0% found this document useful (0 votes)
19 views35 pages

Werabe University: Institute of Technology

Uploaded by

kenabadane9299
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views35 pages

Werabe University: Institute of Technology

Uploaded by

kenabadane9299
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

WERABE UNIVERSITY

INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY

1
Network Device and Configuration

Chapter One

By Ali Mohammed (CCNA ,CCNP R&S,LPI,MCSE)

2
Outline
Network Overview
Network Device
OSI Model
IP Address

3
1. Network Overview
• It is a group of computer systems and other computing hardware devices
• that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users.

4
5
Reasons for Networking
Sharing of resources: Primary goal of a computer network is to share
resources.
 For example several PCs can be connected to a single expensive line
printer.
Sharing information: Information on a single computer can be accessed
by other computers in the network.
 Duplication of data file on separate PCs can be avoided.
Communication: When several PCs are connected to each other, messages
can be sent and received.
Compiled by Ali M (MSc.in CS Networking) 12/13/2024 6
Characteristics of a Computer Network

• Facilitate communication via email, video conferencing, instant messaging, etc.


• Enable multiple users to share a single hardware device like a printer or scanner
• Enable file sharing across the network.
• Allow for the sharing of software or operating programs on remote systems
• Make information easier to access and maintain among network users

7
Applications of Network
The following are the areas where computer networks are employed.

Electronic data interchange


Tele-conferencing
Financial services, marketing and sales
Reservation of Airlines
Internet banking
8
2. Networking Devices

• Hubs
• Switches
• Routers
• Bridges

9
Hub
• one of the most basic pieces of networking equipment available.
• Physically a hub is a box with a number of RJ45 ports
• (typically between 4 and 32) that allows you to connect several networking devices
together using twisted pair (CAT 5) network cables.
• Hubs have no intelligence, meaning they cannot be programmed or have a memory of
devices that are plugged into its ports.
• They are quite suitable for small networks but tend to perform poorly on large networks.
• Hubs typically come in both standard (10 Mbps) and Fast Ethernet (100 Mbps) versions.

10
Switch
• Switches look nearly identical to hubs, but a switch generally contains
more ‘intelligence’ than a hub.
• Unlike hubs, network switches are capable of inspecting the data packets
as they are received and..
• determining the source and destination device of that packet, and
forwarding that packet appropriately.

11
Switch
• By delivering messages only to the connected device that it was intended for,
network switches conserve network bandwidth and offer generally better
performance than hubs.
• Most switches are active: that is, they electrically amplify the signal as it moves
from one device to another.

12
Router
• Routers translate information from one network to another
• Routers select the best path to route a message, based on the destination address
and origin.
• The router can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts.

13
Router
• routers know the addresses of computers, bridges, and other routers on the
network.
• It can even ‘listen’ to the entire network to determine which sections are busiest
- they can then redirect data around those sections until they clear up.

14
Bridge
• are devices that allow you to segment a large network into two small, more
efficient networks.
• If you are adding an older wiring scheme and want the new network to be up-
to-date, a bridge can connect the two.
• monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location.

15
Bridge
• Most bridges can ‘listen’ to the network and automatically figure out the
address of each computer on both sides of the bridge.
• The bridge can inspect each message and, if necessary, broadcast it on the
other side of the network.
• manage the traffic to maintain optimum performance on both sides of the
network.

16
Gateway
• It able to connect networks that use completely different protocols or data
formats, such as a LAN to a mainframe.
• It is a combination of hardware and software with the built-in processing power
necessary to perform protocol conversions.
• A gateway is slower than a bridge or router.

17
Firewall
What is firewall
• Device or set of devices designed to permit or deny network transmissions
based on a set of rules
• protect networks from unauthorized access while permitting legitimate
communications to pass.
• Many personal computer operating systems include software-based firewalls
to protect against threats from the public Internet.
• Many routers that pass data between networks contain firewall components
and, conversely, many firewalls can perform basic routing functions.
19
Cont.…
Internet
• A firewall :
• Acts as a security gateway between two
networks
Corporate Network
• Usually between trusted and untrusted Gateway
networks (such as between a corporate
network and the Internet)

Corporate
Site
Why Firewalls are Needed
• Prevent attacks from untrusted networks
• Protect data integrity of critical information
• Preserve customer and partner confidence
Feature of firewall
• Block or alert the user about all unauthorized inbound or outbound connection attempts
• Allows the user to control which programs can and cannot access the local network and/or Internet and
provide the user with information about an application that makes a connection attempt
• Hide the computer from port scans by not responding to unsolicited network traffic
• Monitor applications that are listening for incoming connections
• Monitor and regulate all incoming and outgoing Internet users
• Prevent unwanted network traffic from locally installed applications
• Provide information about the destination server with which an application is attempting to communicate
• Track recent incoming events, outgoing events, and intrusion events to see who has accessed or tried to
access your computer.
3. OSI Model
• Open System Interconnection
• defines a networking framework to implement protocols in seven layers and it's
not even tangible.
• conceptual framework so we can better understand complex interactions that are
happening

23
Contd….
• The International Standards Organization (ISO) developed the Open
Systems Interconnection (OSI) model.
• It divides network communication into seven layers. Layers 1-4 are
considered the lower layers, and mostly concern themselves with moving
data around.
• Layers 5-7, the upper layers, contain application-level data.
• Networks operate on one basic principle: "pass it on."
• Each layer takes care of a very specific job, and then passes the data onto the
next layer.
24
Contd…

25
Contd…..

26
Protocols
• a set of rules or procedures for transmitting data between electronic devices, such
as computers.
• In order for computers to exchange information, there must be a preexisting
agreement as to how the information will be structured and how each side will send
and receive it.

27
4. IP Addressing
• An IP address in ipv4 has 32 bits divided into four octets
• To make the address easier to read, people use decimal numbers to represent the
binary digits
• Example: 192.168.1.1
• Dotted decimal notation
• When binary IP addresses are written in decimal format

28
Contd….

29
IP Classes
• Class A
• Reserved for governments and large corporations throughout the
world
• Each Class A address supports 16,777,214 hosts
• Class B
• Addresses are assigned to large- and medium-sized companies
• Each Class B address supports 65,534 hosts
30
Contd…
• Class C
– Addresses are assigned to groups that do not meet the qualifications to
obtain Class A or B addresses
– Each Class C address supports 254 hosts
• Class D
– Addresses (also known as multicast addresses) are reserved for multicasting
– Multicasting is the sending of a stream of data (usually audio and video) to
multiple computers simultaneously
31
Contd..
• Class E
• Addresses are reserved for research, testing, and experimentation
• The Class E range starts where Class D leaves off
• Private IP ranges
• Many companies use private IP addresses for their internal networks
• Will not be routable on the Internet
• Gateway devices have network interface connections to the internal
network and the Internet
• Route packets between them 32
Contd…

33
Contd…
• IP addresses identify both the network and the host
• The division between the two is not specific to a certain number of octets
• Subnet mask
• Indicates how much of the IP address represents the network or subnet
• Standard (default) subnet masks:
• Class A subnet mask is 255.0.0.0
• Class B subnet mask is 255.255.0.0
• Class C subnet mask is 255.255.255.0

34
THANK YOU!!

35

You might also like