Werabe University: Institute of Technology
Werabe University: Institute of Technology
INSTITUTE OF TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY
1
Network Device and Configuration
Chapter One
2
Outline
Network Overview
Network Device
OSI Model
IP Address
3
1. Network Overview
• It is a group of computer systems and other computing hardware devices
• that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users.
4
5
Reasons for Networking
Sharing of resources: Primary goal of a computer network is to share
resources.
For example several PCs can be connected to a single expensive line
printer.
Sharing information: Information on a single computer can be accessed
by other computers in the network.
Duplication of data file on separate PCs can be avoided.
Communication: When several PCs are connected to each other, messages
can be sent and received.
Compiled by Ali M (MSc.in CS Networking) 12/13/2024 6
Characteristics of a Computer Network
7
Applications of Network
The following are the areas where computer networks are employed.
• Hubs
• Switches
• Routers
• Bridges
9
Hub
• one of the most basic pieces of networking equipment available.
• Physically a hub is a box with a number of RJ45 ports
• (typically between 4 and 32) that allows you to connect several networking devices
together using twisted pair (CAT 5) network cables.
• Hubs have no intelligence, meaning they cannot be programmed or have a memory of
devices that are plugged into its ports.
• They are quite suitable for small networks but tend to perform poorly on large networks.
• Hubs typically come in both standard (10 Mbps) and Fast Ethernet (100 Mbps) versions.
10
Switch
• Switches look nearly identical to hubs, but a switch generally contains
more ‘intelligence’ than a hub.
• Unlike hubs, network switches are capable of inspecting the data packets
as they are received and..
• determining the source and destination device of that packet, and
forwarding that packet appropriately.
11
Switch
• By delivering messages only to the connected device that it was intended for,
network switches conserve network bandwidth and offer generally better
performance than hubs.
• Most switches are active: that is, they electrically amplify the signal as it moves
from one device to another.
12
Router
• Routers translate information from one network to another
• Routers select the best path to route a message, based on the destination address
and origin.
• The router can direct traffic to prevent head-on collisions, and is smart enough to
know when to direct traffic along back roads and shortcuts.
13
Router
• routers know the addresses of computers, bridges, and other routers on the
network.
• It can even ‘listen’ to the entire network to determine which sections are busiest
- they can then redirect data around those sections until they clear up.
14
Bridge
• are devices that allow you to segment a large network into two small, more
efficient networks.
• If you are adding an older wiring scheme and want the new network to be up-
to-date, a bridge can connect the two.
• monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location.
15
Bridge
• Most bridges can ‘listen’ to the network and automatically figure out the
address of each computer on both sides of the bridge.
• The bridge can inspect each message and, if necessary, broadcast it on the
other side of the network.
• manage the traffic to maintain optimum performance on both sides of the
network.
16
Gateway
• It able to connect networks that use completely different protocols or data
formats, such as a LAN to a mainframe.
• It is a combination of hardware and software with the built-in processing power
necessary to perform protocol conversions.
• A gateway is slower than a bridge or router.
17
Firewall
What is firewall
• Device or set of devices designed to permit or deny network transmissions
based on a set of rules
• protect networks from unauthorized access while permitting legitimate
communications to pass.
• Many personal computer operating systems include software-based firewalls
to protect against threats from the public Internet.
• Many routers that pass data between networks contain firewall components
and, conversely, many firewalls can perform basic routing functions.
19
Cont.…
Internet
• A firewall :
• Acts as a security gateway between two
networks
Corporate Network
• Usually between trusted and untrusted Gateway
networks (such as between a corporate
network and the Internet)
Corporate
Site
Why Firewalls are Needed
• Prevent attacks from untrusted networks
• Protect data integrity of critical information
• Preserve customer and partner confidence
Feature of firewall
• Block or alert the user about all unauthorized inbound or outbound connection attempts
• Allows the user to control which programs can and cannot access the local network and/or Internet and
provide the user with information about an application that makes a connection attempt
• Hide the computer from port scans by not responding to unsolicited network traffic
• Monitor applications that are listening for incoming connections
• Monitor and regulate all incoming and outgoing Internet users
• Prevent unwanted network traffic from locally installed applications
• Provide information about the destination server with which an application is attempting to communicate
• Track recent incoming events, outgoing events, and intrusion events to see who has accessed or tried to
access your computer.
3. OSI Model
• Open System Interconnection
• defines a networking framework to implement protocols in seven layers and it's
not even tangible.
• conceptual framework so we can better understand complex interactions that are
happening
23
Contd….
• The International Standards Organization (ISO) developed the Open
Systems Interconnection (OSI) model.
• It divides network communication into seven layers. Layers 1-4 are
considered the lower layers, and mostly concern themselves with moving
data around.
• Layers 5-7, the upper layers, contain application-level data.
• Networks operate on one basic principle: "pass it on."
• Each layer takes care of a very specific job, and then passes the data onto the
next layer.
24
Contd…
25
Contd…..
26
Protocols
• a set of rules or procedures for transmitting data between electronic devices, such
as computers.
• In order for computers to exchange information, there must be a preexisting
agreement as to how the information will be structured and how each side will send
and receive it.
27
4. IP Addressing
• An IP address in ipv4 has 32 bits divided into four octets
• To make the address easier to read, people use decimal numbers to represent the
binary digits
• Example: 192.168.1.1
• Dotted decimal notation
• When binary IP addresses are written in decimal format
28
Contd….
29
IP Classes
• Class A
• Reserved for governments and large corporations throughout the
world
• Each Class A address supports 16,777,214 hosts
• Class B
• Addresses are assigned to large- and medium-sized companies
• Each Class B address supports 65,534 hosts
30
Contd…
• Class C
– Addresses are assigned to groups that do not meet the qualifications to
obtain Class A or B addresses
– Each Class C address supports 254 hosts
• Class D
– Addresses (also known as multicast addresses) are reserved for multicasting
– Multicasting is the sending of a stream of data (usually audio and video) to
multiple computers simultaneously
31
Contd..
• Class E
• Addresses are reserved for research, testing, and experimentation
• The Class E range starts where Class D leaves off
• Private IP ranges
• Many companies use private IP addresses for their internal networks
• Will not be routable on the Internet
• Gateway devices have network interface connections to the internal
network and the Internet
• Route packets between them 32
Contd…
33
Contd…
• IP addresses identify both the network and the host
• The division between the two is not specific to a certain number of octets
• Subnet mask
• Indicates how much of the IP address represents the network or subnet
• Standard (default) subnet masks:
• Class A subnet mask is 255.0.0.0
• Class B subnet mask is 255.255.0.0
• Class C subnet mask is 255.255.255.0
34
THANK YOU!!
35