization*: Ensures data consistency.
• - *Session termination*: Graceful session closure.
• - Not commonly implemented in modern networks.
- Presentation Layer (Layer 6)
• - Translates, encrypts, and compresses data for application
compatibility.
• - Functions:
• - *Data translation*: Converts data formats (e.g., ASCII to EBCDIC).
• - *Encryption/decryption*: Secures data during transmission.
• - *Data compression*: Reduces data size.
• - Examples: JPEG, GIF, SSL/TLS.
- Application Layer (Layer 7)
• - Provides network services directly to applications and users.
• - Includes protocols for email, web browsing, file transfer, etc.
• - Examples: HTTP, SMTP, FTP, DNS.
• - User interfaces and application-specific data.
- Application layer Protocols and ports
• 1. *HTTP (Hypertext Transfer Protocol)*:
• - *Port*: 80
• - *Description*: Used for web traffic.

• 2. *HTTPS (HTTP Secure)*:
• - *Port*: 443
• - *Description*: Used for secure web traffic.

• 3. *FTP (File Transfer Protocol)*:
• - *Port*: 20 (Data), 21 (Control)
• - *Description*: Used for file transfers.
• 4. *SMTP (Simple Mail Transfer Protocol)*:
• - *Port*: 25
• - *Description*: Used for sending emails.

• 5. *POP3 (Post Office Protocol version 3)*:
• - *Port*: 110
• - *Description*: Used for receiving emails.

• 6. *IMAP (Internet Message Access Protocol)*:
• - *Port*: 143
• - *Description*: Used for retrieving emails.
• 7. *DNS (Domain Name System)*:
• - *Port*: 53
• - *Description*: Used for resolving domain names.

• 8. *DHCP (Dynamic Host Configuration Protocol)*:
• - *Port*: 67 (Server), 68 (Client)
• - *Description*: Used for dynamic IP address assignment.

• 9. *SNMP (Simple Network Management Protocol)*:
• - *Port*: 161
• - *Description*: Used for network management.
• 10. *TELNET*:
• - *Port*: 23
• - *Description*: Used for unencrypted command-line interface access.

• 11. *SSH (Secure Shell)*:
• - *Port*: 22
• - *Description*: Used for secure access to remote shells.

• 12. *TFTP (Trivial File Transfer Protocol)*:
• - *Port*: 69
• - *Description*: Used for simple file transfers.
• 13. *NTP (Network Time Protocol)*:
• - *Port*: 123
• - *Description*: Used for time synchronization.

• 14. *SIP (Session Initiation Protocol)*:
• - *Port*: 5060
• - *Description*: Used for VoIP and multimedia communications.

• 15. *LDAP (Lightweight Directory Access Protocol)*:
• - *Port*: 389
• - *Description*: Used for directory services.
• 16. *SMB (Server Message Block)*:
• - *Port*: 445
• - *Description*: Used for file sharing in Windows networks.

• 17. *RDP (Remote Desktop Protocol)*:
• - *Port*: 3389
• - *Description*: Used for remote desktop access.

• 18. *IMAPS (IMAP Secure)*:
• - *Port*: 993
• - *Description*: Used for secure email retrieval.
• 19. *POP3S (POP3 Secure)*:
• - *Port*: 995
• - *Description*: Used for secure email reception.

• 20. *SMTPS (SMTP Secure)*:
• - *Port*: 465
• - *Description*: Used for secure email sending.
- Real example
• A user sends an email (Application layer).
• The email client formats the message (Presentation layer).
• Session are made (Session layer).
• The message is divided into segments (Transport layer).
• IP addresses are assigned (Network layer).
• Frames are created (Data Link layer).
• Bits are transmitted over the physical medium (Physical layer).
- IP Addressing and Subnetting
• - IP Addresses:
• - Unique numerical labels assigned to devices on a network for
identification and communication²³.
• - Subnetting:
• - Dividing a network into smaller networks to improve management
and performance
- IP Address Classes
• In the IPv4 IP address space, there are *five classes*: A, B, C, D, and E.
Each class has a specific range of IP addresses and ultimately dictates
the number of devices you can have on your network
• 1- Class A:
• - *Public IP Range*: 1.0.0.0 to 127.255.255.255
• - *Private IP Range*: 10.0.0.0 to 10.255.255.255
• - *Subnet Mask*: 255.0.0.0 (8 bits)
• - Used for networks with a large number of total hosts.

• 2- Class B:
• - *Public IP Range*: 128.0.0.0 to 191.255.255.255
• - *Private IP Range*: 172.16.0.0 to 172.31.255.255
• - *Subnet Mask*: 255.255.0.0 (16 bits)
• - Used for medium to large-sized networks.
• 3- Class C:
• - *Public IP Range*: 192.0.0.0 to 223.255.255.255
• - *Private IP Range*: 192.168.0.0 to 192.168.255.255
• - *Subnet Mask*: 255.255.255.0 (24 bits)
• - Used in small local area networks (LANs).

• 4- Class D(Reserved for multicast):


• - *Range*: 224.0.0.0 to 239.255.255.255
• - Used for special purposes like multicast group communication.
• 5- Class E (Reserved for experimental use):
• - *Range*: 240.0.0.0 to 254.255.255.255
• - Reserved for research and development purposes
• Remember that private IP addresses are used within local networks
(like your home or office), while public IP addresses are used for
communication on the global internet. Public IP addresses are unique
and globally routable, whereas private IP addresses are not visible
outside the local network.

You might also like