0% found this document useful (0 votes)
3 views

Basic Networking Chapter 1 040235

The document provides an overview of computer networks, detailing their components, types, and functionalities. It explains networking processes, including the roles of devices such as servers, switches, routers, and firewalls, as well as various network topologies and transmission media. Additionally, it covers network security measures and the distinctions between different types of networks like LAN, WAN, and PAN.

Uploaded by

winesdxxx
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Basic Networking Chapter 1 040235

The document provides an overview of computer networks, detailing their components, types, and functionalities. It explains networking processes, including the roles of devices such as servers, switches, routers, and firewalls, as well as various network topologies and transmission media. Additionally, it covers network security measures and the distinctions between different types of networks like LAN, WAN, and PAN.

Uploaded by

winesdxxx
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

Chapter 1

What is Network and


Networking?
Computer Network
▪ A computer network is any collection of
independent computers that connect to one
another over network components.
▪ Networks come in many sizes, shapes and forms
▪ In a computer network, computers are inter-
connected to share resources
▪ Computer networks connect thousands of
computers and the Internet connects millions of
computing devices
Networking

▪ The process of building such a network is called


networking.

▪ In networking, we will have specialized devices


such as switches, routers and firewalls and
technology, ideas

▪ All of these functions are called networking.


Basic Network components
▪ Endpoints (Servers, PCs, Printers, tablets, etc)
Network Interface Card

▪ Interconnection Media (NIC, Cables, Connectors)


Cat6 80 meter

Transmission Media (Hub, Bridge, Repeater,


Lan cable SPT(shieldd twisted pair)

Switch, Access Point, Router, etc) UTP (unshielded twisted pair)


Cooper calbe

▪ Network Security Devices (Firewall, Intrusion


Detection System, etc)
mac address, Physical address hexadecimal(Numbers 0-9and Letters
AtoF)(6Bytes,48bits) 12 words at least

"IEEE SA" Institute of Electrical and Electronics Engineers Standard


Association create MAC address

▪ Network Protocol IPV4, IPV6


Data carry method cable and radio
cable use electromagnetic.
Network Layar

▪ Network Address
Radio use wireless wave.
Client/Server
Work in same network

▪ Clients are computer hardware or software that they request and receive
services from the servers
▪ A server is a computer program or a device designed to process requests and
deliver data to clients (computers) over a local network or the internet.
▪ There are many different types of servers, and one server can provide several
services. For example, a server can be installed to deliver file sharing
services, mail services, database services, web services, etc.
▪ Servers need to have enough capacity, memory, storage to accept many
requests from the clients.
Types of Server
Dell PowerEdge R750
Network Interface Card (NIC)
▪ Each device in a network has a special expansion card
called a network interface card (NIC)

✓ Ethernet NIC
✓ Wireless NIC
✓ USB NIC
Hub rarely used in today

Half duplex mode

▪ Simplest of network devices


▪ Receives data on one port and then sends it out to all other
ports
▪ Cannot filter data so data packets are sent to all connected
devices
▪ When a computer sends a data packet, the hub floods that
packet to all other devices connected to the hub
Like as walki talki a device can use , parallel device, media cannot use.

PC 1
1 2
PC 2

Hub PC 3
2
Bridge work in translation media group layer

▪ Separate collision domain/network segment

▪ A bridge makes forwarding decisions like a modern LAN switch:


bridges were the predecessor of the modern LAN switch
record entry port number and device mac address

▪ Inspects each incoming frame work in half duplex mode

▪ Make forward decisions learning MAC weakness is fewer ports in bridge


Switch Layer 3 switch and layer 2 switch

Layer 3 switch more capible and more function

❖ Switch has intelligent to only forward the frames out of the


correct ports up to 52 ports maximum

❖ Switches segment LAN into separate collision domains, one


for one switch port

❖ Dedicated bandwidth to each device on the network

❖ Switch learns MAC addresses much more quickly by using


hardware ASICs (Application Specific Integrated Circuits)
Fred Four Possible Collision Domains Wilma
100Mbps F0/1 F0/3 100Mbps
Full Duplex Full Duplex

100Mbps 100Mbps
Full Duplex F0/2 F0/4 Full Duplex
Barney Betty
Type of Switches

Unmanageable Switch Manageable Switch


Layer 2 switch

▪ Plug-and-Play ▪ Have IP configuration interfaces to

▪ Same broadcast domain modify the operation of the switch

▪ No IP configuration interface ▪ A serial console or Command Line


Interface
▪ Ability to control LAN traffic
Switches in Enterprise Network
ISP entrance
Core Switch Use in Data center

Multilayer Switch Dlink Access Switch


Modular Switch
Three-Tiered Network Architecture
Routers layer 3 device, use different path, forward package

❖ Serves as the gateway to outside networks by choosing the


best paths
❖ Forward decision is performed by software IOS
❖ Traffic goes based on the destination IP address and
information stored in routing tables
❖ There are two types of Router: wired and wireless to use at
enterprise or small office/home office (SOHO) ipv4 ipv6 protocols are use

SOHO Router Enterprise Router


Access Point
▪ Uses radio waves to communicate with wireless NIC
▪ Connects to a router as a standalone device or it can also be
an integrated component of router itself.
▪ Connected with wire at one end and receives incoming
internet traffic over a cable, then distributes wireless
connection
Firewall
• A demilitarized zone (DMZ) is a network that keep servers
and provides services to an untrusted network
• Firewall prevent traffic from untrusted network to DMZ
• Firewall uses ACL to permit or deny access to trusted
network/untrusted network
• In windows, windows defender is already as software firewall
Unified Threat Management
▪ All-in-one security appliance.
▪ Features are vendor-specific
but could include firewall
services, IDS/IPS services
▪ Additional security services
against
➢ Denial of Service (DOS)
➢ Distributed Denial of
Service (DDoS)
➢ Spyware
➢ Proxy and email filtering
➢ Network access control
and VPN services.
Intrusion Detection/Prevention

Intrusion Detection Systyem Intrusion Prevention System


100 % not secure
IDS IPS with firewall

Copy the traffic streams and Analyze the real time traffic
analyze the copied traffic and allow/block the packets
Allow the malicious traffic Doesn’t allow malicious traffic
and
Repeater
• The repeater doesn’t understand the actual signal but it
just amplifies the signal from one port to another

• Increasing the length of cable

• The more devices on the network, the more collision can


cause and slow the network down.
Patch Panel
▪ Network cables attach to the back as the centralized place
▪ Make a connection to another patch panel or to a switch mounted
nearby
▪ Being connected to the back make a connection to wall plates
▪ Two Types: Electrical copper patch panel and fiber optic patch panel
with multiple ports.
PoE Switch / PoE Injector
Use in CCTV and Wifi

▪ Network switch that applies


Power over Ethernet technology
▪ Deliver both data and power
over the same Ethernet cable
▪ Small amount of DC current
runs over an Ethernet cable,
along with the data, to power
low voltage devices
▪ At distances up to 330ft (100 m)
away
Types of Network
▪ Peer-to-Peer Network
▪ Server-based Network
Both wire

▪ Personal Area Network and


wireless
network

▪ Local Area Network


▪ Metropolitan Area Network
▪ Wide Area Network
SAN Network-Storage area network, use in data center, Cable connection only, contain
media devices
Peer-to-Peer Network
▪ Network devices are connected in various ways, in order to
perform different functions in terms of communication and
resource sharing.

▪ Computers are usually connecting to the network using physical


wires or cables, but that is not always the case. some connections
are wireless, using radio waves.

▪ A peer-to-peer (P2P) network has no dedicated servers; instead, a


number of workstations are connected together for sharing
information or devices.
Server-based Network
Most of today's networks use the client/server model. In
this model one computer acts as a server. Servers hold
resources that are being accessed over the network by
clients.
Common types of networks are classified as:

MAN
PAN (Personal LAN (Local WAN (Wide
(Metropolitan
Area Network) Area Network) Area Network)
Area Network)

WLAN
(Wireless LAN Internet Intranet Extranet
Network)
Personal Area Network (PAN)
A personal area network (PAN) is a
network that connects devices (mouse,
keyboard, printer, smartphone, etc)
within the range of an individual
person.

These devices are connected via


Bluetooth technology, wireless
technology over short distances.
Local Area Network
• LANs are networks usually confined to a geographic area
• From a small number of devices in the office and expend to include
hundreds or even thousands of devices that communicate together.
• Relies on wired connections for increased speed and security, but
wireless also be part of a LAN
Metropolitan Area Network
Wide Area Network
▪ Wide area networking combines multiple LANs that are
geographically separate.
▪ Dedicated leased phone lines, dial-up phone lines,
satellite links, and data packet carrier services
▪ The internet is the best-known example of a public WAN.
Wireless LAN
▪ Wireless LAN connects multiple wireless devices and uses an
access point or wireless network interface cards (NICs)

▪ Wireless network use a different range of frequencies. The


lower the frequency, the lower the data rate, but the further
the transmission.
Internet / Intranet / Extranet

Feature Internet Intranet Extranet

Restricted to Restricted to employees


Access Public
employees + specific external users

Internal Collaboration and


General communication,
Purpose communication, sharing with external
sharing information
resource sharing stakeholders

Secured with controlled


Security Less restricted Highly secured
external access
Topology
➢ Physical topologies in which servers, switches, routers, firewalls
and various devices are being place on the blueprint/layout with
where the cabling is to connect physically.

➢ Logical topologies that deals with the data and its flow
throughout a network.

Networks can come in several topologies


• Point-to-Point topology
• Point-to-Multipoint
• Bus topology
• Star topology
• Ring topology
• Mesh topology
• Hybrid topology
Point-to-Point
A point-to-point topology also known as host to host
topology is one system connected directly to another
system Use in remote desktop
Point-to-Multipoint
A point-to-multipoint topology uses a central device that
connects all the devices together. This topology is popular
with wireless.
Bus Topology (Physical)
Star Topologies (Physical)

Logical topology and Physical topology are same


Ring topology (Physical)
Hybrid Topologies (Physical &
Logical)
Mesh topology
Logical topology and Physical topology are same
Transmission Media
Wire group

Transmission
media

Guided (wired)

Twisted pair
Coaxial cable Fiber-optic cable
cable
Transmission Media

Transmission
media

Unguided
(wireless)

Microwaves Satellites Radio


Coaxial Cable
Coaxial Connector
Twisted-Pair Cable

Copper wire
(Outer Jacket)

Color-coded Plastic
Insulation

Unshielded twisted-Pair (UTP) Shielded twisted-Pair (STP)


Outdoor use strong durable for extreme weather
Indoor usage less durable condition, more expensive than UTP cable
Twisted-Pair Connector
Fiber-optic Cable
Types of Fiber-optic Cable

Single-Mode Fiber (SMF) Multi-Mode Fiber (MMF)

Outdoor Connection Indoor Connection


Fiber-optic Connectors

ST Connectors SC Connectors

LC Connector Duplex Multimode LC


Connectors
Hot Pluggable Transceiver
Network Cabling
▪ UTP Cable Category
UTP
Use Bandwidth (Capability)
Category
Category 1 Telephone/Analog Modem Up to 1 Mbps
Category 2 Telephone and Token Ring Networks Up to 4 Mbps
Category 3 Data Network Up to 10 Mbps
Category 4 Data Network (Token Ring Networks) Up to 16 Mbps
Category 5 Ethernet/Fast Ethernet/Token Ring UP to 100 Mbps
Category 5e Ethernet/FastEthernet/Gigabit Ethernet Up to 1 Gbps
Category 6 Gigabit Ethernet Up to 10 Gbps (55 meters)
Category 6e Gigabit Ethernet Up to 10 Gbps (100 meters)
Category 7 Gigabit Ethernet Up to 10 Gbps (100 meters)
Category 7e Gigabit Ethernet Up to 100 Gbps (100 meters)
Network Cabling
Wiring Standards
Standard from Telecommunications Industry
Association (TIA)
▪ T-568A and T-568B
Straight through Cable Vs
Crossover Cables
When to use straight/cross cables?

1. Straight Cable Use

Router Switch

PC Switch

PC Bridge

PC Hub
When to use straight/cross cables?
2. Crossover Cable Use
Router Router

Switch Switch

PC PC

Hub Hub

PC Server

Bridge Switch
Cabling Steps
Step-1
Step-2
Step-3
Step-4
Step-5
Step-6
Step-7
Step-8
Step-9
Step-10
Other Connectors

Rollover cable RS232 cable

You might also like